heroui logo

Azure AD Multiple Failed MFA Requests For User

Splunk Security Content

View Source
Summary
The rule 'Azure AD Multiple Failed MFA Requests For User' is designed to identify suspicious activity in Azure Active Directory (Azure AD) environments by detecting multiple failed multi-factor authentication (MFA) requests for a single user. This analytic utilizes Azure AD Sign-in Logs and specifically monitors for error code 500121, which indicates failed MFA attempts. The detection triggers when more than ten failed attempts occur within a 10-minute window. Such behavior can suggest that an adversary is attempting to circumvent MFA protections, potentially leading to unauthorized access and privilege escalation within the user's account. The implementation requires ingestion of Azure AD event logs through Splunk, which then processes this data to provide visibility into authentication activities, flagging potential threats related to account takeover attempts.
Categories
  • Cloud
  • Identity Management
  • Azure
Data Sources
  • Cloud Service
  • User Account
ATT&CK Techniques
  • T1621
  • T1078
  • T1586
  • T1586.003
  • T1078.004
Created: 2024-11-14