Skip to main content

Azure - User Investigation

This Playbook is part of the Azure Enrichment and Remediation Pack.#

Supported versions

Supported Cortex XSOAR versions: 6.9.0 and later.

This playbook performs an investigation on a specific user in Azure environments, using queries and logs from Azure Log Analytics to locate the following activities performed by the user:

  • Script-based user agent usage
  • Administrative user activities
  • Security rules and policies changes
  • Failed login attempt
  • MFA failed login attempt
  • Login attempt from an uncommon country
  • Anomalies activities
  • Risky users
  • Uncommon high volume of actions
  • Action uncommonly performed by the user

Dependencies#

This playbook uses the following sub-playbooks, integrations, and scripts.

Sub-playbooks#

This playbook does not use any sub-playbooks.

Integrations#

Azure Log Analytics

Scripts#

  • SetAndHandleEmpty
  • SetMultipleValues

Commands#

azure-log-analytics-execute-query

Playbook Inputs#


NameDescriptionDefault ValueRequired
UsernameThe username to investigate.Optional
AzureSearchTimeThe Search Time for the Azure Log Analytics search query. Default value: ago(1d)ago(7d)Optional
failedLogonThresholdThe threshold number of failed logons by the user. Required to determine how many failed logon events count as suspicious events.20Optional
MfaAttemptThresholdThe threshold number of MFA failed logons by the user. Required to determine how many MFA failed logon events count as suspicious events.10Optional

Playbook Outputs#


PathDescriptionType
AzureScriptBasedUserAgentEventsScript-based user agent events used by the user in the Azure environment.string
CountAzureEvents.AzureScriptBasedUserAgentCountThe number of script-based user agent usages by the user in the Azure environment.number
AzureAdminActivitiesEventsAdministrative activities performed by the user in the Azure environment.string
CountAzureEvents.AzureAdminActivitiesCountThe number of administrative activities performed by the user in the Azure environment.number
AzureSecurityRulesChangeEventsSecurity rules that were changed by the user in the Azure environment.string
CountAzureEvents.AzureSecurityRulesChangeCountThe number of security rules that were changed by the user in the Azure environment.number
AzureUnsuccessSecurityRulesChangeEventsUnsuccessful attempts to change security rules by the user in the Azure environment.string
CountAzureEvents.AzureUnsuccessSecurityRulesChangeCountThe number of unsuccessful attempts to change security rules by the user in the Azure environment.number
AzureFailLoginCountThe number of failed logins by the user in the Azure environment.number
AzureFailLoginMFACountThe number of failed logins by the user using MFA in the Azure environment.number
AzureAnomaliesEventsAnomaly events on the user in the Azure environment.string
CountAzureEvents.AzureAnomaliesCountThe number of anomaly events on the user in the Azure environment.number
AzureRiskyUserCountThe number of events where the user was defined as a risky user in the Azure environment.number
AzureUncommonCountryLogonEventsUncommon country logon events by the user in the Azure environment.string
CountAzureEvents.AzureUncommonCountryLogonCountThe number of uncommon country logon events by the user in the Azure environment.number
AzureUncommonVolumeEventsUncommon volume events by the user in the Azure environment.string
CountAzureEvents.AzureUncommonVolumeCountThe number of uncommon volume events by the user in the Azure environment.number
AzureUncommonActivitiesEventsUncommon activity events by the user in the Azure environment.string
CountAzureEvents.AzureUncommonActivitiesCountThe number of uncommon activity events by the user in the Azure environment.number

Playbook Image#


Azure - User Investigation