Unusual resource access by Azure application

Cortex XSIAM Analytics Alert Reference by Alert name

Product
Cortex XSIAM
Last date published
2025-01-19
Category
Analytics Alert Reference
Index by
Alert name

Synopsis

Activation Period

14 Days

Training Period

30 Days

Test Period

N/A (single event)

Deduplication Period

5 Days

Required Data

  • Requires:
    • Azure Audit Log

Detection Modules

Cloud

Detector Tags

ATT&CK Tactic

Discovery (TA0007)

ATT&CK Technique

Cloud Service Discovery (T1526)

Severity

Informational

Description

An Azure application had interacted with an unusual resource using the Microsoft Graph API.

Attacker's Goals

Abuse applications to gain access to the Azure tenant.

Investigative actions

  • Verify whether the application is intended to use the resource in question.
  • Investigate any unusual activity originating from the application.

Variations

Suspicious resource access by Azure application

Synopsis

ATT&CK Tactic

Discovery (TA0007)

ATT&CK Technique

Cloud Service Discovery (T1526)

Severity

Low

Description

An Azure application had interacted with an unusual resource using the Microsoft Graph API.

Attacker's Goals

Abuse applications to gain access to the Azure tenant.

Investigative actions

  • Verify whether the application is intended to use the resource in question.
  • Investigate any unusual activity originating from the application.