// A Conditional Access policy was deleted.
AuditLogs
| where OperationName in ("Delete conditional access policy")
| extend modifiedBy = tostring(InitiatedBy.user.userPrincipalName)
| extend accountName = tostring(split(modifiedBy, "@")[0])
| extend upnSuffix = tostring(split(modifiedBy, "@")[1])
| project
TimeGenerated,
OperationName,
policy = TargetResources[0].displayName,
modifiedBy,
accountName,
upnSuffix,
result = Result,
oldPolicy = TargetResources[0].modifiedProperties[0].oldValue
| order by TimeGenerated desc
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Microsoft Entra ID/Analytic Rules/Conditional Access - A Conditional Access policy was deleted.yaml
kind: Scheduled
incidentConfiguration:
createIncident: true
groupingConfiguration:
groupByCustomDetails: []
matchingMethod: AllEntities
groupByEntities: []
groupByAlertDetails: []
reopenClosedIncident: false
enabled: false
lookbackDuration: PT1H
tactics:
- DefenseEvasion
suppressionDuration: 5h
suppressionEnabled: false
triggerThreshold: 0
version: 1.0.1
entityMappings:
- entityType: Account
fieldMappings:
- columnName: accountName
identifier: Name
- columnName: upnSuffix
identifier: UPNSuffix
eventGroupingSettings:
aggregationKind: AlertPerResult
queryFrequency: 5m
name: Conditional Access - A Conditional Access policy was deleted
description: A Conditional Access policy was deleted from Entra ID.
query: |
// A Conditional Access policy was deleted.
AuditLogs
| where OperationName in ("Delete conditional access policy")
| extend modifiedBy = tostring(InitiatedBy.user.userPrincipalName)
| extend accountName = tostring(split(modifiedBy, "@")[0])
| extend upnSuffix = tostring(split(modifiedBy, "@")[1])
| project
TimeGenerated,
OperationName,
policy = TargetResources[0].displayName,
modifiedBy,
accountName,
upnSuffix,
result = Result,
oldPolicy = TargetResources[0].modifiedProperties[0].oldValue
| order by TimeGenerated desc
queryPeriod: 5m
triggerOperator: gt
id: 2e96fa64-ac4d-4c92-b79e-e9c54b5d8230
relevantTechniques:
- T1562.007
severity: Low
requiredDataConnectors:
- dataTypes:
- AuditLogs
connectorId: AzureActiveDirectory