Suspicious SignIns From A Non Registered Device
Detects risky authentication from a non AD registered device without MFA being required.
Sigma rule (View on GitHub)
 1title: Suspicious SignIns From A Non Registered Device
 2id: 572b12d4-9062-11ed-a1eb-0242ac120002
 3status: test
 4description: Detects risky authentication from a non AD registered device without MFA being required.
 5references:
 6    - https://learn.microsoft.com/en-us/entra/architecture/security-operations-devices#non-compliant-device-sign-in
 7author: Harjot Singh, '@cyb3rjy0t'
 8date: 2023-01-10
 9modified: 2025-07-02
10tags:
11    - attack.privilege-escalation
12    - attack.persistence
13    - attack.initial-access
14    - attack.defense-evasion
15    - attack.t1078
16logsource:
17    product: azure
18    service: signinlogs
19detection:
20    selection_main:
21        Status: 'Success'
22        AuthenticationRequirement: 'singleFactorAuthentication'
23        RiskState: 'atRisk'
24    selection_empty1:
25        DeviceDetail.trusttype: ''
26    selection_empty2:
27        DeviceDetail.trusttype: null
28    condition: selection_main and 1 of selection_empty*
29falsepositives:
30    - Unknown
31level: high
References
Related rules
- AWS Key Pair Import Activity
- AWS Suspicious SAML Activity
- Account Created And Deleted Within A Close Time Frame
- Authentications To Important Apps Using Single Factor Authentication
- Azure Domain Federation Settings Modified
