heroui logo

Azure AD Successful Single-Factor Authentication

Splunk Security Content

View Source
Summary
This analytic rule is designed to detect successful single-factor authentication events within Azure Active Directory. By examining the SignInLogs data, the rule identifies instances where users have logged in successfully without using multi-factor authentication (MFA). Given the importance of MFA in securing user accounts, instances of successful single-factor authentication may signal a potential misconfiguration, policy breach, or even account takeover attempts. Such unauthorized access could compromise sensitive data and lead to privilege escalation or exploitation within organizational environments. The detection is implemented using the Azure SignInLogs, filtering for successful authentications while providing the ability to track the number of occurrences, the timeframe of the events, and specific details about the user and source IP. If allowed, certain users may have legitimate reasons for not requiring MFA; however, this could increase their exposure to risks. This rule requires certain prerequisites to be met in the Splunk environment for full functionality.
Categories
  • Cloud
  • Identity Management
Data Sources
  • Cloud Service
  • User Account
ATT&CK Techniques
  • T1078
  • T1586
  • T1586.003
  • T1078.004
Created: 2024-11-14