Skip to content

Commit 040f56f

Browse files
authored
[New Rule] Azure Network Watcher Deletion (#232)
1 parent 2143110 commit 040f56f

File tree

1 file changed

+51
-0
lines changed

1 file changed

+51
-0
lines changed
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,51 @@
1+
[metadata]
2+
creation_date = "2020/08/31"
3+
ecs_version = ["1.6.0"]
4+
maturity = "production"
5+
updated_date = "2020/08/31"
6+
7+
[rule]
8+
author = ["Elastic"]
9+
description = """
10+
Identifies the deletion of a Network Watcher in Azure. Network Watchers are used to monitor, diagnose, view metrics, and
11+
enable or disable logs for resources in an Azure virtual network. An adversary may delete a Network Watcher in an
12+
attempt to evade defenses.
13+
"""
14+
false_positives = [
15+
"""
16+
Network Watcher deletions may be done by a system or network administrator. Verify whether the username, hostname,
17+
and/or resource name should be making changes in your environment. Network Watcher deletions from unfamiliar users
18+
or hosts should be investigated. If known behavior is causing false positives, it can be exempted from the rule.
19+
""",
20+
]
21+
from = "now-25m"
22+
index = ["filebeat-*"]
23+
language = "kuery"
24+
license = "Elastic License"
25+
name = "Azure Network Watcher Deletion"
26+
note = "The Azure Filebeat module must be enabled to use this rule."
27+
references = ["https://docs.microsoft.com/en-us/azure/network-watcher/network-watcher-monitoring-overview"]
28+
risk_score = 47
29+
rule_id = "323cb487-279d-4218-bcbd-a568efe930c6"
30+
severity = "medium"
31+
tags = ["Elastic", "Azure", "SecOps", "Continuous Monitoring", "Network"]
32+
type = "query"
33+
34+
query = '''
35+
event.module:azure and event.dataset:azure.activitylogs and event.category:Administrative and azure.activitylogs.operation_name:MICROSOFT.NETWORK/NETWORKWATCHERS/DELETE and event.outcome:Success
36+
'''
37+
38+
39+
[[rule.threat]]
40+
framework = "MITRE ATT&CK"
41+
[[rule.threat.technique]]
42+
id = "T1089"
43+
name = "Disabling Security Tools"
44+
reference = "https://attack.mitre.org/techniques/T1089/"
45+
46+
47+
[rule.threat.tactic]
48+
id = "TA0005"
49+
name = "Defense Evasion"
50+
reference = "https://attack.mitre.org/tactics/TA0005/"
51+

0 commit comments

Comments
 (0)