heroui logo

Azure AD New MFA Method Registered For User

Splunk Security Content

View Source
Summary
This analytic rule detects when a new Multi-Factor Authentication (MFA) method is registered for a user in Azure Active Directory (Azure AD) by monitoring the AuditLogs for specific operations. This detection is crucial as attackers who gain unauthorized access to a user’s account can add their own MFA method, allowing them to bypass security controls and maintain persistent access. The rule analyzes events categorized under 'User registered security info' to identify any additions to security information for user accounts. If any such activity is identified outside expected behavior patterns (like newly onboarded users), it could signify a potential security breach and should be investigated to prevent any unauthorized access or privilege escalation.
Categories
  • Cloud
  • Azure
  • Identity Management
Data Sources
  • User Account
  • Cloud Service
ATT&CK Techniques
  • T1556
  • T1556.006
Created: 2024-11-14