Suspicious Sign-ins to Privileged Account

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Content Index


This query identifies sign-ins from non-compliant or MFA-less devices to privileged accounts using a pre-built watchlist. Microsoft Sentinel offers customizable watchlist templates for your environment.

Attribute Value
Type Hunting Query
Solution Cloud Identity Threat Protection Essentials
ID a73c52f2-b3a5-4fe4-be7d-4d59b8558590
Tactics InitialAccess
Techniques T1078
Required Connectors AzureActiveDirectory, BehaviorAnalytics, BehaviorAnalytics
Source View on GitHub

Tables Used

This content item queries data from the following tables:

Table Transformations Ingestion API Lake-Only
BehaviorAnalytics ?
IdentityInfo ?
SigninLogs ?

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Hunting Queries · Back to Cloud Identity Threat Protection Essentials