heroui logo

O365 Excessive Authentication Failures Alert

Splunk Security Content

View Source
Summary
The O365 Excessive Authentication Failures Alert rule is designed to detect potential brute force attacks or account compromise attempts through analysis of excessive failed authentication attempts within the Office 365 environment. This rule leverages the `o365_management_activity` dataset, filtering for events indicating failed authentication statuses, particularly for those with multiple failed attempts against multi-factor authentication (MFA) prompts. When a user exhibits more than 10 authentication failures, an alert is triggered. This is an important capability as it provides a warning of potential malicious activity that could lead to unauthorized access or data breaches if the attempts are determined to be part of an attack. The implementation requires the Microsoft Office 365 add-on for Splunk, ensuring proper data ingestion and search functionalities needed to enforce this detection rule efficiently. Users can also drill down into specific incidents for deeper investigation, including viewing detailed risk events associated with the affected user over the past week.
Categories
  • Cloud
  • Identity Management
  • Infrastructure
Data Sources
  • User Account
  • Application Log
  • Cloud Service
ATT&CK Techniques
  • T1110
Created: 2024-11-14