Azure virtual machine commands execution

Cortex XDR Analytics Alert Reference by data source

Product
Cortex XDR
Last date published
2024-12-03
Category
Analytics Alert Reference
Order
data source

Synopsis

Activation Period

14 Days

Training Period

30 Days

Test Period

N/A (single event)

Deduplication Period

3 Hours

Required Data

  • Requires:
    • Azure Audit Log

Detection Modules

Cloud

Detector Tags

ATT&CK Tactic

Execution (TA0002)

ATT&CK Technique

Command and Scripting Interpreter (T1059)

Severity

Informational

Description

An Azure virtual machine executed PowerShell commands with System privileges.

Attacker's Goals

Executing malicious commands for discovery, privilege escalation, etc.

Investigative actions

  • Check the VM that executed the commands and their results.