Azure AD Only Single Factor Authentication Required

Detect when users are authenticating without MFA being required.

Sigma rule (View on GitHub)

 1title: Azure AD Only Single Factor Authentication Required
 2id: 28eea407-28d7-4e42-b0be-575d5ba60b2c
 3status: test
 4description: Detect when users are authenticating without MFA being required.
 5references:
 6    - https://learn.microsoft.com/en-gb/entra/architecture/security-operations-user-accounts
 7author: MikeDuddington, '@dudders1'
 8date: 2022-07-27
 9tags:
10    - attack.privilege-escalation
11    - attack.persistence
12    - attack.defense-evasion
13    - attack.initial-access
14    - attack.credential-access
15    - attack.t1078.004
16    - attack.t1556.006
17logsource:
18    product: azure
19    service: signinlogs
20detection:
21    selection:
22        Status: 'Success'
23        AuthenticationRequirement: 'singleFactorAuthentication'
24    condition: selection
25falsepositives:
26    - If this was approved by System Administrator.
27level: low

References

Related rules

to-top