heroui logo

Entra ID Microsoft Authentication Broker Sign-In to Unusual Resource

Elastic Detection Rules

View Source
Summary
Detects successful Microsoft Entra ID sign-ins where the client application is the Microsoft Authentication Broker (MAB) and the requested resource_id is outside a short baseline exclusion list of commonly observed first-party targets. Attackers abuse the broker in phishing and token broker flows to obtain tokens for unexpected APIs or enterprise applications. The exclusion list covers legacy Azure Active Directory, Microsoft Graph, Device Registration Service, Microsoft Intune Enrollment, and similar first-party resources; baselining those identifiers for your tenant will reduce noise and allow tuning of exclusions for approved resources.
Categories
  • Cloud
  • Identity Management
  • Azure
Data Sources
  • Application Log
ATT&CK Techniques
  • T1078
  • T1078.004
  • T1550
  • T1550.001
Created: 2026-05-15