Query Details
// Detect Privilege Admin under AiTM attack // https://www.linkedin.com/posts/0x534c_sentinel-privilegeadmin-aitm-activity-7227603649688952832--1Id/ //Sentinel rule trigger => Run Playbook "Disable User Account" //A simple and effective offline detection and mitigation strategy. let PrivilegeAdmin = IdentityInfo | where AssignedRoles != "[]" | distinct AccountUPN; AADUserRiskEvents | where RiskEventType == "attackerinTheMiddle" | where UserPrincipalName has_any(PrivilegeAdmin) // #Sentinel #PrivilegeAdmin #AiTM #IdentityProtection #Entra #PremiumDetection
This KQL (Kusto Query Language) query is designed to detect if a privileged admin account is under an "Attacker in the Middle" (AiTM) attack. Here's a simplified breakdown:
Identify Privileged Admins:
IdentityInfo table.Detect AiTM Attacks:
AADUserRiskEvents table for any risk events of type "attackerinTheMiddle".Action:
In essence, this query helps in detecting and responding to AiTM attacks targeting privileged admin accounts by disabling the compromised accounts to prevent further damage.

Steven Lim
Released: August 9, 2024
Tables
Keywords
Operators