Dataverse - Suspicious security role modifications
| Id | e44a58b2-b63a-4eb9-92da-85660d73495c |
| Rulename | Dataverse - Suspicious security role modifications |
| Description | Identifies an unusual pattern of events whereby a new role is created followed by the creator adding members to the role and subsequently removing the member or deleting the role after a short time period. |
| Severity | Medium |
| Tactics | PrivilegeEscalation |
| Techniques | T1404 T1626 T1548 |
| Required data connectors | Dataverse |
| Kind | Scheduled |
| Query frequency | 1h |
| Query period | 14d |
| Trigger threshold | 0 |
| Trigger operator | gt |
| Source Uri | https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Microsoft Business Applications/Analytic Rules/Dataverse - Suspicious security role modifications.yaml |
| Version | 3.2.0 |
| Arm template | e44a58b2-b63a-4eb9-92da-85660d73495c.json |
let role_create_watch_period = 2d;
let query_frequency = 1h;
let role_create_add_events= DataverseActivity
| where Message == "Create" and EntityName == "role"
| mv-expand Role = Fields
| extend RoleName = Role.Value
| where Role.Name == "name"
| mv-expand Role = Fields
| extend RoleCreateTime = TimeGenerated, RoleId = tostring(Role.Value)
| where Role.Name == "roleid"
| join kind=inner (
DataverseActivity
| where Message == "Associate" and EntityName == "systemuser"
| mv-expand Role = Fields
| where Role.Name == "role"
| extend RoleMemberAddedTime = TimeGenerated, MemberAddedRoleId = tostring(Role.Value))
on $left.RoleId == $right.MemberAddedRoleId, InstanceUrl, UserId
| where RoleMemberAddedTime between (RoleCreateTime .. (RoleCreateTime + role_create_watch_period));
let remove_role_member_events = DataverseActivity
| where TimeGenerated >= ago(query_frequency)
| where Message == "Disassociate" and EntityName == "systemuser"
| mv-expand Role = Fields
| where Role.Name == "role"
| extend ActionTime = TimeGenerated, MemberRemovedRoleId = tostring(Role.Value);
let role_delete_events = DataverseActivity
| where TimeGenerated >= ago(query_frequency)
| where Message == "Delete" and EntityName == "role"
| extend DeletedRoleID = EntityId, Action = "Role deleted within defined time window"
| project Action, ActionTime = TimeGenerated, UserId, ClientIp, DeletedRoleID, InstanceUrl;
let role_member_removals = role_create_add_events
| join kind=inner (remove_role_member_events) on $left.RoleId == $right.MemberRemovedRoleId
| where ActionTime between (RoleCreateTime .. (RoleCreateTime + role_create_watch_period))
| extend Action = "Role membership removed within defined time window";
let role_deletions = role_create_add_events
| join kind=inner (role_delete_events) on $left.RoleId == $right.DeletedRoleID
| where ActionTime between (RoleCreateTime .. (RoleCreateTime + role_create_watch_period));
union isfuzzy=true role_member_removals, role_deletions
| extend
CloudAppId = int(32780),
AccountName = tostring(split(UserId, '@')[0]),
UPNSuffix = tostring(split(UserId, '@')[1])
| project
UserId,
InstanceUrl,
ClientIp,
Action,
RoleCreateTime,
RoleName,
ActionTime,
CloudAppId,
AccountName,
UPNSuffix
relevantTechniques:
- T1404
- T1626
- T1548
name: Dataverse - Suspicious security role modifications
triggerThreshold: 0
tactics:
- PrivilegeEscalation
alertDetailsOverride:
alertSeverityColumnName: Severity
alertDisplayNameFormat: Dataverse - suspicious role modifications in {{InstanceUrl}}
alertDescriptionFormat: 'The following action ocurred following role modifications changes in {{InstanceUrl}}: {{Action}}.'
severity: Medium
id: e44a58b2-b63a-4eb9-92da-85660d73495c
status: Available
requiredDataConnectors:
- dataTypes:
- DataverseActivity
connectorId: Dataverse
kind: Scheduled
query: |
let role_create_watch_period = 2d;
let query_frequency = 1h;
let role_create_add_events= DataverseActivity
| where Message == "Create" and EntityName == "role"
| mv-expand Role = Fields
| extend RoleName = Role.Value
| where Role.Name == "name"
| mv-expand Role = Fields
| extend RoleCreateTime = TimeGenerated, RoleId = tostring(Role.Value)
| where Role.Name == "roleid"
| join kind=inner (
DataverseActivity
| where Message == "Associate" and EntityName == "systemuser"
| mv-expand Role = Fields
| where Role.Name == "role"
| extend RoleMemberAddedTime = TimeGenerated, MemberAddedRoleId = tostring(Role.Value))
on $left.RoleId == $right.MemberAddedRoleId, InstanceUrl, UserId
| where RoleMemberAddedTime between (RoleCreateTime .. (RoleCreateTime + role_create_watch_period));
let remove_role_member_events = DataverseActivity
| where TimeGenerated >= ago(query_frequency)
| where Message == "Disassociate" and EntityName == "systemuser"
| mv-expand Role = Fields
| where Role.Name == "role"
| extend ActionTime = TimeGenerated, MemberRemovedRoleId = tostring(Role.Value);
let role_delete_events = DataverseActivity
| where TimeGenerated >= ago(query_frequency)
| where Message == "Delete" and EntityName == "role"
| extend DeletedRoleID = EntityId, Action = "Role deleted within defined time window"
| project Action, ActionTime = TimeGenerated, UserId, ClientIp, DeletedRoleID, InstanceUrl;
let role_member_removals = role_create_add_events
| join kind=inner (remove_role_member_events) on $left.RoleId == $right.MemberRemovedRoleId
| where ActionTime between (RoleCreateTime .. (RoleCreateTime + role_create_watch_period))
| extend Action = "Role membership removed within defined time window";
let role_deletions = role_create_add_events
| join kind=inner (role_delete_events) on $left.RoleId == $right.DeletedRoleID
| where ActionTime between (RoleCreateTime .. (RoleCreateTime + role_create_watch_period));
union isfuzzy=true role_member_removals, role_deletions
| extend
CloudAppId = int(32780),
AccountName = tostring(split(UserId, '@')[0]),
UPNSuffix = tostring(split(UserId, '@')[1])
| project
UserId,
InstanceUrl,
ClientIp,
Action,
RoleCreateTime,
RoleName,
ActionTime,
CloudAppId,
AccountName,
UPNSuffix
description: Identifies an unusual pattern of events whereby a new role is created followed by the creator adding members to the role and subsequently removing the member or deleting the role after a short time period.
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Microsoft Business Applications/Analytic Rules/Dataverse - Suspicious security role modifications.yaml
triggerOperator: gt
queryPeriod: 14d
queryFrequency: 1h
eventGroupingSettings:
aggregationKind: AlertPerResult
version: 3.2.0
entityMappings:
- entityType: Account
fieldMappings:
- columnName: AccountName
identifier: Name
- columnName: UPNSuffix
identifier: UPNSuffix
- entityType: IP
fieldMappings:
- columnName: ClientIp
identifier: Address
- entityType: CloudApplication
fieldMappings:
- columnName: CloudAppId
identifier: AppId
- columnName: InstanceUrl
identifier: InstanceName