-
Notifications
You must be signed in to change notification settings - Fork 587
Description
Link to Rule
Rule Tuning Type
Contextual Tuning - Customizing rules based on specific environment factors.
Description
In my environment, the "Add member to role." Azure audit logs include many target types and IDs related to the event context. For example, o365.audit.Target.ID may hold a list of values such as [User_123-12-123-b1-12345, 123-12-123-b1-12345, User, [email protected], 12345678] where [email protected] is the actual user.target.id value (i.e., [email protected] was added to a role). In cases like this, the o365.audit.Target.Type field may hold a list of type integers relating to the target objects such as [2, 2, 2, 5, 3].
The logic in the query prevents the rule from alerting on instances like this due to the and not o365.audit.Target.Type: (4 or 5 or 6)
condition. Unless this behavior is intentional, an inclusive match on o365.audit.Target.Type may be a better alternative to ensure coverage.
Example Data
No response