Rules Contributing to Suspicious Microsoft Entra Sign-in Activity Alert

The following rules are used to identify suspicious Microsoft Entra sign-in activity. Any one or more of these will trigger the Microsoft Entra Suspicious Sign-in Activity Alert. Details for each rule can be viewed by clicking the More Details link in the description.
Title |
Description |
||||||||
---|---|---|---|---|---|---|---|---|---|
Use of Legacy Authentication Protocols |
Alert on when legecy authentication has been used on an account More details
![]() Rule IDQuery{'selection': {'login_result': 'success', 'ClientApp': ['Other clients', 'IMAP', 'POP3', 'MAPI', 'SMTP', 'Exchange ActiveSync', 'Exchange Web Services']}, 'filter': {'srcip_username': ''}, 'condition': 'selection and not filter'} Log SourceStellar Cyber Microsoft Entra Events configured. Rule SourceSigmaHQ,60f6535a-760f-42a9-be3f-c9a0a025906e Author: Yochana Henderson, '@Yochana-H' Tactics, Techniques, and ProceduresCREDENTIAL_ACCESS, INITIAL_ACCESS, T1078.004, T1110 References
N/A
Severity75 Suppression Logic Based On
Additional Information
|
||||||||
Suspicious SignIns From A Non Registered Device |
Detects risky authencaition from a non AD registered device without MFA being required. More details
![]() Rule IDQuery{'selection': {'ResultType': 0, 'RiskState': 'atRisk', 'DeviceDetail_trusttype': ''}, 'condition': 'selection'} Log SourceStellar Cyber Microsoft Entra Events configured. Rule SourceSigmaHQ,572b12d4-9062-11ed-a1eb-0242ac120002 Author: Harjot Singh, '@cyb3rjy0t' Tactics, Techniques, and ProceduresReferences
N/A
Severity75 Suppression Logic Based On
Additional Information
|
||||||||
Device Registration or Join Without MFA |
Monitor and alert for device registration or join events where MFA was not performed. More details
![]() Rule IDQuery{'selection': {'ResourceDisplayName': 'Device Registration Service', 'conditionalAccessStatus': 'success'}, 'filter_mfa': {'status_additionalDetails|startswith': 'MFA'}, 'condition': 'selection and not filter_mfa'} Log SourceStellar Cyber Microsoft Entra Events configured. Rule SourceSigmaHQ,5afa454e-030c-4ab4-9253-a90aa7fcc581 Author: Michael Epping, '@mepples21' Tactics, Techniques, and ProceduresReferences
N/A
Severity50 Suppression Logic Based On
Additional Information
|
||||||||
Azure Unusual Authentication Interruption |
Detects when there is an interruption in the authentication process. More details
![]() Rule IDQuery{'selection_50097': {'ResultType': 50097}, 'selection_50155': {'ResultType': 50155}, 'selection_50158': {'ResultType': 50158}, 'condition': '1 of selection_*'} Log SourceStellar Cyber Microsoft Entra Events configured. Rule SourceSigmaHQ,8366030e-7216-476b-9927-271d79f13cf3 Author: Austin Songer @austinsonger Tactics, Techniques, and ProceduresReferences
N/A
Severity50 Suppression Logic Based On
Additional Information
|
||||||||
Login to Disabled Account |
Detect failed attempts to sign in to disabled accounts. More details
![]() Rule IDQuery{'selection': {'ResultType': 50057}, 'condition': 'selection'} Log SourceStellar Cyber Microsoft Entra Events configured. Rule SourceSigmaHQ,908655e0-25cf-4ae1-b775-1c8ce9cf43d8 Author: AlertIQ Tactics, Techniques, and ProceduresReferences
N/A
Severity50 Suppression Logic Based On
Additional Information
|