Brute Force Attack against GitHub Account

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Content Index


Attackers who are trying to guess your users' passwords or use brute-force methods to get in. If your organization is using SSO with Microsoft Entra ID, authentication logs to GitHub.com will be generated. Using the following query can help you identify a sudden increase in failed logon attempt of users.

Attribute Value
Type Analytic Rule
Solution Microsoft Entra ID
ID 97ad74c4-fdd9-4a3f-b6bf-5e28f4f71e06
Severity Medium
Status Available
Kind Scheduled
Tactics CredentialAccess
Techniques T1110
Required Connectors AzureActiveDirectory, AzureActiveDirectory
Source View on GitHub

Tables Used

This content item queries data from the following tables:

Table Transformations Ingestion API Lake-Only
Anomalies ?

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Analytic Rules · Back to Microsoft Entra ID