Brute force attack against Azure Portal

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Content Index


Detects Azure Portal brute force attacks by monitoring for multiple authentication failures and a successful login within a 20-minute window. Default settings: 10 failures, 25 deviations. Ref: https://docs.microsoft.com/azure/active-directory/reports-monitoring/reference-sign-ins-error-codes.

Attribute Value
Type Analytic Rule
Solution Microsoft Entra ID
ID 28b42356-45af-40a6-a0b4-a554cdfd5d8a
Severity Medium
Status Available
Kind Scheduled
Tactics CredentialAccess
Techniques T1110
Required Connectors AzureActiveDirectory, AzureActiveDirectory
Source View on GitHub

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Analytic Rules · Back to Microsoft Entra ID