M365 SharePoint Site Administrator Added
Identifies when a new SharePoint Site Administrator is added in Microsoft 365. Site Administrators have full control over SharePoint Sites, including the ability to manage permissions, access all content, and modify site settings. Adversaries who compromise a privileged account may add themselves or a controlled account as a Site Administrator to maintain persistent, high-privilege access to sensitive SharePoint data. This technique was notably observed in the 0mega ransomware campaign, where attackers elevated privileges to exfiltrate data and deploy ransom notes across SharePoint sites.
Elastic rule (View on GitHub)
1[metadata]
2creation_date = "2026/03/02"
3integration = ["o365"]
4maturity = "production"
5updated_date = "2026/03/02"
6
7[rule]
8author = ["Elastic", "Austin Songer"]
9description = """
10Identifies when a new SharePoint Site Administrator is added in Microsoft 365. Site Administrators
11have full control over SharePoint Sites, including the ability to manage permissions, access all content, and
12modify site settings. Adversaries who compromise a privileged account may add themselves or a controlled account as a
13Site Administrator to maintain persistent, high-privilege access to sensitive SharePoint data. This technique
14was notably observed in the 0mega ransomware campaign, where attackers elevated privileges to exfiltrate data and deploy
15ransom notes across SharePoint sites.
16"""
17false_positives = [
18 "Legitimate IT administrators adding Site admins as part of routine SharePoint site management.",
19 "Automated provisioning tools or scripts that assign Site admin roles during site creation workflows.",
20 "Organizational restructuring where site ownership is being transferred to new administrators.",
21]
22from = "now-9m"
23index = ["filebeat-*", "logs-o365.audit-*"]
24language = "kuery"
25license = "Elastic License v2"
26name = "M365 SharePoint Site Administrator Added"
27note = """## Triage and Analysis
28
29### Investigating M365 SharePoint Site Administrator Added
30
31Site Administrators in SharePoint Online have full control over a Site, including the ability to manage permissions, access all content, and configure site-level settings. Adversaries who gain access to a privileged account may assign Site Administrator rights to maintain persistent access or facilitate data exfiltration. The `SiteCollectionAdminAdded` audit event is logged when this privilege is granted.
32
33#### Possible Investigation Steps
34
35- Review the `user.id` field to determine who performed the action. Assess whether this user normally manages SharePoint site permissions.
36- Examine the `o365.audit.ModifiedProperties.SiteAdmin.NewValue` field to identify the account that was granted Site Administrator privileges.
37- Check the `o365.audit.SiteUrl` or `url.original` to determine which Site was targeted. Assess the sensitivity of the data stored in this site.
38- Review the `o365.audit.TargetUserOrGroupName` and `o365.audit.TargetUserOrGroupType` fields for additional context on the target principal.
39- Pivot to sign-in logs for the acting account to look for anomalies such as logins from unfamiliar locations, devices, or IP ranges.
40- Investigate whether the newly added admin account has performed subsequent actions such as file downloads, permission changes, or sharing link creation.
41- Check for other recent `SiteCollectionAdminAdded` events to determine if multiple Sites were targeted in a short time frame, which may indicate bulk privilege escalation.
42
43### False Positive Analysis
44
45- Routine SharePoint administration tasks by IT teams may trigger this alert. Correlate with change management tickets or scheduled maintenance windows.
46- Automated provisioning tools that assign Site admin roles during site creation or migration workflows may generate expected alerts.
47- Organizational changes such as team transitions or restructuring may involve legitimate Site admin reassignments.
48
49### Response and Remediation
50
51- If the admin addition is unauthorized, immediately remove the Site Administrator role from the suspicious account.
52- Reset credentials for both the account that performed the action and the account that was added, especially if compromise is suspected.
53- Review recent activity on the affected Site for signs of data exfiltration, permission changes, or content modifications.
54- Enable or verify enforcement of MFA for all accounts with SharePoint administrative privileges.
55- Audit the list of Site Administrators across all Sites to identify any other unauthorized additions.
56- Consider implementing Privileged Access Management (PAM) or Privileged Identity Management (PIM) to require just-in-time elevation for SharePoint admin roles.
