Skip to content

Commit 7dac1ee

Browse files
[Rule Tuning] Microsoft 365 Global Administrator Role Assigned (#5293)
* [Rule Tuning] Microsoft 365 Global Administrator Role Assigned Fixes #5288 * TOML linted * Update rules/integrations/o365/persistence_microsoft_365_global_administrator_role_assign.toml
1 parent da9bfd0 commit 7dac1ee

File tree

1 file changed

+7
-8
lines changed

1 file changed

+7
-8
lines changed

rules/integrations/o365/persistence_microsoft_365_global_administrator_role_assign.toml

Lines changed: 7 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -2,16 +2,16 @@
22
creation_date = "2022/01/06"
33
integration = ["o365"]
44
maturity = "production"
5-
updated_date = "2025/09/08"
5+
updated_date = "2025/11/08"
66

77
[rule]
88
author = ["Elastic"]
99
description = """
10-
In Microsoft Entra ID, permissions to manage resources are assigned using roles. The Global Administrator / Company Administrator
11-
is a role that enables users to have access to all administrative features in Entra ID and services that use Entra ID
12-
identities like the Microsoft 365 Defender portal, the Microsoft 365 compliance center, Exchange, SharePoint Online, and
13-
Skype for Business Online. Adversaries can add users as Global Administrators to maintain access and manage all
14-
subscriptions and their settings and resources.
10+
Identifies when the Microsoft 365 Global Administrator or Company Administrator role is assigned to a user or service
11+
principal. The Global Administrator role has extensive privileges across Entra ID and Microsoft 365 services, making it
12+
a high-value target for adversaries seeking persistent access. Successful assignments of this role may indicate
13+
potential privilege escalation or unauthorized access attempts, especially if performed by accounts that do not
14+
typically manage high-privilege roles.
1515
"""
1616
from = "now-9m"
1717
index = ["logs-o365.audit-*"]
@@ -51,7 +51,6 @@ The Microsoft 365 Global Administrator role grants comprehensive administrative
5151
- Limit the number of Global Administrator accounts and enforce role-based access control (RBAC) using least privilege principles.
5252
- Consider implementing conditional access policies to limit role assignment actions to specific networks, devices, or user groups.
5353
"""
54-
5554
references = [
5655
"https://docs.microsoft.com/en-us/azure/active-directory/roles/permissions-reference#global-administrator",
5756
"https://learn.microsoft.com/en-us/purview/audit-log-activities",
@@ -63,6 +62,7 @@ severity = "medium"
6362
tags = [
6463
"Domain: Cloud",
6564
"Domain: SaaS",
65+
"Domain: Identity",
6666
"Data Source: Microsoft 365",
6767
"Data Source: Microsoft 365 Audit Logs",
6868
"Use Case: Identity and Access Audit",
@@ -82,7 +82,6 @@ event.dataset:o365.audit
8282
)
8383
and o365.audit.AzureActiveDirectoryEventType: 1
8484
and o365.audit.RecordType: 8
85-
and not o365.audit.Target.Type: (4 or 5 or 6)
8685
'''
8786

8887

0 commit comments

Comments
 (0)