
Summary
This detection rule identifies user risk detection events from Microsoft Entra ID Protection, which is designed to detect various risk activities associated with user accounts. The rule focuses on events like the usage of anonymized IP addresses, unlikely travel patterns, and password spraying attempts. When a user displays suspicious behavior typical of these scenarios, the rule generates alerts to indicate potential account compromise or malicious activity. It advises security analysts to investigate specific fields in the logs to understand the context and severity of the detected risk events. False positive conditions are well defined, allowing the rule to be fine-tuned for specific environments. Additionally, responses to detected risks are outlined, recommending actions like password resets, enabling multi-factor authentication, and reviewing authentication tokens to mitigate risks effectively.
Categories
- Cloud
- Identity Management
Data Sources
- User Account
- Cloud Service
- Application Log
- Network Traffic
ATT&CK Techniques
- T1078
- T1078.004
- T1110
- T1110.003
- T1556
- T1071
Created: 2025-06-02