Managed Sentinel – Alert 109
| Alert ID | MS-A109 |
| Alert Name | Tracking Privileged Account Rare Activity |
| Description | This query will determine rare activity by a high-value account carried out on a system or service. Rare here means an activity type seen in the last day which has not been seen in the previous 7 days. If any account with such rare activity is found, the query will attempt to retrieve related activity from that account on that same day and summarize the information. Source: Github - Microsoft |
| Severity Level | Informational |
| Threat Indicator | Unauthorized Access |
| MITRE ATT&CK Tactics | Privilege Escalation Discovery |
| Log sources | Windows Security Event Logs Unix |
| False Positives | Service account activity |
| Recommendations | Investigate account activity across entire network using Sentinel. |
