
Summary
This detection rule focuses on monitoring changes to the Multi-Factor Authentication (MFA) setting for user accounts within Azure environments. Specifically, it detects when the `StrongAuthenticationRequirement` property is modified to a state that indicates MFA has been disabled (i.e., set to `0` or `Disabled`). Disabling MFA poses a significant security risk as it allows threat actors to bypass an essential layer of account protection, often used in various attack methods, including SIM swap attacks. By correlating logs from Azure's audit logs, this rule detects potentially malicious actions that may compromise user accounts. Organizations should proactively monitor and respond to notifications triggered by this rule to mitigate unauthorized access risks effectively.
Categories
- Cloud
- Azure
- Identity Management
Data Sources
- User Account
- Application Log
Created: 2024-08-21