Disabled MFA to Bypass Authentication Mechanisms

Detection for when multi factor authentication has been disabled, which might indicate a malicious activity to bypass authentication mechanisms.

Sigma rule (View on GitHub)

 1title: Disabled MFA to Bypass Authentication Mechanisms
 2id: 7ea78478-a4f9-42a6-9dcd-f861816122bf
 3status: test
 4description: Detection for when multi factor authentication has been disabled, which might indicate a malicious activity to bypass authentication mechanisms.
 5references:
 6    - https://docs.microsoft.com/en-us/azure/active-directory/authentication/howto-mfa-userstates
 7author: '@ionsor'
 8date: 2022/02/08
 9tags:
10    - attack.persistence
11    - attack.t1556
12logsource:
13    product: azure
14    service: activitylogs
15detection:
16    selection:
17        eventSource: AzureActiveDirectory
18        eventName: 'Disable Strong Authentication.'
19        status: success
20    condition: selection
21falsepositives:
22    - Authorized modification by administrators
23level: medium

References

Related rules

to-top