Skip to content

Commit 5b94878

Browse files
Update rules/integrations/o365/credential_access_entra_id_potential_user_account_brute_force.toml
Co-authored-by: Isai <[email protected]>
1 parent dccab85 commit 5b94878

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

rules/integrations/o365/credential_access_entra_id_potential_user_account_brute_force.toml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ license = "Elastic License v2"
2424
name = "M365 Identity User Brute Force Attempt"
2525
note = """## Triage and Analysis
2626
27-
### Investigating M365 Identity User Brute Force Attempt
27+
### Investigating M365 Identity User Brute Force Attempted
2828
2929
Identifies brute-force authentication activity targeting Microsoft 365 user accounts using failed sign-in patterns that match password spraying, credential stuffing, or password guessing behavior. Adversaries may attempt brute-force authentication with credentials obtained from previous breaches, leaks, marketplaces or guessable passwords.
3030

0 commit comments

Comments
 (0)