You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: rules/integrations/azure/persistence_entra_id_rt_to_prt_transition_from_user_device.toml
+10-5Lines changed: 10 additions & 5 deletions
Original file line number
Diff line number
Diff line change
@@ -2,13 +2,13 @@
2
2
creation_date = "2025/06/24"
3
3
integration = ["azure"]
4
4
maturity = "production"
5
-
updated_date = "2025/12/10"
5
+
updated_date = "2025/12/15"
6
6
7
7
[rule]
8
8
author = ["Elastic"]
9
9
description = """
10
10
Identifies when a user signs in with a refresh token using the Microsoft Authentication Broker (MAB) client, followed by
11
-
a Primary Refresh Token (PRT) sign-in from the same device within 1 hour. This pattern may indicate that an attacker has
11
+
a Primary Refresh Token (PRT) sign-in from the same device within 1 hour from an unmanaged device. This pattern may indicate that an attacker has
12
12
successfully registered a device using ROADtx and transitioned from short-term token access to long-term persistent
13
13
access via PRTs. Excluding access to the Device Registration Service (DRS) ensures the PRT is being used beyond
14
14
registration, often to access Microsoft 365 resources like Outlook or SharePoint.
@@ -18,10 +18,10 @@ index = ["filebeat-*", "logs-azure.signinlogs-*"]
18
18
interval = "30m"
19
19
language = "eql"
20
20
license = "Elastic License v2"
21
-
name = "Entra ID OAuth Primary Refresh Token (PRT) Issuance via Refresh Token (RT) Detected"
21
+
name = "Entra ID OAuth PRT Issuance to Non-Managed Device Detected"
22
22
note = """## Triage and analysis
23
23
24
-
### Investigating Entra ID OAuth Primary Refresh Token (PRT) Issuance via Refresh Token (RT) Detected
24
+
### Investigating Entra ID OAuth PRT Issuance to Non-Managed Device Detected
25
25
26
26
This rule identifies a sequence where a Microsoft Entra ID user signs in using a refresh token issued to the Microsoft Authentication Broker (MAB), followed by a sign-in using a Primary Refresh Token (PRT) from the same device. This behavior is uncommon for normal user activity and strongly suggests adversarial behavior, particularly when paired with OAuth phishing and device registration tools like ROADtx. The use of PRT shortly after a refresh token sign-in typically indicates the attacker has obtained device trust and is now using the PRT to impersonate a fully compliant user+device pair.
27
27
@@ -83,7 +83,12 @@ sequence by azure.signinlogs.properties.user_id, azure.signinlogs.properties.dev
83
83
event.dataset == "azure.signinlogs" and
84
84
azure.signinlogs.properties.incoming_token_type == "primaryRefreshToken" and
85
85
azure.signinlogs.properties.resource_display_name != "Device Registration Service" and
86
-
azure.signinlogs.result_signature == "SUCCESS"
86
+
azure.signinlogs.result_signature == "SUCCESS" and
0 commit comments