SenservaPro_CL
| where ControlName_s == 'UserDisabled'
description: |
'This query searches for account is Disabled. Does not effect score as its easily enabled.'
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/SenservaPro/Analytic Rules/UserAccountDisabled.yaml
requiredDataConnectors:
- dataTypes:
- SenservaPro_CL
connectorId: SenservaPro
query: |
SenservaPro_CL
| where ControlName_s == 'UserDisabled'
triggerThreshold: 0
name: UserAccountDisabled
relevantTechniques:
- T1078
entityMappings:
- entityType: Account
fieldMappings:
- columnName: ControlName_s
identifier: Name
- columnName: TenantId
identifier: AadTenantId
- columnName: TenantDisplayName_s
identifier: DisplayName
- entityType: SecurityGroup
fieldMappings:
- columnName: Group_s
identifier: DistinguishedName
- entityType: AzureResource
fieldMappings:
- columnName: SourceSystem
identifier: ResourceId
tactics:
- InitialAccess
queryPeriod: 6h
severity: Medium
status: Available
queryFrequency: 6h
id: 24E0132F-61D1-41BD-9393-06136D1039C7
kind: Scheduled
version: 1.0.0
triggerOperator: gt