SenservaPro_CL
| where ControlName_s == 'AzureSecureScoreOneAdmin'
queryPeriod: 6h
query: |
SenservaPro_CL
| where ControlName_s == 'AzureSecureScoreOneAdmin'
name: Azure secure score one admin
entityMappings:
- fieldMappings:
- columnName: ControlName_s
identifier: Name
- columnName: TenantId
identifier: AadTenantId
- columnName: TenantDisplayName_s
identifier: DisplayName
entityType: Account
- fieldMappings:
- columnName: Group_s
identifier: DistinguishedName
entityType: SecurityGroup
- fieldMappings:
- columnName: SourceSystem
identifier: ResourceId
entityType: AzureResource
queryFrequency: 6h
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/SenservaPro/Analytic Rules/OneGlobalAdmin.yaml
requiredDataConnectors:
- connectorId: SenservaPro
dataTypes:
- SenservaPro_CL
description: |
'This query searches for having 1 Global Administrator reduces the surface area of attack for your Azure tenant, but sets up a single point of failure for the whole tenant. Global Administrators have access to all aspects of Azure'
kind: Scheduled
version: 1.0.1
status: Available
severity: High
relevantTechniques:
- T1529
triggerOperator: gt
triggerThreshold: 0
tactics:
- Impact
id: F539B2A7-D9E7-4438-AA20-893BC61DF130