
Summary
The rule detects a potentially malicious activity where an IP address experiences 20 or more failed authentication attempts to an Azure Active Directory (Azure AD) tenant within a 10-minute timeframe. This behavior is indicative of a brute force attack, which primarily targets unauthorized access or privilege escalation. The detection relies on Azure AD SignInLogs and utilizes a search query to identify repeated failed logins from the same IP address. High volumes of failed logins in a short period may uncover attempts to compromise user accounts, resulting in unauthorized access to sensitive data and resources within the Azure environment. The analytic applies a threshold of 20 failed attempts to ensure significant relevance and allows security teams to take timely action against potential threats.
Categories
- Cloud
- Identity Management
- Azure
Data Sources
- Cloud Service
- Application Log
ATT&CK Techniques
- T1110
- T1110.001
- T1110.003
Created: 2024-11-14