Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Rule Tuning] Azure Entra Sign-in Brute Force against Microsoft 365 Accounts #4404

Open
jvalente-salemstate opened this issue Jan 22, 2025 · 0 comments · May be fixed by #4405
Open

[Rule Tuning] Azure Entra Sign-in Brute Force against Microsoft 365 Accounts #4404

jvalente-salemstate opened this issue Jan 22, 2025 · 0 comments · May be fixed by #4405
Labels
community Rule: Tuning tweaking or tuning an existing rule Team: TRADE

Comments

@jvalente-salemstate
Copy link
Contributor

Link to Rule

https://github.com/elastic/detection-rules/blob/main/rules/integrations/azure/credential_access_entra_signin_brute_force_microsoft_365.toml

Rule Tuning Type

False Positives - Reducing benign events mistakenly identified as threats.

Description

We have found that non-interactive signins with expired or invalid tokens are generating a volume of false positives.

Generally, these reflect tokens/sessions that are/were successful logins, passing conditional access. If the token/session is invalid or expires due to CA frequency check, this will log as a failure. There may be cases where this indicates token theft (of a, since, invalidated token) but these would be better identified in a search for token theft, rather than brute force.

The following azure.signinlogs.properties.status.error_code are our highest volume offenders and make up the majority of the generated alerts.

  • 70043 : Refresh token expired or no longer valid due to conditional access frequency checks
  • 70044 : Session expired or no longer valid due to conditional access frequency checks

Example Data

Exclude non-interactive logins that are refreshing tokens and failing with specific error codes. This restricts the event code exclusions to the specific false positive in this issue.

and not (azure.signinlogs.category == "NonInteractiveUserSignInLogs"
      and azure.signinlogs.properties.status.error_code in (70043, 70044, 50057)
      and azure.signinlogs.properties.incoming_token_type in ("primaryRefreshToken", "refreshToken"))
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
community Rule: Tuning tweaking or tuning an existing rule Team: TRADE
Projects
None yet
1 participant