Skip to content

Commit d9e1183

Browse files
authored
minor update
1 parent 51ba4b9 commit d9e1183

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

detections/cloud/o365_excessive_os_vendors_authenticating_from_user.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ status: production
77
type: TTP
88
description: The following analytic identifies when multiple operating systems are used to authenticate to Azure/EntraID/Office 365 by the same user account over a short period of time. This activity could be indicative of attackers enumerating various logon capabilities of Azure/EntraID/Office 365 and attempting to discover weaknesses in the organizational MFA or conditional access configurations. Usage of the tools like "MFASweep" will trigger this detection.
99
data_source:
10-
- Office 365 Universal Audit Log
10+
- O365
1111
search: '`o365_management_activity` Operation IN (UserLoginFailed,UserLoggedIn)
1212
| eval -time = _time
1313
| bin _time span=15m
@@ -50,7 +50,7 @@ tags:
5050
- name: src
5151
type: IP Address
5252
role:
53-
- Victim
53+
- Attacker
5454
- name: user
5555
type: User
5656
role:

0 commit comments

Comments
 (0)