Cette page n'est pas encore disponible en français, sa traduction est en cours.
Si vous avez des questions ou des retours sur notre projet de traduction actuel,
n'hésitez pas à nous contacter.
Goal
Detect when multi-factor authentication (MFA) is disabled for an Azure AD user.
Strategy
This rule monitors the following Azure AD Audit Log event to detect when a user’s MFA is disabled:
Disable Strong Authentication
Disabling MFA makes an account more vulnerable to takeover. Attackers may attempt to disable MFA to gain access other user accounts or maintain persistence in an already-compromised account.
Triage and response
Determine if user {{@properties.targetResources.userPrincipalName}}
was expected to have their MFA disabled.
If the change was not expected by the user:
- Investigate other signals and suspicous behavior by
{{@properties.targetResources.userPrincipalName}}
. - Disable the affected user accounts.
- Rotate user credentials.
- Ensure MFA policies ares accurately enforced across your Azure AD tenant.
- Begin your organization’s incident response process and investigate.
If the change was made by the user:
- Determine if the user was authorized to make that change.
- If Yes, confirm the user is assigned MFA policies assigned in accordance with organizational requirements.
- If No, verify there are no other signals or suspicious behavior from
{{@properties.targetResources.userPrincipalName}}
.