
Summary
The rule 'Azure Protection Multiple Alerts for User' detects potentially compromised user accounts based on the triggering of multiple Microsoft Entra ID Protection risk alerts in a short timeframe. This rule leverages the machine learning capabilities of Entra ID Protection to identify risky sign-in behaviors, including the use of anonymous IPs, unusual travel patterns, malware-associated IP addresses, and signs of credential stuffing attacks (password spraying) among other suspicious activities. The alerts aim to signal ongoing attacks or account compromises that require immediate investigation and response.
In the event of an alert, analysts are instructed to query the Azure.Audit logs for sign-in events associated with the affected user account over the past hour. They must assess various risk event properties including risk types, IP addresses used, geographical locations, and user agent information. If a pattern indicating a compromised account is found (e.g., multiple diverse risk indicators), prompt remediation actions such as account disablement, enforced password resets, and user verification are recommended to mitigate the threat. The structured approach of querying logs, assessing risk details, and considering the circumstantial context enhances the detection specificity and remedial effectiveness.
Categories
- Cloud
- Identity Management
Data Sources
- User Account
- Cloud Service
- Logon Session
- Application Log
ATT&CK Techniques
- T1078
- T1078.004
Created: 2026-01-31