Query Details
// Tracking The Most Dangerous Entra Admin Role // https://www.linkedin.com/posts/activity-7189502682628349952-Uc9z/ // Custom DefenderXDR KQL detecting this dangerous role activation: let DangerousAdmin = ExposureGraphNodes | where set_has_element(Categories, "identity") | extend AccountUPN = NodeProperties.rawData.accountUpn | extend AdminRoles = NodeProperties.rawData.assignedRoles | where AdminRoles contains "Partner Tier2 Support" | project AccountUPN; IdentityLogonEvents | where AccountUpn has_any(DangerousAdmin)
This KQL query is designed to identify and track the activation of a specific high-risk administrative role within an organization. Here's a simplified breakdown:
Identify Dangerous Admins:
ExposureGraphNodes table to find entries related to identities.Track Logon Events:
IdentityLogonEvents table.In essence, this query helps in monitoring logon activities of users who have been assigned a high-risk administrative role, "Partner Tier2 Support".

Steven Lim
Released: August 2, 2024
Tables
Keywords
Operators