heroui logo

Azure AD Successful Authentication From Different Ips

Splunk Security Content

View Source
Summary
The Azure AD Successful Authentication From Different IPs analytic detects instances where an Azure Active Directory (Azure AD) account successfully logs in from multiple unique IP addresses within a 30-minute period. This detection rule leverages Azure AD SignInLogs to track authentication patterns of the same user. A successful sign-in from different IP addresses in a short timeframe can indicate potential credential compromise, suggesting that an adversary might be using stolen credentials, possibly acquired through phishing attacks. If this activity is confirmed to be malicious, it could result in unauthorized access to corporate resources, leading to severe data breaches or further compromise within an organization's network. The analytic is configured to monitor the specified login attempts and raise alerts when suspicious patterns are detected, thereby allowing security teams to intervene proactively against possible account takeovers.
Categories
  • Cloud
  • Identity Management
Data Sources
  • Cloud Service
  • User Account
  • Application Log
ATT&CK Techniques
  • T1110
  • T1110.001
  • T1110.003
Created: 2024-11-14