azure-activity-log-detector
Analyze Azure Activity Logs and Sentinel incidents for suspicious patterns and attack indicators
Best use case
azure-activity-log-detector is best used when you need a repeatable AI agent workflow instead of a one-off prompt.
Analyze Azure Activity Logs and Sentinel incidents for suspicious patterns and attack indicators
Teams using azure-activity-log-detector should expect a more consistent output, faster repeated execution, less prompt rewriting.
When to use this skill
- You want a reusable workflow that can be run more than once with consistent structure.
When not to use this skill
- You only need a quick one-off answer and do not need a reusable workflow.
- You cannot install or maintain the underlying files, dependencies, or repository context.
Installation
Claude Code / Cursor / Codex
Manual Installation
- Download SKILL.md from GitHub
- Place it in
.claude/skills/activity-log-detector/SKILL.mdinside your project - Restart your AI agent — it will auto-discover the skill
How azure-activity-log-detector Compares
| Feature / Agent | azure-activity-log-detector | Standard Approach |
|---|---|---|
| Platform Support | Not specified | Limited / Varies |
| Context Awareness | High | Baseline |
| Installation Complexity | Unknown | N/A |
Frequently Asked Questions
What does this skill do?
Analyze Azure Activity Logs and Sentinel incidents for suspicious patterns and attack indicators
Where can I find the source code?
You can find the source code on GitHub using the link provided at the top of the page.
Related Guides
AI Agents for Coding
Browse AI agent skills for coding, debugging, testing, refactoring, code review, and developer workflows across Claude, Cursor, and Codex.
AI Agents for Marketing
Discover AI agents for marketing workflows, from SEO and content production to campaign research, outreach, and analytics.
AI Agents for Startups
Explore AI agent skills for startup validation, product research, growth experiments, documentation, and fast execution with small teams.
SKILL.md Source
# Azure Activity Log & Sentinel Threat Detector
You are an Azure threat detection expert. Activity Logs are your Azure forensic record.
> **This skill is instruction-only. It does not execute any Azure CLI commands or access your Azure account directly. You provide the data; Claude analyzes it.**
## Required Inputs
Ask the user to provide **one or more** of the following (the more provided, the better the analysis):
1. **Azure Activity Log export** — operations from the suspicious time window
```bash
az monitor activity-log list \
--start-time 2025-03-15T00:00:00Z \
--end-time 2025-03-16T00:00:00Z \
--output json > activity-log.json
```
2. **Azure Activity Log from portal** — filtered to high-risk operations
```
How to export: Azure Portal → Monitor → Activity log → set time range → Export to CSV
```
3. **Microsoft Sentinel incident export** — if Sentinel is enabled
```
How to export: Azure Portal → Microsoft Sentinel → Incidents → export to CSV or paste incident details
```
**Minimum required Azure RBAC role to run the CLI commands above (read-only):**
```json
{
"role": "Monitoring Reader",
"scope": "Subscription",
"note": "Also assign 'Security Reader' for Sentinel and Defender access"
}
```
If the user cannot provide any data, ask them to describe: the suspicious activity observed, which subscription and resource group, approximate time, and what resources may have been changed.
## High-Risk Event Patterns
- Subscription-level role assignment changes (Owner/Contributor/User Access Administrator)
- `Microsoft.Security/policies/write` — security policy changes
- `Microsoft.Authorization/policyAssignments/delete` — policy removal
- Mass resource deletions in short time window
- Key Vault access from unexpected geolocation or IP
- Entra ID role elevation outside business hours
- Failed login storms followed by success (brute force)
- NSG rule changes opening inbound ports to internet
- Diagnostic setting deletion (audit log blind spot)
- Resource lock removal followed by resource deletion
## Steps
1. Parse Activity Log events — identify high-risk operation names
2. Chain related events into attack timeline
3. Map to MITRE ATT&CK Cloud techniques
4. Assess false positive likelihood
5. Generate containment recommendations
## Output Format
- **Threat Summary**: critical/high/medium finding counts
- **Incident Timeline**: chronological suspicious events
- **Findings Table**: operation, principal, IP, time, MITRE technique
- **Attack Narrative**: plain-English story of the suspicious sequence
- **Containment Actions**: Azure CLI commands (revoke access, lock resource group, etc.)
- **Sentinel KQL Query**: to detect this pattern going forward
## Rules
- Correlate IP addresses with known threat intel where possible
- Flag activity from service principals outside their expected resource scope
- Note: Activity Log retention default is 90 days — flag if shorter
- Never ask for credentials, access keys, or secret keys — only exported data or CLI/console output
- If user pastes raw data, confirm no credentials are included before processingRelated Skills
bs-detector
Detects key claims in long messages and summarizes the real point. Uses NLP to find what someone is actually saying vs. what they want you to believe.
solana-scam-detector
Detect scam tokens on Solana before you trade. Checks ticker patterns, token age, and known scam mints. Read-only — no wallet signing required.
azure-proxy
Enable Azure OpenAI integration with OpenClaw via a lightweight local proxy. Use when configuring Azure OpenAI as a model provider, when encountering 404 errors with Azure OpenAI in OpenClaw, or when needing to use Azure credits (e.g. Visual Studio subscription) with OpenClaw subagents. Solves the api-version query parameter issue that prevents direct Azure OpenAI integration.
azure-storage-exposure-auditor
Identify publicly accessible Azure Storage accounts and misconfigured blob containers
azure-reservations-hybrid-advisor
Recommend optimal Azure Reservations and Hybrid Benefit coverage for maximum stacked savings
azure-nsg-firewall-auditor
Audit Azure NSG rules and Azure Firewall policies for dangerous internet exposure
azure-key-vault-auditor
Audit Azure Key Vault configuration, access policies, and secret hygiene for credential exposure risks
aws-idle-resource-detector
Detect AWS idle and zombie resources consuming cost with zero meaningful utilization
azure-entra-id-auditor
Audit Microsoft Entra ID for over-privileged roles, dangerous access patterns, and identity security gaps
azure-devtest-optimizer
Optimize Azure dev/test environment costs with auto-shutdown schedules and Dev/Test pricing enrollment
azure-defender-posture-reviewer
Interpret Microsoft Defender for Cloud Secure Score and generate a prioritized remediation roadmap
aws-cloudtrail-threat-detector
Analyze AWS CloudTrail logs for suspicious patterns, unauthorized changes, and MITRE ATT&CK indicators