heroui logo

Password Reset By User Account

Sigma Rules

View Source
Summary
This detection rule aims to monitor and alert on instances where a user has successfully reset their password within Azure Active Directory (AD). By focusing on the event category 'UserManagement' where the status is 'Success' and initiated by a User Principal Name (UPN), the rule captures legitimate password reset actions. The filter further refines the detection by checking if the target includes the UPN and if the activity type specifies 'Password reset'. This helps differentiate between authorized user actions and potential unauthorized access attempts. False positives can occur in scenarios where the password reset was approved by a system administrator or performed upon user request, thereby requiring scrutiny of the context around such events. Implementing this rule is essential for organizations to ensure user account security and respond promptly to potential credential access or persistence attacks.
Categories
  • Cloud
  • Identity Management
Data Sources
  • User Account
  • Logon Session
  • Active Directory
Created: 2022-08-03