In Azure Active Directory (Azure AD), permissions to manage resources are assigned using roles. The Global Administrator is a role that enables users to have access to all administrative features in Azure AD and services that use Azure AD identities like the Microsoft 365 Defender portal, the Microsoft 365 compliance center, Exchange, SharePoint Online, and Skype for Business Online. Attackers can add users as Global Administrators to maintain access and manage all subscriptions and their settings and resources.
Rule type: query
Risk score: 47
Runs every: 5m
Maximum alerts per execution: 100
- Microsoft 365
- Continuous Monitoring
- Identity and Access
Rule license: Elastic License v2
## Config The Office 365 Logs Fleet integration, Filebeat module, or similarly structured data is required to be compatible with this rule.
event.dataset:o365.audit and event.code:"AzureActiveDirectory" and event.action:"Add member to role." and o365.audit.ModifiedProperties.Role_DisplayName.NewValue:"Global Administrator"
Framework: MITRE ATT&CKTM
- Name: Persistence
- ID: TA0003
- Reference URL: https://attack.mitre.org/tactics/TA0003/
- Name: Account Manipulation
- ID: T1098
- Reference URL: https://attack.mitre.org/techniques/T1098/
- Name: Add Office 365 Global Administrator Role
- ID: T1098.003
- Reference URL: https://attack.mitre.org/techniques/T1098/003/