
Summary
The Azure RiskLevel Passthrough rule is designed to detect sign-in activities in Azure Active Directory that relate to the risk assessment parameters: riskLevelAggregated, riskLevelDuringSignIn, and riskState. These parameters are particularly relevant for Azure AD Premium P2 users, enabling enhanced security and risk assessment capabilities. The rule triggers alerts based on deviations or specific conditions met during sign-in attempts, especially those with flagged risk levels such as 'low' or 'high'. This detection mechanism aids administrators in identifying potential threats stemming from compromised credentials or malicious sign-in attempts. The rule leverages Azure Audit logs for its functioning and specifies a defined deduplication period and threshold to minimize noise from transient events. Response actions to triggered alerts are detailed in an accompanying runbook, which guides users through various possible actions based on the nature of the detected risk.
Categories
- Cloud
- Identity Management
- Azure
Data Sources
- Logon Session
- Application Log
- User Account
ATT&CK Techniques
- T1110
- T1078
Created: 2023-08-02