[Rule Tuning] Azure Entra Sign-in Brute Force against Microsoft 365 Accounts #4404
Labels
community
Domain: SaaS
Integration: Azure
azure related rules
Integration: Microsoft 365
Rule: Tuning
tweaking or tuning an existing rule
Team: TRADE
Link to Rule
https://github.com/elastic/detection-rules/blob/main/rules/integrations/azure/credential_access_entra_signin_brute_force_microsoft_365.toml
Rule Tuning Type
False Positives - Reducing benign events mistakenly identified as threats.
Description
We have found that non-interactive signins with expired or invalid tokens are generating a volume of false positives.
Generally, these reflect tokens/sessions that are/were successful logins, passing conditional access. If the token/session is invalid or expires due to CA frequency check, this will log as a failure. There may be cases where this indicates token theft (of a, since, invalidated token) but these would be better identified in a search for token theft, rather than brute force.
The following
azure.signinlogs.properties.status.error_code
are our highest volume offenders and make up the majority of the generated alerts.Example Data
The text was updated successfully, but these errors were encountered: