Detectionlowtest
Sign-ins by Unknown Devices
Monitor and alert for Sign-ins by unknown devices from non-Trusted locations.
Convert In Phoenix Studio
Open this Sigma rule in the converter with the YAML preloaded and ready for backend selection.
Launch
Log Source
Azuresigninlogs
ProductAzure← raw: azure
Servicesigninlogs← raw: signinlogs
Detection Logic
Detection Logic1 selector
detection:
selection:
AuthenticationRequirement: singleFactorAuthentication
ResultType: 0
NetworkLocationDetails: '[]'
DeviceDetail.deviceId: ''
condition: selectionFalse Positives
Unknown
False positive likelihood has not been assessed. Additional context may be needed during triage.
References
MITRE ATT&CK
Rule Metadata
Rule ID
4d136857-6a1a-432a-82fc-5dd497ee5e7c
Status
test
Level
low
Type
Detection
Created
Tue Jun 28
Modified
Wed Oct 05
Author
Path
rules/cloud/azure/signin_logs/azure_ad_sign_ins_from_unknown_devices.yml
Raw Tags
attack.privilege-escalationattack.persistenceattack.initial-accessattack.defense-evasionattack.t1078.004