+ SECUREKusto Query LanguageMicrosoft Sentinel

List Conditional Access Policy That Have Been Deleted

Description

This KQL query lists all conditional access policies that have been deleted. The modification of authentication processes can be used to create persistence on an cloud account.

Risk

Adversaries can delete CA policies to get persistence.

Query

Microsoft Sentinel
Kusto
AuditLogs
| where OperationName == "Delete conditional access policy"
| extend DeletedPolicy = TargetResources.[0].displayName, Actor = InitiatedBy.user.userPrincipalName
| project TimeGenerated, Actor, DeletedPolicy, TargetResources

References

Leave a Reply

Your email address will not be published. Required fields are marked *