← Back to SOC feed Coverage →

Entra ID group adds in the last 7 days

kql MEDIUM Azure-Sentinel
T1548
CloudAppEvents
huntingmicrosoftofficial
This rule was pulled from an open-source repository and enriched with AI. Validate in a test environment before deploying to production.
View original rule at Azure-Sentinel →
Retrieved: 2026-05-07T11:00:00Z · Confidence: medium

Hunt Hypothesis

Adversaries may be creating Entra ID groups to establish access and control over cloud resources within the last 7 days. SOC teams should proactively hunt for this behavior to identify potential lateral movement or privilege escalation tactics leveraging group membership in Azure Sentinel.

KQL Query

let LookBack = 7d; CloudAppEvents | where ActionType in ("Add member to group.") and AccountType == "Regular" and Timestamp > ago(LookBack) | extend SecondElement = RawEventData.ModifiedProperties[1] | extend UserAddedId = RawEventData.ObjectId | extend GroupName = SecondElement.NewValue | project Timestamp, ActionType,UserAddedId,PerformedBy = AccountDisplayName,GroupName

Analytic Rule Definition

id: f5e4d3c2-b1a0-4f9d-8e7c-6b5a4d3e2c1f
name: Entra ID group adds in the last 7 days
description: |
  This query looks for Entra ID group adds identified by Microsoft Defender for Cloud Apps. It will require an corresponding app connector in Microsoft Defender for Cloud Apps.
requiredDataConnectors: 
  - connectorId: MicrosoftThreatProtection
    dataTypes: 
      - CloudAppEvents
tactics: 
- Privilege Escalation
relevantTechniques:
- T1548
query: >
  let LookBack = 7d;
  CloudAppEvents
  | where ActionType in ("Add member to group.") and AccountType == "Regular" and Timestamp > ago(LookBack)
  | extend SecondElement = RawEventData.ModifiedProperties[1]
  | extend UserAddedId = RawEventData.ObjectId
  | extend GroupName = SecondElement.NewValue
  | project Timestamp, ActionType,UserAddedId,PerformedBy = AccountDisplayName,GroupName
entityMappings: 
  - entityType: Account
    fieldMappings: 
      - identifier: DisplayName
        columnName: UserAddedId
      - identifier: DisplayName
        columnName: PerformedBy
version: 1.0.0

Required Data Sources

Sentinel TableNotes
CloudAppEventsEnsure this data connector is enabled

MITRE ATT&CK Context

References

False Positive Guidance

Original source: https://github.com/Azure/Azure-Sentinel/blob/main/Hunting Queries/Microsoft 365 Defender/Cloud Apps/aad-group-adds.yaml