Microsoft Entra ID Elevated Access to User Access Administrator
editMicrosoft Entra ID Elevated Access to User Access Administrator
editIdentifies when a user has elevated their access to User Access Administrator for their Azure Resources. The User Access Administrator role allows users to manage user access to Azure resources, including the ability to assign roles and permissions. Adversaries may target an Entra ID Global Administrator or other privileged role to elevate their access to User Access Administrator, which can lead to further privilege escalation and unauthorized access to sensitive resources. This is a New Terms rule that only signals if the user principal name has not been seen doing this activity in the last 14 days.
Rule type: new_terms
Rule indices:
- filebeat-*
- logs-azure.auditlogs-*
Severity: medium
Risk score: 47
Runs every: 5m
Searches indices from: now-9m (Date Math format, see also Additional look-back time
)
Maximum alerts per execution: 100
References:
Tags:
- Domain: Cloud
- Data Source: Azure
- Data Source: Microsoft Entra ID
- Data Source: Microsoft Entra ID Audit Logs
- Use Case: Identity and Access Audit
- Tactic: Privilege Escalation
- Resources: Investigation Guide
Version: 1
Rule authors:
- Elastic
- Austin Songer
Rule license: Elastic License v2
Investigation guide
editTriage and Analysis
Investigating Microsoft Entra ID Elevated Access to User Access Administrator
This rule identifies when a user elevates their permissions to the "User Access Administrator" role in Microsoft Entra ID (Azure AD). This role allows full control over access management for Azure resources and can be abused by attackers for lateral movement, persistence, or privilege escalation. Since this is a New Terms rule, the alert will only trigger if the user has not performed this elevation in the past 14 days, helping reduce alert fatigue.
Possible investigation steps
-
Review the
azure.auditlogs.properties.initiated_by.user.userPrincipalName
field to identify the user who elevated access. -
Check
source.ip
and associatedsource.geo.*
fields to determine the origin of the action. Confirm whether the IP, ASN, and location are expected for this user. -
Investigate the application ID from
azure.auditlogs.properties.additional_details.value
to determine which interface or method was used to elevate access. -
Pivot to Azure
signinlogs
or Entraauditlogs
to: - Review recent login history for the user.
- Look for unusual sign-in patterns or MFA prompts.
- Determine whether the account has performed any other privilege-related operations.
- Correlate with directory role assignments or role-based access control (RBAC) modifications to assess whether the elevated access was used to add roles or modify permissions.
False positive analysis
- Legitimate admin actions may involve access elevation during maintenance, migration, or investigations.
- Some IT departments may elevate access temporarily without leaving structured change records.
- Review internal tickets, change logs, or admin activity dashboards for approved operations.
Response and remediation
- If elevation was not authorized:
- Immediately remove the User Access Administrator role from the account.
- Disable or lock the account and begin credential rotation.
- Audit activity performed by the account after elevation, especially changes to role assignments and resource access.
- If suspicious:
- Notify the user and confirm whether they performed the action.
- Check for any automation or scripts that could be exploiting unused elevated access paths.
- Review conditional access and PIM (Privileged Identity Management) configurations to limit elevation without approval.
- Strengthen posture:
- Require MFA and approval for all privilege escalation actions.
- Consider enabling JIT (Just-in-Time) access with expiration.
-
Add alerts for repeated or unusual use of
Microsoft.Authorization/elevateAccess/action
.
Rule query
editevent.dataset: azure.auditlogs and azure.auditlogs.operation_name: "User has elevated their access to User Access Administrator for their Azure Resources" and event.outcome: "success"
Framework: MITRE ATT&CKTM
-
Tactic:
- Name: Privilege Escalation
- ID: TA0004
- Reference URL: https://attack.mitre.org/tactics/TA0004/
-
Technique:
- Name: Account Manipulation
- ID: T1098
- Reference URL: https://attack.mitre.org/techniques/T1098/
-
Sub-technique:
- Name: Additional Cloud Roles
- ID: T1098.003
- Reference URL: https://attack.mitre.org/techniques/T1098/003/