
Summary
The detection rule titled 'Azure AD High Number Of Failed Authentications For User' is designed to monitor Azure Active Directory (Azure AD) accounts for an unusually high number of failed login attempts, specifically targeting scenarios that may indicate a brute force attack. This rule triggers when an account experiences more than 20 failed authentication attempts in a 10-minute span, utilizing the Azure SignInLogs. It specifically looks for error code 50126, which denotes failed authentication events. If such activity is confirmed, it may put the account at risk of unauthorized access, potentially leading to data breaches or further exploitation within an organization's environment. Security teams can tailor the threshold of detection to suit the unique characteristics of their user base to minimize false positives, especially in environments where legitimate high-volume login failures may occur due to misconfigurations or broken applications.
Categories
- Cloud
- Identity Management
- Azure
Data Sources
- Cloud Service
- Active Directory
ATT&CK Techniques
- T1110
- T1110.001
Created: 2024-11-14