You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: Solutions/Microsoft Entra ID/Analytic Rules/MFARejectedbyUser.yaml
+14-13Lines changed: 14 additions & 13 deletions
Original file line number
Diff line number
Diff line change
@@ -3,7 +3,8 @@ name: MFA Rejected by User
3
3
description: |
4
4
'Identifies occurances where a user has rejected an MFA prompt. This could be an indicator that a threat actor has compromised the username and password of this user account and is using it to try and log into the account.
This query has also been updated to include UEBA logs IdentityInfo and BehaviorAnalytics for contextual information around the results.'
6
+
This query has also been updated to include UEBA logs IdentityInfo and BehaviorAnalytics for contextual information around the results.
7
+
Please note, MFA Failed logons from known IP ranges can be benign depending on the conditional access policies. In case of noisy behavior, consider tuning the source IP ranges or location filter after careful consideration'
7
8
severity: Medium
8
9
requiredDataConnectors:
9
10
- connectorId: AzureActiveDirectory
@@ -27,13 +28,13 @@ relevantTechniques:
27
28
tags:
28
29
- AADSecOpsGuide
29
30
query: |
30
-
let riskScoreCutoff = 20; //Adjust this based on volume of results
31
+
let riskScoreCutoff = 3; //Adjust this score threshold based on volume of results. Activities identified as the most abnormal receive the highest scores (on a scale of 0-10)
Copy file name to clipboardExpand all lines: Solutions/Microsoft Entra ID/Package/createUiDefinition.json
+1-1Lines changed: 1 addition & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -600,7 +600,7 @@
600
600
"name": "analytic32-text",
601
601
"type": "Microsoft.Common.TextBlock",
602
602
"options": {
603
-
"text": "Identifies occurances where a user has rejected an MFA prompt. This could be an indicator that a threat actor has compromised the username and password of this user account and is using it to try and log into the account.\nRef : https://docs.microsoft.com/azure/active-directory/fundamentals/security-operations-user-accounts#monitoring-for-failed-unusual-sign-ins\nThis query has also been updated to include UEBA logs IdentityInfo and BehaviorAnalytics for contextual information around the results."
603
+
"text": "Identifies occurances where a user has rejected an MFA prompt. This could be an indicator that a threat actor has compromised the username and password of this user account and is using it to try and log into the account.\nRef : https://docs.microsoft.com/azure/active-directory/fundamentals/security-operations-user-accounts#monitoring-for-failed-unusual-sign-ins\nThis query has also been updated to include UEBA logs IdentityInfo and BehaviorAnalytics for contextual information around the results.\nPlease note, MFA Failed logons from known IP ranges can be benign depending on the conditional access policies. In case of noisy behavior, consider tuning the source IP ranges or location filter after careful consideration"
0 commit comments