heroui logo

Azure AD High Number Of Failed Authentications From Ip

Splunk Security Content

View Source
Summary
The rule detects a potentially malicious activity where an IP address experiences 20 or more failed authentication attempts to an Azure Active Directory (Azure AD) tenant within a 10-minute timeframe. This behavior is indicative of a brute force attack, which primarily targets unauthorized access or privilege escalation. The detection relies on Azure AD SignInLogs and utilizes a search query to identify repeated failed logins from the same IP address. High volumes of failed logins in a short period may uncover attempts to compromise user accounts, resulting in unauthorized access to sensitive data and resources within the Azure environment. The analytic applies a threshold of 20 failed attempts to ensure significant relevance and allows security teams to take timely action against potential threats.
Categories
  • Cloud
  • Identity Management
  • Azure
Data Sources
  • Cloud Service
  • Application Log
ATT&CK Techniques
  • T1110
  • T1110.001
  • T1110.003
Created: 2024-11-14