Azure activity log alerts monitor deletions of Security Solutions by targeting the operation Microsoft.Security/securitySolutions/delete at subscription scope.
Identifies whether notifications are configured for security solution removal events.
Risk
Without this alert, unauthorized or accidental deletions of security tooling may go unnoticed, reducing the availability of protections and the integrity of monitoring. Adversaries can evade defenses, prolong dwell time, and enable data exfiltration under reduced visibility.
prowler azure --checks monitor_alert_delete_security_solution
Recommendation
Configure a dedicated activity log alert for Microsoft.Security/securitySolutions/delete and route it to resilient action groups (email, chat, ticketing, SIEM). Apply least privilege and resource locks to deter tampering. Test alerting routinely and integrate it into defense-in-depth monitoring.
Remediation
az monitor activity-log alert create -g <example_resource_name> -n <example_resource_name> --condition operationName=Microsoft.Security/securitySolutions/delete --scope /subscriptions/<example_resource_id>
- In Azure portal, go to Monitor > Alerts > + Create > Alert rule
- Scope: Select your subscription and click Apply
- Condition: Click Add condition, search and select "Delete Security Solutions (Microsoft.Security/securitySolutions)", then Add
- Ensure no filters for Level or Status are set
- Details: Enter an Alert rule name and choose a resource group
- Create: Review + create, then Create
Source Code
Resource Type
microsoft.insights/activitylogalerts
References
- https://www.trendmicro.com/cloudoneconformity/knowledge-base/azure/ActivityLog/delete-security-solution-alert.html
- https://learn.microsoft.com/en-in/azure/azure-monitor/alerts/alerts-create-activity-log-alert-rule?tabs=activity-log
- https://learn.microsoft.com/en-us/cli/azure/monitor/activity-log/alert?view=azure-cli-latest
- https://azure.microsoft.com/en-us/updates/classic-alerting-monitoring-retirement