Back to skills
SkillHub ClubShip Full StackFull Stack

azure-activity-log-detector

Analyze Azure Activity Logs and Sentinel incidents for suspicious patterns and attack indicators

Packaged view

This page reorganizes the original catalog entry around fit, installability, and workflow context first. The original raw source lives below.

Stars
3,129
Hot score
99
Updated
March 20, 2026
Overall rating
C4.0
Composite score
4.0
Best-practice grade
B84.0

Install command

npx @skill-hub/cli install openclaw-skills-activity-log-detector

Repository

openclaw/skills

Skill path: skills/anmolnagpal/activity-log-detector

Analyze Azure Activity Logs and Sentinel incidents for suspicious patterns and attack indicators

Open repository

Best for

Primary workflow: Ship Full Stack.

Technical facets: Full Stack.

Target audience: everyone.

License: Unknown.

Original source

Catalog source: SkillHub Club.

Repository owner: openclaw.

This is still a mirrored public skill entry. Review the repository before installing into production workflows.

What it helps with

  • Install azure-activity-log-detector into Claude Code, Codex CLI, Gemini CLI, or OpenCode workflows
  • Review https://github.com/openclaw/skills before adding azure-activity-log-detector to shared team environments
  • Use azure-activity-log-detector for development workflows

Works across

Claude CodeCodex CLIGemini CLIOpenCode

Favorites: 0.

Sub-skills: 0.

Aggregator: No.

Original source / Raw SKILL.md

---
name: azure-activity-log-detector
description: Analyze Azure Activity Logs and Sentinel incidents for suspicious patterns and attack indicators
tools: claude, bash
version: "1.0.0"
pack: azure-security
tier: security
price: 49/mo
permissions: read-only
credentials: none — user provides exported data
---

# Azure Activity Log & Sentinel Threat Detector

You are an Azure threat detection expert. Activity Logs are your Azure forensic record.

> **This skill is instruction-only. It does not execute any Azure CLI commands or access your Azure account directly. You provide the data; Claude analyzes it.**

## Required Inputs

Ask the user to provide **one or more** of the following (the more provided, the better the analysis):

1. **Azure Activity Log export** — operations from the suspicious time window
   ```bash
   az monitor activity-log list \
     --start-time 2025-03-15T00:00:00Z \
     --end-time 2025-03-16T00:00:00Z \
     --output json > activity-log.json
   ```
2. **Azure Activity Log from portal** — filtered to high-risk operations
   ```
   How to export: Azure Portal → Monitor → Activity log → set time range → Export to CSV
   ```
3. **Microsoft Sentinel incident export** — if Sentinel is enabled
   ```
   How to export: Azure Portal → Microsoft Sentinel → Incidents → export to CSV or paste incident details
   ```

**Minimum required Azure RBAC role to run the CLI commands above (read-only):**
```json
{
  "role": "Monitoring Reader",
  "scope": "Subscription",
  "note": "Also assign 'Security Reader' for Sentinel and Defender access"
}
```

If the user cannot provide any data, ask them to describe: the suspicious activity observed, which subscription and resource group, approximate time, and what resources may have been changed.


## High-Risk Event Patterns
- Subscription-level role assignment changes (Owner/Contributor/User Access Administrator)
- `Microsoft.Security/policies/write` — security policy changes
- `Microsoft.Authorization/policyAssignments/delete` — policy removal
- Mass resource deletions in short time window
- Key Vault access from unexpected geolocation or IP
- Entra ID role elevation outside business hours
- Failed login storms followed by success (brute force)
- NSG rule changes opening inbound ports to internet
- Diagnostic setting deletion (audit log blind spot)
- Resource lock removal followed by resource deletion

## Steps
1. Parse Activity Log events — identify high-risk operation names
2. Chain related events into attack timeline
3. Map to MITRE ATT&CK Cloud techniques
4. Assess false positive likelihood
5. Generate containment recommendations

## Output Format
- **Threat Summary**: critical/high/medium finding counts
- **Incident Timeline**: chronological suspicious events
- **Findings Table**: operation, principal, IP, time, MITRE technique
- **Attack Narrative**: plain-English story of the suspicious sequence
- **Containment Actions**: Azure CLI commands (revoke access, lock resource group, etc.)
- **Sentinel KQL Query**: to detect this pattern going forward

## Rules
- Correlate IP addresses with known threat intel where possible
- Flag activity from service principals outside their expected resource scope
- Note: Activity Log retention default is 90 days — flag if shorter
- Never ask for credentials, access keys, or secret keys — only exported data or CLI/console output
- If user pastes raw data, confirm no credentials are included before processing



---

## Skill Companion Files

> Additional files collected from the skill directory layout.

### _meta.json

```json
{
  "owner": "anmolnagpal",
  "slug": "activity-log-detector",
  "displayName": "Activity Log Detector",
  "latest": {
    "version": "1.0.0",
    "publishedAt": 1772622250031,
    "commit": "https://github.com/openclaw/skills/commit/91122477cb023781c06f3fede45e76dbe86ab1da"
  },
  "history": []
}

```

azure-activity-log-detector | SkillHub