heroui logo

Azure MFA Disabled

Panther Rules

View Source
Summary
The Azure MFA Disabled rule is designed to monitor and alert when Multi-Factor Authentication (MFA) is disabled through conditional access policies within Azure Active Directory. The detection rule focuses specifically on audit logs generated by Azure when conditional access policies were altered. The implementation of MFA is critical for enhancing security by adding an extra layer of protection for user accounts, and any unauthorized changes to disable MFA could greatly increase the risk of account compromise. The rule checks for specific operations related to policy updates, indicating when conditions in a policy are modified in such a way that MFA is effectively turned off for users, which is confirmed by the logs indicating a successful policy update and the expected outcome of MFA being disabled. The investigation process suggests that if unauthorized changes are observed, the MFA should be re-enabled and access rights should be reviewed to mitigate potential security threats. It is imperative to review both the individuals making the changes and the context of these actions to understand any possible breaches or compliance violations.
Categories
  • Identity Management
  • Cloud
  • Infrastructure
Data Sources
  • User Account
  • Application Log
ATT&CK Techniques
  • T1556
  • T1078
Created: 2025-02-10