
Summary
The O365 Excessive SSO Logon Errors analytic is designed to detect accounts that encounter a significant number of Single Sign-On (SSO) login failures. Leveraging the `o365_management_activity` dataset, it filters for `UserLoginFailed` operations that contain SSO-specific logon errors. This behavior could suggest attempts at brute-force attacks or the unauthorized use of SSO tokens, potentially leading to security incidents such as unauthorized access, data breaches, and privilege escalation within an organization's Azure Active Directory. The rule counts the failed attempts per user and alerts when an account has at least five failed SSO logon attempts. Implementing this rule requires the installation of the Splunk Microsoft Office 365 add-on, ensuring it processes the relevant dataset accurately. Although benign logon errors could occur due to legitimate reasons, frequent failures may warrant further investigation to rule out credential stuffing or token reuse attacks.
Categories
- Cloud
- AWS
- Identity Management
- Infrastructure
Data Sources
- Pod
- Container
- User Account
- Cloud Service
ATT&CK Techniques
- T1556
Created: 2024-11-14