
Summary
The Azure Many Failed SignIns rule is designed to detect a threshold of failed sign-in attempts (10) for the same ServicePrincipalName or UserPrincipalName within a 10-minute deduplication period. This monitoring is crucial for identifying potential credential stuffing attacks or misuse of credentials. The rule extracts log data from Azure's audit logs, focusing particularly on the sign-in activity. If the count of failed logins for the specified principal exceeds the defined threshold, it signifies a possible attack vector or misconfigured application credentials. By correlating the failed attempts with IP address and time of access, security teams can promptly investigate suspicious activities linked to user or service accounts.
Categories
- Cloud
- Azure
- Identity Management
Data Sources
- Logon Session
- Cloud Service
- Application Log
ATT&CK Techniques
- T1110
- T1078
Created: 2023-07-28