Detectionmediumtest
Multifactor Authentication Denied
User has indicated they haven't instigated the MFA prompt and could indicate an attacker has the password for the account.
Convert In Phoenix Studio
Open this Sigma rule in the converter with the YAML preloaded and ready for backend selection.
Launch
Log Source
Azuresigninlogs
ProductAzure← raw: azure
Servicesigninlogs← raw: signinlogs
Detection Logic
Detection Logic1 selector
detection:
selection:
AuthenticationRequirement: 'multiFactorAuthentication'
Status|contains: 'MFA Denied'
condition: selectionFalse Positives
Users actually login but miss-click into the Deny button when MFA prompt.
References
MITRE ATT&CK
Rule Metadata
Rule ID
e40f4962-b02b-4192-9bfe-245f7ece1f99
Status
test
Level
medium
Type
Detection
Created
Thu Mar 24
Author
Path
rules/cloud/azure/signin_logs/azure_mfa_denies.yml
Raw Tags
attack.privilege-escalationattack.persistenceattack.defense-evasionattack.initial-accessattack.credential-accessattack.t1078.004attack.t1110attack.t1621