Detectionhightest
Primary Refresh Token Access Attempt
Indicates access attempt to the PRT resource which can be used to move laterally into an organization or perform credential theft
Convert In Phoenix Studio
Open this Sigma rule in the converter with the YAML preloaded and ready for backend selection.
Launch
Log Source
Azureriskdetection
ProductAzure← raw: azure
Serviceriskdetection← raw: riskdetection
Detection Logic
Detection Logic1 selector
detection:
selection:
riskEventType: 'attemptedPrtAccess'
condition: selectionFalse Positives
This detection is low-volume and is seen infrequently in most organizations. When this detection appears it's high risk, and users should be remediated.
MITRE ATT&CK
Tactics
Techniques
Rule Metadata
Rule ID
a84fc3b1-c9ce-4125-8e74-bdcdb24021f1
Status
test
Level
high
Type
Detection
Created
Thu Sep 07
Author
Path
rules/cloud/azure/identity_protection/azure_identity_protection_prt_access.yml
Raw Tags
attack.t1528attack.credential-access