Detectionmediumtest

Multifactor Authentication Denied

User has indicated they haven't instigated the MFA prompt and could indicate an attacker has the password for the account.

Convert In Phoenix Studio

Open this Sigma rule in the converter with the YAML preloaded and ready for backend selection.

Launch
AlertIQCreated Thu Mar 24e40f4962-b02b-4192-9bfe-245f7ece1f99cloud
Log Source
Azuresigninlogs
ProductAzure← raw: azure
Servicesigninlogs← raw: signinlogs
Detection Logic
Detection Logic1 selector
detection:
    selection:
        AuthenticationRequirement: 'multiFactorAuthentication'
        Status|contains: 'MFA Denied'
    condition: selection
False Positives

Users actually login but miss-click into the Deny button when MFA prompt.

Rule Metadata
Rule ID
e40f4962-b02b-4192-9bfe-245f7ece1f99
Status
test
Level
medium
Type
Detection
Created
Thu Mar 24
Author
Path
rules/cloud/azure/signin_logs/azure_mfa_denies.yml
Raw Tags
attack.privilege-escalationattack.persistenceattack.defense-evasionattack.initial-accessattack.credential-accessattack.t1078.004attack.t1110attack.t1621
View on GitHub