Detectionmediumtest

User Access Blocked by Azure Conditional Access

Detect access has been blocked by Conditional Access policies. The access policy does not allow token issuance which might be sights≈ of unauthorizeed login to valid accounts.

Convert In Phoenix Studio

Open this Sigma rule in the converter with the YAML preloaded and ready for backend selection.

Launch
AlertIQCreated Sun Oct 10Updated Sun Dec 259a60e676-26ac-44c3-814b-0c2a8b977adfcloud
Log Source
Azuresigninlogs
ProductAzure← raw: azure
Servicesigninlogs← raw: signinlogs
Detection Logic
Detection Logic1 selector
detection:
    selection:
        ResultType: 53003
    condition: selection
False Positives
Unknown

False positive likelihood has not been assessed. Additional context may be needed during triage.

Rule Metadata
Rule ID
9a60e676-26ac-44c3-814b-0c2a8b977adf
Status
test
Level
medium
Type
Detection
Created
Sun Oct 10
Modified
Sun Dec 25
Author
Path
rules/cloud/azure/signin_logs/azure_user_login_blocked_by_conditional_access.yml
Raw Tags
attack.privilege-escalationattack.persistenceattack.defense-evasionattack.credential-accessattack.initial-accessattack.t1110attack.t1078.004
View on GitHub