
Summary
This detection rule aims to identify unusual interruptions in the authentication process for Azure users. It is crucial for recognizing potential security incidents where authentication challenges fail or are disrupted, which could suggest malicious activities such as account compromise attempts. The rule leverages specific result types that indicate various states of authentication or challenges that are either not met or have failed. Particularly, it monitors for devices that require authentication but fail to complete the process, as indicated by result codes such as 50097 (Device authentication needed) and 50155 (Device authentication failed). Moreover, it looks for scenarios where an external security challenge is not sufficiently met (result 50158). By combining these selections, this rule provides reliable alerts when it detects any of these states, flagged as medium severity for further investigation.
Categories
- Cloud
- Identity Management
- Azure
Data Sources
- Cloud Service
- User Account
- Application Log
Created: 2021-11-26