heroui logo

O365 Disable MFA

Splunk Security Content

View Source
Summary
The O365 Disable MFA detection rule is designed to flag instances where Multi-Factor Authentication (MFA) has been disabled for users within an Office 365 environment. This functionality is critical as disabling MFA significantly increases the vulnerability of user accounts to unauthorized access by attackers or through insider threats. The detection rule relies on O365 audit logs and specifically examines events associated with the disabling of MFA settings. Analyzing the captured data provides context around user actions—tracking when and by whom MFA was disabled, along with any associated outcomes. The search query captures relevant operations related to the security settings and groups the results by user type, operation performed, user ID, and the result's status. When instances of MFA being disabled are identified, it triggers a security alert necessitating immediate investigation to understand the rationale behind this action, potentially restoring MFA protection and examining other suspicious activities related to the impacted accounts.
Categories
  • Cloud
  • Identity Management
  • Other
Data Sources
  • Pod
ATT&CK Techniques
  • T1556
Created: 2024-11-14