Detectionmediumtest

Password Reset By User Account

Detect when a user has reset their password in Azure AD

Convert In Phoenix Studio

Open this Sigma rule in the converter with the YAML preloaded and ready for backend selection.

Launch
YochanaHendersonCreated Wed Aug 03340ee172-4b67-4fb4-832f-f961bdc1f3aacloud
Log Source
Azureauditlogs
ProductAzure← raw: azure
Serviceauditlogs← raw: auditlogs
Detection Logic
Detection Logic2 selectors
detection:
    selection:
        Category: 'UserManagement'
        Status: 'Success'
        Initiatedby: 'UPN'
    filter:
        Target|contains: 'UPN'
        ActivityType|contains: 'Password reset'
    condition: selection and filter
False Positives

If this was approved by System Administrator or confirmed user action.

Rule Metadata
Rule ID
340ee172-4b67-4fb4-832f-f961bdc1f3aa
Status
test
Level
medium
Type
Detection
Created
Wed Aug 03
Path
rules/cloud/azure/audit_logs/azure_user_password_change.yml
Raw Tags
attack.privilege-escalationattack.initial-accessattack.defense-evasionattack.persistenceattack.credential-accessattack.t1078.004
View on GitHub