Detectionmediumtest

Users Authenticating To Other Azure AD Tenants

Detect when users in your Azure AD tenant are authenticating to other Azure AD Tenants.

Convert In Phoenix Studio

Open this Sigma rule in the converter with the YAML preloaded and ready for backend selection.

Launch
Mike DuddingtonCreated Thu Jun 305f521e4b-0105-4b72-845b-2198a54487b9cloud
Log Source
Azuresigninlogs
ProductAzure← raw: azure
Servicesigninlogs← raw: signinlogs
Detection Logic
Detection Logic2 selectors
detection:
    selection:
        Status: 'Success'
        HomeTenantId: 'HomeTenantID'
    filter:
        ResourceTenantId|contains: 'HomeTenantID'
    condition: selection and not filter
False Positives

If this was approved by System Administrator.

Rule Metadata
Rule ID
5f521e4b-0105-4b72-845b-2198a54487b9
Status
test
Level
medium
Type
Detection
Created
Thu Jun 30
Path
rules/cloud/azure/signin_logs/azure_users_authenticating_to_other_azure_ad_tenants.yml
Raw Tags
attack.privilege-escalationattack.persistenceattack.defense-evasionattack.initial-accessattack.t1078.004
View on GitHub