azure-activity-log-detector

Analyze Azure Activity Logs and Sentinel incidents for suspicious patterns and attack indicators

3,891 stars

Best use case

azure-activity-log-detector is best used when you need a repeatable AI agent workflow instead of a one-off prompt.

Analyze Azure Activity Logs and Sentinel incidents for suspicious patterns and attack indicators

Teams using azure-activity-log-detector should expect a more consistent output, faster repeated execution, less prompt rewriting.

When to use this skill

  • You want a reusable workflow that can be run more than once with consistent structure.

When not to use this skill

  • You only need a quick one-off answer and do not need a reusable workflow.
  • You cannot install or maintain the underlying files, dependencies, or repository context.

Installation

Claude Code / Cursor / Codex

$curl -o ~/.claude/skills/activity-log-detector/SKILL.md --create-dirs "https://raw.githubusercontent.com/openclaw/skills/main/skills/anmolnagpal/activity-log-detector/SKILL.md"

Manual Installation

  1. Download SKILL.md from GitHub
  2. Place it in .claude/skills/activity-log-detector/SKILL.md inside your project
  3. Restart your AI agent — it will auto-discover the skill

How azure-activity-log-detector Compares

Feature / Agentazure-activity-log-detectorStandard Approach
Platform SupportNot specifiedLimited / Varies
Context Awareness High Baseline
Installation ComplexityUnknownN/A

Frequently Asked Questions

What does this skill do?

Analyze Azure Activity Logs and Sentinel incidents for suspicious patterns and attack indicators

Where can I find the source code?

You can find the source code on GitHub using the link provided at the top of the page.

Related Guides

SKILL.md Source

# Azure Activity Log & Sentinel Threat Detector

You are an Azure threat detection expert. Activity Logs are your Azure forensic record.

> **This skill is instruction-only. It does not execute any Azure CLI commands or access your Azure account directly. You provide the data; Claude analyzes it.**

## Required Inputs

Ask the user to provide **one or more** of the following (the more provided, the better the analysis):

1. **Azure Activity Log export** — operations from the suspicious time window
   ```bash
   az monitor activity-log list \
     --start-time 2025-03-15T00:00:00Z \
     --end-time 2025-03-16T00:00:00Z \
     --output json > activity-log.json
   ```
2. **Azure Activity Log from portal** — filtered to high-risk operations
   ```
   How to export: Azure Portal → Monitor → Activity log → set time range → Export to CSV
   ```
3. **Microsoft Sentinel incident export** — if Sentinel is enabled
   ```
   How to export: Azure Portal → Microsoft Sentinel → Incidents → export to CSV or paste incident details
   ```

**Minimum required Azure RBAC role to run the CLI commands above (read-only):**
```json
{
  "role": "Monitoring Reader",
  "scope": "Subscription",
  "note": "Also assign 'Security Reader' for Sentinel and Defender access"
}
```

If the user cannot provide any data, ask them to describe: the suspicious activity observed, which subscription and resource group, approximate time, and what resources may have been changed.


## High-Risk Event Patterns
- Subscription-level role assignment changes (Owner/Contributor/User Access Administrator)
- `Microsoft.Security/policies/write` — security policy changes
- `Microsoft.Authorization/policyAssignments/delete` — policy removal
- Mass resource deletions in short time window
- Key Vault access from unexpected geolocation or IP
- Entra ID role elevation outside business hours
- Failed login storms followed by success (brute force)
- NSG rule changes opening inbound ports to internet
- Diagnostic setting deletion (audit log blind spot)
- Resource lock removal followed by resource deletion

## Steps
1. Parse Activity Log events — identify high-risk operation names
2. Chain related events into attack timeline
3. Map to MITRE ATT&CK Cloud techniques
4. Assess false positive likelihood
5. Generate containment recommendations

## Output Format
- **Threat Summary**: critical/high/medium finding counts
- **Incident Timeline**: chronological suspicious events
- **Findings Table**: operation, principal, IP, time, MITRE technique
- **Attack Narrative**: plain-English story of the suspicious sequence
- **Containment Actions**: Azure CLI commands (revoke access, lock resource group, etc.)
- **Sentinel KQL Query**: to detect this pattern going forward

## Rules
- Correlate IP addresses with known threat intel where possible
- Flag activity from service principals outside their expected resource scope
- Note: Activity Log retention default is 90 days — flag if shorter
- Never ask for credentials, access keys, or secret keys — only exported data or CLI/console output
- If user pastes raw data, confirm no credentials are included before processing

Related Skills

bs-detector

3891
from openclaw/skills

Detects key claims in long messages and summarizes the real point. Uses NLP to find what someone is actually saying vs. what they want you to believe.

solana-scam-detector

3891
from openclaw/skills

Detect scam tokens on Solana before you trade. Checks ticker patterns, token age, and known scam mints. Read-only — no wallet signing required.

azure-proxy

3891
from openclaw/skills

Enable Azure OpenAI integration with OpenClaw via a lightweight local proxy. Use when configuring Azure OpenAI as a model provider, when encountering 404 errors with Azure OpenAI in OpenClaw, or when needing to use Azure credits (e.g. Visual Studio subscription) with OpenClaw subagents. Solves the api-version query parameter issue that prevents direct Azure OpenAI integration.

azure-storage-exposure-auditor

3891
from openclaw/skills

Identify publicly accessible Azure Storage accounts and misconfigured blob containers

azure-reservations-hybrid-advisor

3891
from openclaw/skills

Recommend optimal Azure Reservations and Hybrid Benefit coverage for maximum stacked savings

azure-nsg-firewall-auditor

3891
from openclaw/skills

Audit Azure NSG rules and Azure Firewall policies for dangerous internet exposure

azure-key-vault-auditor

3891
from openclaw/skills

Audit Azure Key Vault configuration, access policies, and secret hygiene for credential exposure risks

aws-idle-resource-detector

3891
from openclaw/skills

Detect AWS idle and zombie resources consuming cost with zero meaningful utilization

azure-entra-id-auditor

3891
from openclaw/skills

Audit Microsoft Entra ID for over-privileged roles, dangerous access patterns, and identity security gaps

azure-devtest-optimizer

3891
from openclaw/skills

Optimize Azure dev/test environment costs with auto-shutdown schedules and Dev/Test pricing enrollment

azure-defender-posture-reviewer

3891
from openclaw/skills

Interpret Microsoft Defender for Cloud Secure Score and generate a prioritized remediation roadmap

aws-cloudtrail-threat-detector

3891
from openclaw/skills

Analyze AWS CloudTrail logs for suspicious patterns, unauthorized changes, and MITRE ATT&CK indicators