57"""
58references = [
59 "https://learn.microsoft.com/en-us/purview/audit-log-activities#site-permissions-activities",
60 "https://www.obsidiansecurity.com/blog/saas-ransomware-observed-sharepoint-microsoft-365/",
61]
62risk_score = 47
63rule_id = "98ebd6a1-77db-4fe1-b4fd-1bd3c737b780"
64severity = "medium"
65tags = [
66 "Domain: Cloud",
67 "Domain: SaaS",
68 "Domain: Identity",
69 "Data Source: Microsoft 365",
70 "Data Source: Microsoft 365 Audit Logs",
71 "Use Case: Identity and Access Audit",
72 "Tactic: Privilege Escalation",
73 "Tactic: Persistence",
74 "Resources: Investigation Guide",
75]
76timestamp_override = "event.ingested"
77type = "query"
78
79query = '''
80event.dataset:o365.audit
81 and event.provider:(SharePoint or OneDrive)
82 and event.category:web
83 and event.action:SiteCollectionAdminAdded
84 and event.outcome:success
85'''
86
87
88[[rule.threat]]
89framework = "MITRE ATT&CK"
90[[rule.threat.technique]]
91id = "T1098"
92name = "Account Manipulation"
93reference = "https://attack.mitre.org/techniques/T1098/"
94[[rule.threat.technique.subtechnique]]
95id = "T1098.003"
96name = "Additional Cloud Roles"
97reference = "https://attack.mitre.org/techniques/T1098/003/"
98
99
100[rule.threat.tactic]
101id = "TA0004"
102name = "Privilege Escalation"
103reference = "https://attack.mitre.org/tactics/TA0004/"
104
105[[rule.threat]]
106framework = "MITRE ATT&CK"
107[[rule.threat.technique]]
108id = "T1098"
109name = "Account Manipulation"
110reference = "https://attack.mitre.org/techniques/T1098/"
111[[rule.threat.technique.subtechnique]]
112id = "T1098.003"
113name = "Additional Cloud Roles"
114reference = "https://attack.mitre.org/techniques/T1098/003/"
115
116
117[rule.threat.tactic]
118id = "TA0003"
119name = "Persistence"
120reference = "https://attack.mitre.org/tactics/TA0003/"
Triage and Analysis
Investigating M365 SharePoint Site Administrator Added
Site Administrators in SharePoint Online have full control over a Site, including the ability to manage permissions, access all content, and configure site-level settings. Adversaries who gain access to a privileged account may assign Site Administrator rights to maintain persistent access or facilitate data exfiltration. The SiteCollectionAdminAdded audit event is logged when this privilege is granted.
Possible Investigation Steps
- Review the
user.idfield to determine who performed the action. Assess whether this user normally manages SharePoint site permissions. - Examine the
o365.audit.ModifiedProperties.SiteAdmin.NewValuefield to identify the account that was granted Site Administrator privileges. - Check the
o365.audit.SiteUrlorurl.originalto determine which Site was targeted. Assess the sensitivity of the data stored in this site. - Review the
o365.audit.TargetUserOrGroupNameando365.audit.TargetUserOrGroupTypefields for additional context on the target principal. - Pivot to sign-in logs for the acting account to look for anomalies such as logins from unfamiliar locations, devices, or IP ranges.
- Investigate whether the newly added admin account has performed subsequent actions such as file downloads, permission changes, or sharing link creation.
- Check for other recent
SiteCollectionAdminAddedevents to determine if multiple Sites were targeted in a short time frame, which may indicate bulk privilege escalation.
False Positive Analysis
- Routine SharePoint administration tasks by IT teams may trigger this alert. Correlate with change management tickets or scheduled maintenance windows.
- Automated provisioning tools that assign Site admin roles during site creation or migration workflows may generate expected alerts.
- Organizational changes such as team transitions or restructuring may involve legitimate Site admin reassignments.
Response and Remediation
- If the admin addition is unauthorized, immediately remove the Site Administrator role from the suspicious account.
- Reset credentials for both the account that performed the action and the account that was added, especially if compromise is suspected.
- Review recent activity on the affected Site for signs of data exfiltration, permission changes, or content modifications.
- Enable or verify enforcement of MFA for all accounts with SharePoint administrative privileges.
- Audit the list of Site Administrators across all Sites to identify any other unauthorized additions.
- Consider implementing Privileged Access Management (PAM) or Privileged Identity Management (PIM) to require just-in-time elevation for SharePoint admin roles.
References
Related rules
- M365 Identity Global Administrator Role Assigned
- Entra ID Domain Federation Configuration Change
- Entra ID Federated Identity Credential Issuer Modified
- M365 Identity OAuth Flow by First-Party Microsoft App from Multiple IPs
- M365 Identity OAuth Phishing via First-Party Microsoft Application