Microsoft Sentinel Analytic Rules
cloudbrothers.infoAzure Sentinel RepoToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeBack to homepage

GWorkspace - User access has been changed

Back
Id92fae638-5da8-11ec-bf63-0242ac130002
RulenameGWorkspace - User access has been changed
DescriptionDetects user access change.
SeverityLow
TacticsPersistence
TechniquesT1098
Required data connectorsGoogleWorkspaceReportsAPI
KindScheduled
Query frequency1h
Query period1h
Trigger threshold0
Trigger operatorgt
Source Urihttps://github.com/Azure/Azure-Sentinel/blob/master/Solutions/GoogleWorkspaceReports/Analytic Rules/GWorkspaceChangedUserAccess.yaml
Version1.0.1
Arm template92fae638-5da8-11ec-bf63-0242ac130002.json
Deploy To Azure
GWorkspaceActivityReports
| where EventMessage has "change_user_access"
| extend AccountCustomEntity = ActorEmail
description: |
    'Detects user access change.'
kind: Scheduled
tactics:
- Persistence
requiredDataConnectors:
- connectorId: GoogleWorkspaceReportsAPI
  dataTypes:
  - GWorkspaceActivityReports
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/GoogleWorkspaceReports/Analytic Rules/GWorkspaceChangedUserAccess.yaml
severity: Low
name: GWorkspace - User access has been changed
triggerThreshold: 0
queryPeriod: 1h
query: |
  GWorkspaceActivityReports
  | where EventMessage has "change_user_access"
  | extend AccountCustomEntity = ActorEmail  
relevantTechniques:
- T1098
id: 92fae638-5da8-11ec-bf63-0242ac130002
queryFrequency: 1h
status: Available
triggerOperator: gt
version: 1.0.1
entityMappings:
- entityType: Account
  fieldMappings:
  - columnName: AccountCustomEntity
    identifier: Name