heroui logo

Account Disabled or Blocked for Sign in Attempts

Sigma Rules

View Source
Summary
This rule is designed to detect instances where a user account that has been disabled or blocked attempts to sign in. Specifically, it looks for log entries that have a result type of '50057', which indicates that the account is not allowed to sign in due to being disabled or blocked. The detection is primarily based on IT environments using Azure's signin logs as the data source. The identification of these events is important as it can indicate potential security concerns, such as unauthorized attempts to access an account that should be inactive or swiftly detecting misconfigurations that could affect user functionality. The rule captures this behavior effectively and flags it with a medium severity level, allowing administrators to respond appropriately. It acknowledges typical false positives such as accounts being erroneously disabled or accounts meant for automation being blocked, which can occur during regular administrative actions. Overall, implementing this detection can enhance security posture by ensuring that disabled accounts are not exploited for unauthorized access.
Categories
  • Identity Management
  • Cloud
  • Azure
Data Sources
  • User Account
  • Logon Session
  • Application Log
Created: 2022-06-17