heroui logo

Sign-ins by Unknown Devices

Sigma Rules

View Source
Summary
This rule detects sign-ins from unknown devices that occur from non-trusted locations within an Azure environment. It is designed to enhance security measures by monitoring authentication attempts that meet specific criteria such as the requirement for single-factor authentication and a result type indicative of a successful login. The rule focuses on scenarios where no network location details are associated with the sign-in event and the device ID is unknown, which signifies that the sign-in attempt is coming from an unfamiliar device not recognized by the security practices of the organization. Such actions can indicate potential threats, including unauthorized access or credential compromise. The alerts generated by this detection can allow security teams to respond swiftly to anomalies in user sign-in behavior, particularly from devices that have yet to be established as trusted or compliant with organizational security policies.
Categories
  • Cloud
  • Identity Management
Data Sources
  • User Account
  • Network Traffic
Created: 2022-06-28