<  Back to rules search

Credential Stuffing Attack on Azure






Set up the azure integration.

Cette page n'est pas encore disponible en français, sa traduction est en cours.
Si vous avez des questions ou des retours sur notre projet de traduction actuel, n'hésitez pas à nous contacter.


Detect and identify the network IP address or user agent when multiple user accounts have login attempt activities recorded.


Monitor Azure Active Directory and detect when any @evt.category is equal to SignInLogs and at least 5 of the @evt.outcome are equal to false by the same network IP address or user agent.

Security Signal returns MEDIUM if`@evt.outcomehas value ofsuccess` after 5 multiple failed logins by the same network IP address or user agent.

Triage and response

  1. Inspect the log and determine if this was a valid login attempt.
  2. If the user was compromised, rotate user credentials.


  • 14 June 2022 - Updated triggering cases to align with other credential stuffing rules. Also updated other backend options to reduce noise levels.
  • 26 October 2022 - Updated query.