Skip to content

Commit 33e0b91

Browse files
Update rules/integrations/azure/credential_access_entra_id_signin_brute_force_microsoft_365.toml
Co-authored-by: Isai <[email protected]>
1 parent 7a6cf5e commit 33e0b91

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

rules/integrations/azure/credential_access_entra_id_signin_brute_force_microsoft_365.toml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ license = "Elastic License v2"
2626
name = "Entra ID Sign-in Brute Force Attempt (Microsoft 365)"
2727
note = """## Triage and analysis
2828
29-
### Investigating Entra ID Sign-in Brute Force Attempt (Microsoft 365)
29+
### Investigating Entra ID Sign-in Brute Force Attempted (Microsoft 365)
3030
3131
Identifies brute-force authentication activity against Microsoft 365 services using Entra ID sign-in logs. This detection groups and classifies failed sign-in attempts based on behavior indicative of password spraying, credential stuffing, or password guessing. The classification (`bf_type`) is included for immediate triage.
3232

0 commit comments

Comments
 (0)