
Summary
This detection rule identifies sign-in attempts from IP addresses that have been identified as infected with malware. Specifically, it targets those IPs that are associated with bot activity, which suggests that these sign-ins could be compromised and part of a wider malicious network operation. The rule relies on Azure's risk detection capabilities and monitors events categorized as 'malwareInfectedIPAddress'. With the rising prevalence of automated attacks and credentials being compromised through such malicious networks, this rule provides an essential layer of security by flagging potentially dangerous access attempts. It helps organizations proactively protect their systems from unauthorized access that could lead to data breaches. However, it is crucial to consider the potential for false positives, as multiple legitimate users may route their traffic through shared IP addresses that are flagged due to prior malicious activities.
Categories
- Cloud
- Identity Management
Data Sources
- User Account
- Network Traffic
Created: 2023-09-03