heroui logo

Azure Microsoft Graph Single Session from Multiple IP Addresses

Panther Rules

View Source
Summary
The detection rule 'Azure Microsoft Graph Single Session from Multiple IP Addresses' identifies potential security incidents related to user authentication through Microsoft Entra ID when a single session ID is accessed from multiple IP addresses. This could indicate various malicious activities, such as OAuth application abuse, session hijacking, or adversarial attacks where attackers leverage obtained session tokens to access resources unlawfully. By monitoring the Azure Audit logs, the rule checks for instances where the same session ID is used from different IP addresses, suggesting that a user may have had their session token compromised. The provided runbook offers steps to analyze suspicious behaviors, including reviewing geographic locations of IP addresses, as well as examining historic logs for any abnormal OAuth consent grants or application behaviors. The severity of this detection is marked as medium, underscoring its importance in protecting user accounts from unauthorized access in cloud environments.
Categories
  • Cloud
  • Azure
  • Identity Management
Data Sources
  • User Account
  • Application Log
  • Cloud Service
  • Logon Session
ATT&CK Techniques
  • T1078
  • T1078.004
  • T1550
  • T1550.001
Created: 2026-01-31