heroui logo

Azure AD Threat Intelligence

Sigma Rules

View Source
Summary
The rule titled 'Azure AD Threat Intelligence' aims to detect unusual user activity that may signify potential security threats or attacks, correlating with known attack patterns documented in the MITRE ATT&CK framework. The detection is focused on Azure's risk detection capabilities, particularly events classified under 'investigationsThreatIntelligence'. The rule triggers when user sign-ins exhibit anomalies compared to usual patterns or align with documented attack vectors, thus alerting administrators to potential compromise. False positives may occur in legitimate scenarios, warranting an investigation into flagged sessions alongside a user's other sign-in attempts to discern true threats from benign anomalies. This rule is crucial for maintaining the integrity and security of user accounts within Azure Active Directory, especially against tactics such as credential theft, persistence mechanisms, and privilege escalation efforts.
Categories
  • Identity Management
  • Cloud
  • Azure
Data Sources
  • User Account
  • Cloud Service
  • Logon Session
Created: 2023-09-07