Detectionmediumtest
User Access Blocked by Azure Conditional Access
Detect access has been blocked by Conditional Access policies. The access policy does not allow token issuance which might be sights≈ of unauthorizeed login to valid accounts.
Convert In Phoenix Studio
Open this Sigma rule in the converter with the YAML preloaded and ready for backend selection.
Launch
Log Source
Azuresigninlogs
ProductAzure← raw: azure
Servicesigninlogs← raw: signinlogs
Detection Logic
Detection Logic1 selector
detection:
selection:
ResultType: 53003
condition: selectionFalse Positives
Unknown
False positive likelihood has not been assessed. Additional context may be needed during triage.
References
MITRE ATT&CK
Rule Metadata
Rule ID
9a60e676-26ac-44c3-814b-0c2a8b977adf
Status
test
Level
medium
Type
Detection
Created
Sun Oct 10
Modified
Sun Dec 25
Author
Path
rules/cloud/azure/signin_logs/azure_user_login_blocked_by_conditional_access.yml
Raw Tags
attack.privilege-escalationattack.persistenceattack.defense-evasionattack.credential-accessattack.initial-accessattack.t1110attack.t1078.004