Kusto Query LanguageMicrosoft SentinelSECURE

List Conditional Access Policy That Was Changed

Description

This KQL query lists all conditional access policies that have been changed. The modification of authentication processes can be used to create persistence on an cloud account.

Risk

Adversaries can update CA policies to get persistence by removing the necessary strong authentication mechanisms for a account.

Query

Microsoft Sentinel
Kusto
AuditLogs
| where OperationName == "Update conditional access policy"
| extend DeletedPolicy = TargetResources.[0].displayName, Actor = InitiatedBy.user.userPrincipalName
| project TimeGenerated, Actor, DeletedPolicy, TargetResources

References

Leave a Reply

Your email address will not be published. Required fields are marked *