← Back to SOC feed Coverage →

GitHub OAuth App Restrictions Disabled

kql MEDIUM Azure-Sentinel
T1505T1562
huntingmicrosoftofficial
This rule was pulled from an open-source repository and enriched with AI. Validate in a test environment before deploying to production.
View original rule at Azure-Sentinel →
Retrieved: 2026-04-24T09:00:00Z · Confidence: medium

Hunt Hypothesis

Adversaries may disable GitHub OAuth App restrictions to bypass security controls and maintain persistent access within an organization’s infrastructure. SOC teams should proactively hunt for this behavior in Azure Sentinel to identify potential compromise and mitigate lateral movement risks.

KQL Query


GitHubAudit
| where Action == "org.disable_oauth_app_restrictions"
| project TimeGenerated, Action, Actor, Country

Analytic Rule Definition

id: 667e6a70-adc9-49b7-9cf3-f21927c71959
name: GitHub OAuth App Restrictions Disabled
description: |
  'This hunting query identifies GitHub OAuth Apps that have restrictions disabled that may be a sign of compromise. Attacker will want to disable such security tools in order to go undetected. '
requiredDataConnectors: []
tactics:
  - Persistence
  - DefenseEvasion
relevantTechniques:
  - T1505
  - T1562
query: |

  GitHubAudit
  | where Action == "org.disable_oauth_app_restrictions"
  | project TimeGenerated, Action, Actor, Country

MITRE ATT&CK Context

References

False Positive Guidance

Original source: https://github.com/Azure/Azure-Sentinel/blob/main/Hunting Queries/GitHub/Oauth App Restrictions Disabled.yaml