Rules Contributing to Microsoft Entra Application Deleted Alert
The following rules are used to identify events when a Microsoft Entra application is deleted. Any one or more of these will trigger the Microsoft Entra Application Deleted Alert. Details for each rule can be viewed by clicking the More Details link in the description.
Title |
Description |
||||||||
---|---|---|---|---|---|---|---|---|---|
Azure Application Deleted |
Identifies when an application is deleted in Azure. More details
Rule IDQuery{'selection': {'properties_message': ['Delete application', 'Hard Delete application']}, 'condition': 'selection'} Log SourceStellar Cyber Microsoft Entra Events configured. Rule SourceSigmaHQ,410d2a41-1e6d-452f-85e5-abdd8257a823 Author: Austin Songer @austinsonger Tactics, Techniques, and ProceduresDEFENSE_EVASION, IMPACT, T1489 ReferencesSeverity50 Suppression Logic Based On
Additional Information
|