Insider Risk_Possible Sabotage

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Content Index


This query correlates users with entity anomalies, security alerts, and delete/remove actions for identification of possible sabotage activities (watchlists configurable). For more information, see https://docs.microsoft.com/azure/sentinel/watchlists

Attribute Value
Type Hunting Query
Solution MicrosoftPurviewInsiderRiskManagement
ID 3201b17a-06e1-4a8d-8157-c69345baa808
Tactics Impact
Techniques T1485
Required Connectors BehaviorAnalytics, MicrosoftDefenderAdvancedThreatProtection, AzureActiveDirectoryIdentityProtection, AzureSecurityCenter, IoT, MicrosoftCloudAppSecurity, IoT, OfficeATP, AzureActivity
Source View on GitHub

Tables Used

This content item queries data from the following tables:

Table Selection Criteria Transformations Ingestion API Lake-Only
AzureActivity OperationName contains "delete"
OperationName contains "remove"
? ?
SecurityAlert ?

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Hunting Queries · Back to MicrosoftPurviewInsiderRiskManagement