-
Notifications
You must be signed in to change notification settings - Fork 529
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Rule Tuning] Add exceptions for non-interactive signin failures for Entra M365 Bruteforce #4405
base: main
Are you sure you want to change the base?
Conversation
Include exceptions for error codes, restricted to `NonInteractiveUserSignInLogs` and token refreshes: - 70043 : Refresh token expired or no longer valid due to conditional access frequency checks - 70044 : Session expired or no longer valid due to conditional access frequency checks - 50057 : User account is disabled
Rule: Tuning - GuidelinesThese guidelines serve as a reminder set of considerations when tuning an existing rule. Documentation and Context
Rule Metadata Checks
Testing and Validation
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thank you for the exceptions @jvalente-salemstate !
@terrancedejesus it looks like the conflict in this merge is just the last update date due to #4358 being merged in between this PR and the last change to the rule. Is this something I should fix (with a more recent date?) or should this be done by someone who can do the merge? |
@jvalente-salemstate - fixed it for ya. Just updated to today's date. Once done, you should be good to merge! |
Include exceptions for error codes, restricted to
NonInteractiveUserSignInLogs
and token refreshes:Failures in the first two cases are the result of logins that were both successful and have passed an applicable Conditional Access policy. The third code simply avoids alerts from an account that's been disabled but still is seeing noninteractive sign-in attempts.
There is a possibility of false negatives in the cases of (invalidated) token theft, but this is neither true case of "brute force", and a detection rule specifically for token theft would be better suited for this.
Pull Request
Issue link(s):
Summary - What I changed
To exclude non-interactive signins for a token refresh, I've modified the query to include
Contributor checklist