// A Conditional Access policy was disabled.
AuditLogs
| where OperationName in ("Update conditional access policy")
| extend stateOld = extractjson("$.state", tostring(TargetResources[0].modifiedProperties[0].oldValue))
| extend stateNew = extractjson("$.state", tostring(TargetResources[0].modifiedProperties[0].newValue))
| where stateOld == "enabled" and stateNew == "disabled"
| extend modifiedBy = tostring(InitiatedBy.user.userPrincipalName)
| extend accountName = tostring(split(modifiedBy, "@")[0])
| extend upnSuffix = tostring(split(modifiedBy, "@")[1])
| project
TimeGenerated,
OperationName,
policy = TargetResources[0].displayName,
modifiedBy,
accountName,
upnSuffix,
result = Result,
stateOld,
stateNew
| order by TimeGenerated desc
suppressionEnabled: false
relevantTechniques:
- T1562.007
entityMappings:
- fieldMappings:
- columnName: accountName
identifier: Name
- columnName: upnSuffix
identifier: UPNSuffix
entityType: Account
incidentConfiguration:
groupingConfiguration:
groupByCustomDetails: []
reopenClosedIncident: false
enabled: false
matchingMethod: AllEntities
groupByEntities: []
lookbackDuration: PT1H
groupByAlertDetails: []
createIncident: true
version: 1.0.1
suppressionDuration: 5h
id: 40702da1-ae8a-4e46-ac1f-9327ca6ef588
description: A Conditional Access policy was disabled in Entra ID.
requiredDataConnectors:
- connectorId: AzureActiveDirectory
dataTypes:
- AuditLogs
triggerThreshold: 0
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Microsoft Entra ID/Analytic Rules/Conditional Access - A Conditional Access policy was disabled.yaml
eventGroupingSettings:
aggregationKind: AlertPerResult
triggerOperator: gt
queryFrequency: 5m
query: |
// A Conditional Access policy was disabled.
AuditLogs
| where OperationName in ("Update conditional access policy")
| extend stateOld = extractjson("$.state", tostring(TargetResources[0].modifiedProperties[0].oldValue))
| extend stateNew = extractjson("$.state", tostring(TargetResources[0].modifiedProperties[0].newValue))
| where stateOld == "enabled" and stateNew == "disabled"
| extend modifiedBy = tostring(InitiatedBy.user.userPrincipalName)
| extend accountName = tostring(split(modifiedBy, "@")[0])
| extend upnSuffix = tostring(split(modifiedBy, "@")[1])
| project
TimeGenerated,
OperationName,
policy = TargetResources[0].displayName,
modifiedBy,
accountName,
upnSuffix,
result = Result,
stateOld,
stateNew
| order by TimeGenerated desc
severity: Low
queryPeriod: 5m
name: Conditional Access - A Conditional Access policy was disabled
tactics:
- DefenseEvasion
kind: Scheduled