Power Platform - Connector added to a sensitive environment
| Id | 886a5655-3d12-42f1-8927-4095789c575e |
| Rulename | Power Platform - Connector added to a sensitive environment |
| Description | Identifies occurrences of new API connector creations within Power Platform, specifically targeting a predefined list of sensitive environments. |
| Severity | Low |
| Tactics | Execution Exfiltration |
| Techniques | T0871 T1567 T1537 |
| Required data connectors | PowerPlatformAdmin |
| Kind | Scheduled |
| Query frequency | 1h |
| Query period | 7d |
| Trigger threshold | 0 |
| Trigger operator | gt |
| Source Uri | https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Microsoft Business Applications/Analytic Rules/Power Platform - Connector added to a sensitive environment.yaml |
| Version | 3.2.0 |
| Arm template | 886a5655-3d12-42f1-8927-4095789c575e.json |
let sensitive_environment_id = dynamic([
// Specify the list of sensitive power platform environment ID's to monitor here.
// Example: "10e72012-8886-41ec-b973-250286419b38", "183c7056-7ed0-426f-8ae6-69819cf72259"
]);
let query_frequency = 11h;
PowerPlatformAdminActivity
| where TimeGenerated >= ago (query_frequency)
| where EventOriginalType == "PutConnection"
| extend Properties = tostring(PropertyCollection)
| extend SrcIpAddr = extract(@'"enduser.ip_address","Value":"([^"]+)"', 1, Properties)
| extend SrcIpAddr = iif(SrcIpAddr startswith '::ffff:', replace_string('::ffff:', '', SrcIpAddr), SrcIpAddr)
| extend
EnvironmentId = extract(@'"powerplatform.analytics.resource.environment.id","Value":"([^"]+)"', 1, Properties),
ConnectionId = extract(@'"powerplatform.analytics.resource.connection.id","Value":"([^"]+)"', 1, Properties)
| where EnvironmentId in~ (sensitive_environment_id)
| extend
AccountName = tostring(split(ActorName, "@")[0]),
UPNSuffix = tostring(split(ActorName, "@")[1])
| project
TimeGenerated,
EventOriginalType,
ActorName,
SrcIpAddr,
ConnectionId,
EnvironmentId,
AccountName,
UPNSuffix
eventGroupingSettings:
aggregationKind: SingleAlert
triggerThreshold: 0
entityMappings:
- entityType: Account
fieldMappings:
- identifier: Name
columnName: AccountName
- identifier: UPNSuffix
columnName: UPNSuffix
- entityType: IP
fieldMappings:
- identifier: Address
columnName: SrcIpAddr
requiredDataConnectors:
- dataTypes:
- PowerPlatformAdminActivity
connectorId: PowerPlatformAdmin
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Microsoft Business Applications/Analytic Rules/Power Platform - Connector added to a sensitive environment.yaml
customDetails:
Connection: ConnectionId
Environment: EnvironmentId
name: Power Platform - Connector added to a sensitive environment
alertDetailsOverride:
alertDisplayNameFormat: New Power Platform connector added in a sensitive environment
alertDescriptionFormat: '{{ActorName}} added a new API connector in environment id {{EnvironmentId}}. This environment has been listed as sensitive.'
relevantTechniques:
- T0871
- T1567
- T1537
status: Available
version: 3.2.0
queryPeriod: 7d
kind: Scheduled
id: 886a5655-3d12-42f1-8927-4095789c575e
query: |
let sensitive_environment_id = dynamic([
// Specify the list of sensitive power platform environment ID's to monitor here.
// Example: "10e72012-8886-41ec-b973-250286419b38", "183c7056-7ed0-426f-8ae6-69819cf72259"
]);
let query_frequency = 11h;
PowerPlatformAdminActivity
| where TimeGenerated >= ago (query_frequency)
| where EventOriginalType == "PutConnection"
| extend Properties = tostring(PropertyCollection)
| extend SrcIpAddr = extract(@'"enduser.ip_address","Value":"([^"]+)"', 1, Properties)
| extend SrcIpAddr = iif(SrcIpAddr startswith '::ffff:', replace_string('::ffff:', '', SrcIpAddr), SrcIpAddr)
| extend
EnvironmentId = extract(@'"powerplatform.analytics.resource.environment.id","Value":"([^"]+)"', 1, Properties),
ConnectionId = extract(@'"powerplatform.analytics.resource.connection.id","Value":"([^"]+)"', 1, Properties)
| where EnvironmentId in~ (sensitive_environment_id)
| extend
AccountName = tostring(split(ActorName, "@")[0]),
UPNSuffix = tostring(split(ActorName, "@")[1])
| project
TimeGenerated,
EventOriginalType,
ActorName,
SrcIpAddr,
ConnectionId,
EnvironmentId,
AccountName,
UPNSuffix
description: Identifies occurrences of new API connector creations within Power Platform, specifically targeting a predefined list of sensitive environments.
queryFrequency: 1h
severity: Low
triggerOperator: gt
tactics:
- Execution
- Exfiltration