Rules Contributing to Microsoft Entra Suspicious Sign-in Activity Alert

The following rules are used to identify suspicious Microsoft Entra sign-in activity. Any one or more of these will trigger the Microsoft Entra Suspicious Sign-in Activity Alert. Details for each rule can be viewed by clicking the More Details link in the description.

Title

Description

Use of Legacy Authentication Protocols

Alert on when legecy authentication has been used on an account

Suspicious SignIns From A Non Registered Device

Detects risky authencaition from a non AD registered device without MFA being required.

Device Registration or Join Without MFA

Monitor and alert for device registration or join events where MFA was not performed.

Azure Unusual Authentication Interruption

Detects when there is an interruption in the authentication process.

Login to Disabled Account

Detect failed attempts to sign in to disabled accounts.