Skip to content

Commit f450563

Browse files
committed
updateing based on issue
1 parent d4e6bae commit f450563

File tree

1 file changed

+5
-5
lines changed

1 file changed

+5
-5
lines changed

detections/cloud/azure_ad_multi_source_failed_authentications_spike.yml

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
name: Azure AD Multi-Source Failed Authentications Spike
22
id: 116e11a9-63ea-41eb-a66a-6a13bdc7d2c7
3-
version: 9
4-
date: '2025-05-02'
5-
author: Mauricio Velazco, Splunk
3+
version: 10
4+
date: '2025-09-17'
5+
author: Mauricio Velazco, Splunk, atgithub11, Github Community
66
status: production
77
type: Hunting
88
data_source:
@@ -16,14 +16,14 @@ description: The following analytic detects potential distributed password spray
1616
login attempts. If confirmed malicious, this could lead to unauthorized access,
1717
data breaches, privilege escalation, and lateral movement within the organization's
1818
infrastructure.
19-
search: '`azure_monitor_aad` category=SignInLogs properties.status.errorCode=50126 properties.authenticationDetails{}.succeeded=false
19+
search: '`azure_monitor_aad` category=*SignInLogs properties.status.errorCode=50126 properties.authenticationDetails{}.succeeded=false
2020
| rename properties.* as *
2121
| bucket span=5m _time
2222
| eval uniqueIPUserCombo = src_ip . "-" . user
2323
| rename userAgent as user_agent
2424
| fillnull
2525
| stats count min(_time) as firstTime max(_time) as lastTime dc(uniqueIPUserCombo) as uniqueIpUserCombinations, dc(user) as uniqueUsers, dc(src_ip) as uniqueIPs, dc(user_agent) as uniqueUserAgents, dc(location.countryOrRegion) as uniqueCountries values(location.countryOrRegion) as countries values(action) as action values(dest) as dest values(user) as user values(src) as src values(vendor_account) as vendor_account values(vendor_product) as vendor_product values(user_agent) as user_agent
26-
| where uniqueIpUserCombinations > 20 AND uniqueUsers > 20 AND uniqueIPs > 20 AND uniqueUserAgents = 1
26+
| where uniqueIpUserCombinations > 20 AND uniqueUsers > 20 AND uniqueIPs > 20 AND uniqueUserAgents >= 1
2727
| `security_content_ctime(firstTime)`
2828
| `security_content_ctime(lastTime)`
2929
| `azure_ad_multi_source_failed_authentications_spike_filter`'

0 commit comments

Comments
 (0)