SenservaPro_CL
| where ControlName_s == 'UserNonAdminGuest'
queryPeriod: 6h
description: |
'This query searches for guest is not an admin in Azure'
kind: Scheduled
query: |
SenservaPro_CL
| where ControlName_s == 'UserNonAdminGuest'
tactics:
- InitialAccess
triggerOperator: gt
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/SenservaPro/Analytic Rules/NonAdminGuest.yaml
id: 9B6558C4-BA23-40AC-B95F-42F8A29A3B35
version: 1.0.0
entityMappings:
- entityType: Account
fieldMappings:
- identifier: Name
columnName: ControlName_s
- identifier: AadTenantId
columnName: TenantId
- identifier: DisplayName
columnName: TenantDisplayName_s
- entityType: SecurityGroup
fieldMappings:
- identifier: DistinguishedName
columnName: Group_s
- entityType: AzureResource
fieldMappings:
- identifier: ResourceId
columnName: SourceSystem
triggerThreshold: 0
status: Available
relevantTechniques:
- T1078
name: Non-admin guest
severity: Low
requiredDataConnectors:
- dataTypes:
- SenservaPro_CL
connectorId: SenservaPro
queryFrequency: 6h