Password spray attack against Microsoft Entra ID application

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Content Index


'Identifies evidence of password spray activity against Microsoft Entra ID applications by looking for failures from multiple accounts from the same IP address within a time window. If the number of accounts breaches the threshold just once, all failures from the IP address within the time range are bought into the result. Details on whether there were successful authentications by the IP address within the time window are also included. This can be an indicator that an attack was successful. Th

Attribute Value
Type Analytic Rule
Solution Microsoft Entra ID
ID 48607a29-a26a-4abf-8078-a06dbdd174a4
Severity Medium
Status Available
Kind Scheduled
Tactics CredentialAccess
Techniques T1110
Required Connectors AzureActiveDirectory, AzureActiveDirectory
Source View on GitHub

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Analytic Rules · Back to Microsoft Entra ID