Skip to content

Latest commit

 

History

History
28 lines (21 loc) · 1.08 KB

AzureADDownloadAllUsers.md

File metadata and controls

28 lines (21 loc) · 1.08 KB

Operation download all users in Azure Active directory performed

Query Information

MITRE ATT&CK Technique(s)

Technique ID Title Link
T1087.004 Account Discovery: Cloud Account https://attack.mitre.org/techniques/T1087/004/
T1069.003 Permission Groups Discovery: Cloud Groups https://attack.mitre.org/techniques/T1069/003/

Description

Detect when a user account downloads all Azure Active Directory users. This can be used to dump all Azure AD users. Both admin and non-admin users can download user lists.

Risk

A malicious actor downloads Azure Active Directory to gain valuable information of the users and groups in your domain.

References

Sentinel

AuditLogs
| where OperationName contains "Download users"
| extend InitiatedByInfo = parse_json(InitiatedBy).['user']
| extend InitiatedByUser = InitiatedByInfo.userPrincipalName
| project-reorder OperationName, ResultDescription, InitiatedByUser, TimeGenerated