Microsoft Entra ID signins from new locations

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Content Index


This query identifies new Microsoft Entra ID sign-in locations compared to historical data, potentially indicating password spraying or brute force attacks. It includes UEBA logs IdentityInfo and BehaviorAnalytics for context.

Attribute Value
Type Hunting Query
Solution Business Email Compromise - Financial Fraud
ID 41fa6e2d-afe9-4398-9356-cec3a927e44e
Tactics InitialAccess
Techniques T1078
Required Connectors AzureActiveDirectory, BehaviorAnalytics
Source View on GitHub

Tables Used

This content item queries data from the following tables:

Table Transformations Ingestion API Lake-Only
IdentityInfo ?
SigninLogs ?

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Hunting Queries · Back to Business Email Compromise - Financial Fraud