Sentinel Queries
This project provides a series of KQL queries to detect abuse behaviors related to the BloodHound BARK toolkit in Azure AD tenants. These queries aim to identify behaviors simulated by BARK rather than the use of the tool itself. The content includes detection queries for different BARK functions, control suggestions, and relevant resource links.
rating : 2 points
downloads : 14
What is BARK Detection?
These detection queries help identify suspicious activities in Azure AD that could indicate privilege escalation attempts, similar to what the BARK toolkit can perform. They monitor for actions like password resets, credential additions, role assignments and other sensitive operations.How to Use These Detections?
The queries should be run in Microsoft Sentinel or Log Analytics against your Azure AD logs. It's recommended to first test them in your environment to tune for accuracy.When to Use These Detections?
Use these queries for continuous monitoring of your Azure AD environment, especially if you have privileged users/service principals or want to detect potential compromise.Key Detection Capabilities
Password Reset DetectionIdentifies password reset operations performed via PowerShell which could indicate compromise.
Application Secret CreationDetects when new credentials are added to application objects.
Role Assignment MonitoringTracks when users or service principals are added to privileged roles.
Ownership ChangesMonitors for changes to owners of applications and service principals.
Strengths and Limitations
Strengths
Provides visibility into potential privilege escalation paths
Covers both user and service principal activities
Uses native Azure AD logs requiring no additional instrumentation
Helps detect abuse of legitimate tools and permissions
Limitations
May generate false positives in environments with legitimate automation
Requires tuning to match your specific environment
Only detects actions after they occur (not preventive)
Some legitimate admin activities may appear similar to malicious ones
Implementation Guide
Set up logging
Ensure Azure AD logs are being collected in your Log Analytics workspace.
Test queries
Run the detection queries against your environment to establish baselines.
Create alerts
Configure alerts for suspicious activities in Microsoft Sentinel.
Implement controls
Apply the recommended prevention controls from the documentation.
Detection Scenarios
Detecting Application Secret CreationMonitoring when new credentials are added to applications, which could allow attackers to persist in the environment.
Identifying Suspicious Role AssignmentsDetecting when service principals are added to privileged roles, which could indicate privilege escalation.
Frequently Asked Questions
Are these queries specific to the BARK toolkit?
How often should I run these detection queries?
What permissions do I need to use these detections?
How can I reduce false positives?
Additional Resources
BloodHound BARK GitHub
The official BARK toolkit repository
Azure AD Privilege Escalation Detection
Blog post on detecting Azure AD privilege escalation
Microsoft Azure AD Documentation
Official Microsoft documentation for Azure Active Directory
Featured MCP Services

Gitlab MCP Server
Certified
The GitLab MCP server is a project based on the Model Context Protocol that provides a comprehensive toolset for interacting with GitLab accounts, including code review, merge request management, CI/CD configuration, and other functions.
TypeScript
85
4.3 points

Notion Api MCP
Certified
A Python-based MCP Server that provides advanced to-do list management and content organization functions through the Notion API, enabling seamless integration between AI models and Notion.
Python
140
4.5 points

Markdownify MCP
Markdownify is a multi-functional file conversion service that supports converting multiple formats such as PDFs, images, audio, and web page content into Markdown format.
TypeScript
1.7K
5 points

Duckduckgo MCP Server
Certified
The DuckDuckGo Search MCP Server provides web search and content scraping services for LLMs such as Claude.
Python
829
4.3 points

Figma Context MCP
Framelink Figma MCP Server is a server that provides access to Figma design data for AI programming tools (such as Cursor). By simplifying the Figma API response, it helps AI more accurately achieve one - click conversion from design to code.
TypeScript
6.7K
4.5 points

Unity
Certified
UnityMCP is a Unity editor plugin that implements the Model Context Protocol (MCP), providing seamless integration between Unity and AI assistants, including real - time state monitoring, remote command execution, and log functions.
C#
564
5 points

Gmail MCP Server
A Gmail automatic authentication MCP server designed for Claude Desktop, supporting Gmail management through natural language interaction, including complete functions such as sending emails, label management, and batch operations.
TypeScript
282
4.5 points

Minimax MCP Server
The MiniMax Model Context Protocol (MCP) is an official server that supports interaction with powerful text-to-speech, video/image generation APIs, and is suitable for various client tools such as Claude Desktop and Cursor.
Python
753
4.8 points