Rules Contributing to Microsoft Entra Sign-in Failure Alert


The following rules are used to identify suspicious Microsoft Entra sign-in failures. Any one or more of these will trigger the Microsoft Entra Sign-in Failure Alert. Details for each rule can be viewed by clicking the More Details link in the description.
Title |
Description |
||||||||
---|---|---|---|---|---|---|---|---|---|
Sign-in Failure Due to Conditional Access Requirements Not Met |
Define a baseline threshold for failed sign-ins due to Conditional Access failures More details
![]() Rule IDQuery{'selection': {'ResultType': 53003}, 'condition': 'selection'} Log SourceStellar Cyber Microsoft Entra Events configured. Rule SourceSigmaHQ,b4a6d707-9430-4f5f-af68-0337f52d5c42 Author: Yochana Henderson, '@Yochana-H' Tactics, Techniques, and ProceduresCREDENTIAL_ACCESS, INITIAL_ACCESS, T1078.004, T1110 ReferencesSeverity75 Suppression Logic Based On
Additional Information
|
||||||||
Multifactor Authentication Denied |
User has indicated they haven't instigated the MFA prompt and could indicate an attacker has the password for the account. More details
![]() Rule IDQuery{'selection': {'status_additionalDetails|contains': 'MFA denied'}, 'condition': 'selection'} Log SourceStellar Cyber Microsoft Entra Events configured. Rule SourceSigmaHQ,e40f4962-b02b-4192-9bfe-245f7ece1f99 Author: AlertIQ Tactics, Techniques, and ProceduresCREDENTIAL_ACCESS, INITIAL_ACCESS, T1078.004, T1110 ReferencesSeverity50 Suppression Logic Based On
Additional Information
|
||||||||
Multifactor Authentication Interrupted |
Identifies user login with multifactor authentication failures, which might be an indication an attacker has the password for the account but can't pass the MFA challenge. More details
![]() Rule IDQuery{'selection_50074': {'ResultType': 50074}, 'selection_500121': {'ResultType': 500121}, 'condition': '1 of selection_*'} Log SourceStellar Cyber Microsoft Entra Events configured. Rule SourceSigmaHQ,5496ff55-42ec-4369-81cb-00f417029e25 Author: AlertIQ Tactics, Techniques, and ProceduresCREDENTIAL_ACCESS, INITIAL_ACCESS, T1078.004, T1110 ReferencesSeverity50 Suppression Logic Based On
Additional Information
|
||||||||
Account Lockout |
Identifies user account which has been locked because the user tried to sign in too many times with an incorrect user ID or password. More details
![]() Rule IDQuery{'selection': {'ResultType': 50053}, 'condition': 'selection'} Log SourceStellar Cyber Microsoft Entra Events configured. Rule SourceSigmaHQ,2b7d6fc0-71ac-4cf7-8ed1-b5788ee5257a Author: AlertIQ Tactics, Techniques, and ProceduresReferencesSeverity50 Suppression Logic Based On
Additional Information
|