Data Source: Azure Active Directory

Description

All Azure Active Directory events

Details

Property Value
Source Azure AD
Sourcetype azure:monitor:aad
Separator operationName
Name ▲▼ Technique ▲▼ Type ▲▼
Azure Active Directory High Risk Sign-in Password Spraying, Cloud Accounts TTP
Azure AD Authentication Failed During MFA Challenge Cloud Accounts, Cloud Accounts, Multi-Factor Authentication Request Generation TTP
Azure AD Concurrent Sessions From Different Ips Browser Session Hijacking TTP
Azure AD Device Code Authentication Steal Application Access Token, Spearphishing Link TTP
Azure AD High Number Of Failed Authentications For User Password Guessing TTP
Azure AD High Number Of Failed Authentications From Ip Password Guessing, Password Spraying TTP
Azure AD Multi-Source Failed Authentications Spike Password Spraying, Credential Stuffing, Cloud Accounts Hunting
Azure AD Multiple Users Failing To Authenticate From Ip Password Spraying, Credential Stuffing, Cloud Accounts Anomaly
Azure AD PIM Role Assigned Additional Cloud Roles TTP
Azure AD PIM Role Assignment Activated Additional Cloud Roles TTP
Azure AD Service Principal New Client Credentials Additional Cloud Credentials TTP
Azure AD Successful Authentication From Different Ips Password Guessing, Password Spraying TTP
Azure AD Successful PowerShell Authentication Cloud Accounts, Cloud Accounts TTP
Azure AD Successful Single-Factor Authentication Cloud Accounts, Cloud Accounts TTP
Azure AD Unusual Number of Failed Authentications From Ip Password Spraying, Credential Stuffing, Cloud Accounts Anomaly

Supported Apps

Required Output Fields

  • dest

  • user

  • src

  • vendor_account

  • vendor_product


Source: GitHub | Version: 1