Sign-ins by Unknown Devices
Monitor and alert for Sign-ins by unknown devices from non-Trusted locations.
Sigma rule (View on GitHub)
1title: Sign-ins by Unknown Devices
2id: 4d136857-6a1a-432a-82fc-5dd497ee5e7c
3status: test
4description: Monitor and alert for Sign-ins by unknown devices from non-Trusted locations.
5references:
6 - https://learn.microsoft.com/en-us/entra/architecture/security-operations-devices#non-compliant-device-sign-in
7author: Michael Epping, '@mepples21'
8date: 2022-06-28
9modified: 2022-10-05
10tags:
11 - attack.privilege-escalation
12 - attack.persistence
13 - attack.initial-access
14 - attack.defense-evasion
15 - attack.t1078.004
16logsource:
17 product: azure
18 service: signinlogs
19detection:
20 selection:
21 AuthenticationRequirement: singleFactorAuthentication
22 ResultType: 0
23 NetworkLocationDetails: '[]'
24 DeviceDetail.deviceId: ''
25 condition: selection
26falsepositives:
27 - Unknown
28level: low
References
Related rules
- AWS IAM S3Browser LoginProfile Creation
- AWS IAM S3Browser Templated S3 Bucket Policy Creation
- AWS IAM S3Browser User or AccessKey Creation
- AWS Root Credentials
- AWS SAML Provider Deletion Activity