
Summary
The rule "Microsoft Entra ID User Reported Suspicious Activity" is designed to detect reported suspicious activities by users in Microsoft Entra ID, such as account compromises or unauthorized access attempts. This detection focuses on activities that occur during authentication processes like password resets or multi-factor authentication challenges. Users often report these incidents when they experience unrecognized login attempts or respond to unsolicited MFA prompts. This rule identifies relevant logs from Azure activity, highlighting specific conditions under which reports are generated, particularly involving the 'Suspicious Activity Reported' action, ensuring prompt investigation into potentially adversarial behaviors. Investigative steps include analyzing user logs, confirming user actions, and reviewing recent sign-in activities to determine possible compromise while considering false positives that may arise from legitimate authentication actions. If validated, the response includes credential resets and session checks to address any potential breaches.
Categories
- Cloud
- Identity Management
Data Sources
- User Account
- Application Log
- Cloud Service
- Network Traffic
ATT&CK Techniques
- T1078
Created: 2025-05-21