AzSentinelQueries
AzSentinelQueries copied to clipboard
Repository with Sentinel Analytics Rules and Hunting Queries
Microsoft Sentinel hunting queries and Analytics rules
Initially the queries and Analytics Rules in this repository were related to the Azure Attack Paths blog post. Over time, I also add new Analytics Rules that are related to other blog posts if mine.
All queries are ready to be used in Microsoft Sentinel.
HuntingQueries
- Azure VM Run Command or Custom Script execution
- Changes to Azure Lighthouse delegation
- Grant high privilege Azure AD role to identity
- Grant high privilege Microsoft Graph permissions
AnalyticsRules
- Azure VM Run Command or Custom Script execution detected
- Dangerous API permission consented
- High Privileged Role assigned
- A new Lighthouse service provider was added
- Owner added to high privileged application
- Password reset on high privileged user
- Secret added to high privileged application