When you receive an alert from Microsoft Defender for Resource Manager, we recommend you investigate and respond to the alert as described below. Defender for Resource Manager protects all connected resources, so even if you're familiar with the application or user that triggered the alert, it's important to verify the situation surrounding every alert.
Contact
Contact the resource owner to determine whether the behavior was expected or intentional.
If the activity is expected, dismiss the alert.
If the activity is unexpected, treat the related user accounts, subscriptions, and virtual machines as compromised and mitigate as described in the following step.
Investigate alerts from Microsoft Defender for Resource Manager
Security alerts from Defender for Resource Manager are based on threats detected by monitoring Azure Resource Manager operations. Defender for Cloud uses internal log sources of Azure Resource Manager as well as Azure Activity log, an Azure platform log that provides insight into subscription-level events.
Defender for Resource Manager provides visibility into activity that comes from non-Microsoft service providers that have delegated access as part of the Resource Manager alerts. For example, Azure Resource Manager operation from suspicious proxy IP address - delegated access.
To investigate security alerts from Defender for Resource Manager:
Open Azure Activity log.
Filter the events to:
The subscription mentioned in the alert
The time frame of the detected activity
The related user account (if relevant)
Look for suspicious activities.
Tip
For a better, richer investigation experience, stream your Azure activity logs to Microsoft Sentinel as described in Connect data from Azure Activity log.
Mitigate immediately
Remediate compromised user accounts:
If they’re unfamiliar, delete them as they might have been created by a threat actor
If they’re familiar, change their authentication credentials
Use Azure Activity Logs to review all activities performed by the user and identify any that are suspicious
Remediate compromised subscriptions:
Remove any unfamiliar Runbooks from the compromised automation account
Review IAM permissions for the subscription and remove permissions for any unfamiliar user account
Review all Azure resources in the subscription and delete any that are unfamiliar
Review and investigate any security alerts for the subscription in Microsoft Defender for Cloud
Use Azure Activity Logs to review all activities performed in the subscription and identify any that are suspicious
Remediate the compromised virtual machines
Change the passwords for all users
Run a full antimalware scan on the machine
Reimage the machines from a malware-free source
Next steps
This page explained the process of responding to an alert from Defender for Resource Manager. For related information, see the following pages:
Learn how to create a Microsoft Defender for Cloud automation to trigger a logic app, which will be triggered by specific Defender for Cloud alerts by using an Azure Resource Manager template (ARM template) or Bicep.