22creation_date = " 2022/01/06"
33integration = [" o365" ]
44maturity = " production"
5- updated_date = " 2025/09 /08"
5+ updated_date = " 2025/11 /08"
66
77[rule ]
88author = [" Elastic" ]
99description = """
10- In Microsoft Entra ID, permissions to manage resources are assigned using roles. The Global Administrator / Company Administrator
11- is a role that enables users to have access to all administrative features in Entra ID and services that use Entra ID
12- identities like the Microsoft 365 Defender portal, the Microsoft 365 compliance center, Exchange, SharePoint Online, and
13- Skype for Business Online. Adversaries can add users as Global Administrators to maintain access and manage all
14- subscriptions and their settings and resources .
10+ Identifies when the Microsoft 365 Global Administrator or Company Administrator role is assigned to a user or service
11+ principal. The Global Administrator role has extensive privileges across Entra ID and Microsoft 365 services, making it
12+ a high-value target for adversaries seeking persistent access. Successful assignments of this role may indicate
13+ potential privilege escalation or unauthorized access attempts, especially if performed by accounts that do not
14+ typically manage high-privilege roles .
1515"""
1616from = " now-9m"
1717index = [" logs-o365.audit-*" ]
@@ -51,7 +51,6 @@ The Microsoft 365 Global Administrator role grants comprehensive administrative
5151- Limit the number of Global Administrator accounts and enforce role-based access control (RBAC) using least privilege principles.
5252- Consider implementing conditional access policies to limit role assignment actions to specific networks, devices, or user groups.
5353"""
54-
5554references = [
5655 " https://docs.microsoft.com/en-us/azure/active-directory/roles/permissions-reference#global-administrator" ,
5756 " https://learn.microsoft.com/en-us/purview/audit-log-activities" ,
@@ -63,6 +62,7 @@ severity = "medium"
6362tags = [
6463 " Domain: Cloud" ,
6564 " Domain: SaaS" ,
65+ " Domain: Identity" ,
6666 " Data Source: Microsoft 365" ,
6767 " Data Source: Microsoft 365 Audit Logs" ,
6868 " Use Case: Identity and Access Audit" ,
@@ -82,7 +82,6 @@ event.dataset:o365.audit
8282 )
8383 and o365.audit.AzureActiveDirectoryEventType: 1
8484 and o365.audit.RecordType: 8
85- and not o365.audit.Target.Type: (4 or 5 or 6)
8685'''
8786
8887
0 commit comments