SenservaPro_CL
| where ControlName_s == 'UserDisabled'
severity: Medium
triggerOperator: gt
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/SenservaPro/Analytic Rules/UserAccountDisabled.yaml
id: 24E0132F-61D1-41BD-9393-06136D1039C7
entityMappings:
- fieldMappings:
- identifier: Name
columnName: ControlName_s
- identifier: AadTenantId
columnName: TenantId
- identifier: DisplayName
columnName: TenantDisplayName_s
entityType: Account
- fieldMappings:
- identifier: DistinguishedName
columnName: Group_s
entityType: SecurityGroup
- fieldMappings:
- identifier: ResourceId
columnName: SourceSystem
entityType: AzureResource
kind: Scheduled
status: Available
tactics:
- InitialAccess
queryFrequency: 6h
requiredDataConnectors:
- connectorId: SenservaPro
dataTypes:
- SenservaPro_CL
relevantTechniques:
- T1078
version: 1.0.0
description: |
'This query searches for account is Disabled. Does not effect score as its easily enabled.'
triggerThreshold: 0
query: |
SenservaPro_CL
| where ControlName_s == 'UserDisabled'
queryPeriod: 6h
name: UserAccountDisabled