List Conditional Access Policy That Was Changed
Description
This KQL query lists all conditional access policies that have been changed. The modification of authentication processes can be used to create persistence on an cloud account.
Risk
Adversaries can update CA policies to get persistence by removing the necessary strong authentication mechanisms for a account.
Query
Microsoft Sentinel
Kusto
AuditLogs
| where OperationName == "Update conditional access policy"
| extend DeletedPolicy = TargetResources.[0].displayName, Actor = InitiatedBy.user.userPrincipalName
| project TimeGenerated, Actor, DeletedPolicy, TargetResources