heroui logo

Disabled MFA to Bypass Authentication Mechanisms

Sigma Rules

View Source
Summary
This detection rule monitors the disabling of Multi-Factor Authentication (MFA) in Azure Active Directory (AAD). MFA is a critical security layer that prevents unauthorized access by requiring a second method of verification, typically in addition to a password. When MFA is disabled, it poses a significant risk as attackers can leverage this to bypass authentication mechanisms easily. The rule captures logs from Azure activity logs where the event source is Azure Active Directory, specifically looking for the event 'Disable Strong Authentication.' with a 'success' status. Given that disabling MFA could be a legitimate action performed by authorized administrators, the rule also includes a consideration for false positives related to authorized modifications. The primary use case for this rule lies in identifying potentially malicious activity aimed at weakening authentication defenses in environments utilizing AAD.
Categories
  • Cloud
  • Infrastructure
  • Identity Management
Data Sources
  • Cloud Service
  • Active Directory
  • Logon Session
Created: 2022-02-08