Detectionmediumtest
Users Authenticating To Other Azure AD Tenants
Detect when users in your Azure AD tenant are authenticating to other Azure AD Tenants.
Convert In Phoenix Studio
Open this Sigma rule in the converter with the YAML preloaded and ready for backend selection.
Launch
Log Source
Azuresigninlogs
ProductAzure← raw: azure
Servicesigninlogs← raw: signinlogs
Detection Logic
Detection Logic2 selectors
detection:
selection:
Status: 'Success'
HomeTenantId: 'HomeTenantID'
filter:
ResourceTenantId|contains: 'HomeTenantID'
condition: selection and not filterFalse Positives
If this was approved by System Administrator.
References
MITRE ATT&CK
Rule Metadata
Rule ID
5f521e4b-0105-4b72-845b-2198a54487b9
Status
test
Level
medium
Type
Detection
Created
Thu Jun 30
Author
Path
rules/cloud/azure/signin_logs/azure_users_authenticating_to_other_azure_ad_tenants.yml
Raw Tags
attack.privilege-escalationattack.persistenceattack.defense-evasionattack.initial-accessattack.t1078.004