Azure AD Login Without MFA

Set up the azure integration.

이 페이지는 아직 한국어로 제공되지 않으며 번역 작업 중입니다. 번역에 관한 질문이나 의견이 있으시면 언제든지 저희에게 연락해 주십시오.

Goal

Detect when any user logs in to Azure AD without multi-factor authentication.

Strategy

This rule monitors Azure Activity logs for Active Directory logs and detects when any @evt.category has a value of SignInLogs, and @properties.authenticationRequirement has a value of singleFactorAuthentication.

Triage and response

  1. Reach out to the user to determine if the login was legitimate.
  2. If the login was legitimate, request that the user enables 2FA.
  3. If the login wasn’t legitimate, rotate the credentials.
  4. Review all user accounts to ensure MFA is enabled.

Changelog

  • 15 November 2022 - Updated query to reduce false positives, updated option values.