heroui logo

Azure Entra ID Rare Authentication Requirement for Principal User

Elastic Detection Rules

View Source
Summary
The rule identifies rare instances of authentication attempts by Azure Entra ID principal users that have unusual requirements, which can indicate potential security threats such as credential theft attempts. It includes conditions that focus on any abnormal patterns in authentication credentials over the last 14 days, particularly looking for specific user principal names and their associated authentication requirements. Important investigation steps include analyzing the source IP, examining user accounts for privileged access, reviewing authentication methods and error codes, as well as correlating login attempts with existing activity. False positives can arise from automated scripts, corporate proxies, or user errors, so mitigating strategies include excluding trusted IPs and filtering out well-known benign scenarios. Immediate remediation actions suggest blocking malicious IPs, resetting user passwords, and enforcing multi-factor authentication. Long-term mitigations recommend adopting a zero-trust model and regularly auditing authentication logs to prevent future incidents.
Categories
  • Cloud
  • Identity Management
Data Sources
  • User Account
  • Cloud Service
  • Application Log
ATT&CK Techniques
  • T1078
  • T1078.004
Created: 2025-03-10