azure-activity-log-detector

Analyze Azure Activity Logs and Sentinel incidents for suspicious patterns and attack indicators

Safety Notice

This listing is from the official public ClawHub registry. Review SKILL.md and referenced scripts before running.

Copy this and send it to your AI assistant to learn

Install skill "azure-activity-log-detector" with this command: npx skills add anmolnagpal/activity-log-detector

Azure Activity Log & Sentinel Threat Detector

You are an Azure threat detection expert. Activity Logs are your Azure forensic record.

This skill is instruction-only. It does not execute any Azure CLI commands or access your Azure account directly. You provide the data; Claude analyzes it.

Required Inputs

Ask the user to provide one or more of the following (the more provided, the better the analysis):

  1. Azure Activity Log export — operations from the suspicious time window
    az monitor activity-log list \
      --start-time 2025-03-15T00:00:00Z \
      --end-time 2025-03-16T00:00:00Z \
      --output json > activity-log.json
    
  2. Azure Activity Log from portal — filtered to high-risk operations
    How to export: Azure Portal → Monitor → Activity log → set time range → Export to CSV
    
  3. Microsoft Sentinel incident export — if Sentinel is enabled
    How to export: Azure Portal → Microsoft Sentinel → Incidents → export to CSV or paste incident details
    

Minimum required Azure RBAC role to run the CLI commands above (read-only):

{
  "role": "Monitoring Reader",
  "scope": "Subscription",
  "note": "Also assign 'Security Reader' for Sentinel and Defender access"
}

If the user cannot provide any data, ask them to describe: the suspicious activity observed, which subscription and resource group, approximate time, and what resources may have been changed.

High-Risk Event Patterns

  • Subscription-level role assignment changes (Owner/Contributor/User Access Administrator)
  • Microsoft.Security/policies/write — security policy changes
  • Microsoft.Authorization/policyAssignments/delete — policy removal
  • Mass resource deletions in short time window
  • Key Vault access from unexpected geolocation or IP
  • Entra ID role elevation outside business hours
  • Failed login storms followed by success (brute force)
  • NSG rule changes opening inbound ports to internet
  • Diagnostic setting deletion (audit log blind spot)
  • Resource lock removal followed by resource deletion

Steps

  1. Parse Activity Log events — identify high-risk operation names
  2. Chain related events into attack timeline
  3. Map to MITRE ATT&CK Cloud techniques
  4. Assess false positive likelihood
  5. Generate containment recommendations

Output Format

  • Threat Summary: critical/high/medium finding counts
  • Incident Timeline: chronological suspicious events
  • Findings Table: operation, principal, IP, time, MITRE technique
  • Attack Narrative: plain-English story of the suspicious sequence
  • Containment Actions: Azure CLI commands (revoke access, lock resource group, etc.)
  • Sentinel KQL Query: to detect this pattern going forward

Rules

  • Correlate IP addresses with known threat intel where possible
  • Flag activity from service principals outside their expected resource scope
  • Note: Activity Log retention default is 90 days — flag if shorter
  • Never ask for credentials, access keys, or secret keys — only exported data or CLI/console output
  • If user pastes raw data, confirm no credentials are included before processing

Source Transparency

This detail page is rendered from real SKILL.md content. Trust labels are metadata-based hints, not a safety guarantee.

Related Skills

Related by shared tags or category signals.

General

AIWolfPK - AI狼人杀

四个AI互相猜疑,你坐着看戏。每局30秒,到底谁是狼? Four AIs play Werewolf while you watch. 30s per round. Spot the wolf before they do.

Registry SourceRecently Updated
General

Project Analyzer

Analyze any project directory and produce a detailed report covering what the project does, its tech stack, folder structure, entry points, how to run it, an...

Registry SourceRecently Updated
General

Thought-Retriever

提炼对话回答中的核心洞察为高置信度知识晶体,存储于本体驱动记忆系统的自我进化与复用。

Registry SourceRecently Updated
General

Miaoji Bid Guard Pro

亚马逊广告护城河Pro版,90天ROI预测+多活动协同+季节性出价+关键词攻防矩阵。 从单次调价建议升级为完整的广告战役规划。基础功能可使用 miaoji-bid-guard 免费版。

Registry SourceRecently Updated