Power Platform - Connector added to a sensitive environment
| Id | 886a5655-3d12-42f1-8927-4095789c575e |
| Rulename | Power Platform - Connector added to a sensitive environment |
| Description | Identifies occurrences of new API connector creations within Power Platform, specifically targeting a predefined list of sensitive environments. |
| Severity | Low |
| Tactics | Execution Exfiltration |
| Techniques | T0871 T1567 T1537 |
| Required data connectors | PowerPlatformAdmin |
| Kind | Scheduled |
| Query frequency | 1h |
| Query period | 7d |
| Trigger threshold | 0 |
| Trigger operator | gt |
| Source Uri | https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Microsoft Business Applications/Analytic Rules/Power Platform - Connector added to a sensitive environment.yaml |
| Version | 3.2.0 |
| Arm template | 886a5655-3d12-42f1-8927-4095789c575e.json |
let sensitive_environment_id = dynamic([
// Specify the list of sensitive power platform environment ID's to monitor here.
// Example: "10e72012-8886-41ec-b973-250286419b38", "183c7056-7ed0-426f-8ae6-69819cf72259"
]);
let query_frequency = 11h;
PowerPlatformAdminActivity
| where TimeGenerated >= ago (query_frequency)
| where EventOriginalType == "PutConnection"
| extend Properties = tostring(PropertyCollection)
| extend SrcIpAddr = extract(@'"enduser.ip_address","Value":"([^"]+)"', 1, Properties)
| extend SrcIpAddr = iif(SrcIpAddr startswith '::ffff:', replace_string('::ffff:', '', SrcIpAddr), SrcIpAddr)
| extend
EnvironmentId = extract(@'"powerplatform.analytics.resource.environment.id","Value":"([^"]+)"', 1, Properties),
ConnectionId = extract(@'"powerplatform.analytics.resource.connection.id","Value":"([^"]+)"', 1, Properties)
| where EnvironmentId in~ (sensitive_environment_id)
| extend
AccountName = tostring(split(ActorName, "@")[0]),
UPNSuffix = tostring(split(ActorName, "@")[1])
| project
TimeGenerated,
EventOriginalType,
ActorName,
SrcIpAddr,
ConnectionId,
EnvironmentId,
AccountName,
UPNSuffix
queryPeriod: 7d
query: |
let sensitive_environment_id = dynamic([
// Specify the list of sensitive power platform environment ID's to monitor here.
// Example: "10e72012-8886-41ec-b973-250286419b38", "183c7056-7ed0-426f-8ae6-69819cf72259"
]);
let query_frequency = 11h;
PowerPlatformAdminActivity
| where TimeGenerated >= ago (query_frequency)
| where EventOriginalType == "PutConnection"
| extend Properties = tostring(PropertyCollection)
| extend SrcIpAddr = extract(@'"enduser.ip_address","Value":"([^"]+)"', 1, Properties)
| extend SrcIpAddr = iif(SrcIpAddr startswith '::ffff:', replace_string('::ffff:', '', SrcIpAddr), SrcIpAddr)
| extend
EnvironmentId = extract(@'"powerplatform.analytics.resource.environment.id","Value":"([^"]+)"', 1, Properties),
ConnectionId = extract(@'"powerplatform.analytics.resource.connection.id","Value":"([^"]+)"', 1, Properties)
| where EnvironmentId in~ (sensitive_environment_id)
| extend
AccountName = tostring(split(ActorName, "@")[0]),
UPNSuffix = tostring(split(ActorName, "@")[1])
| project
TimeGenerated,
EventOriginalType,
ActorName,
SrcIpAddr,
ConnectionId,
EnvironmentId,
AccountName,
UPNSuffix
version: 3.2.0
name: Power Platform - Connector added to a sensitive environment
entityMappings:
- fieldMappings:
- columnName: AccountName
identifier: Name
- columnName: UPNSuffix
identifier: UPNSuffix
entityType: Account
- fieldMappings:
- columnName: SrcIpAddr
identifier: Address
entityType: IP
eventGroupingSettings:
aggregationKind: SingleAlert
queryFrequency: 1h
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Microsoft Business Applications/Analytic Rules/Power Platform - Connector added to a sensitive environment.yaml
alertDetailsOverride:
alertDisplayNameFormat: New Power Platform connector added in a sensitive environment
alertDescriptionFormat: '{{ActorName}} added a new API connector in environment id {{EnvironmentId}}. This environment has been listed as sensitive.'
description: Identifies occurrences of new API connector creations within Power Platform, specifically targeting a predefined list of sensitive environments.
kind: Scheduled
status: Available
severity: Low
requiredDataConnectors:
- connectorId: PowerPlatformAdmin
dataTypes:
- PowerPlatformAdminActivity
triggerOperator: gt
triggerThreshold: 0
customDetails:
Environment: EnvironmentId
Connection: ConnectionId
tactics:
- Execution
- Exfiltration
id: 886a5655-3d12-42f1-8927-4095789c575e
relevantTechniques:
- T0871
- T1567
- T1537