Use of Legacy Authentication Protocols
Alert on when legacy authentication has been used on an account
Sigma rule (View on GitHub)
1title: Use of Legacy Authentication Protocols
2id: 60f6535a-760f-42a9-be3f-c9a0a025906e
3status: test
4description: Alert on when legacy authentication has been used on an account
5references:
6 - https://learn.microsoft.com/en-gb/entra/architecture/security-operations-privileged-accounts
7author: Yochana Henderson, '@Yochana-H'
8date: 2022-06-17
9tags:
10 - attack.privilege-escalation
11 - attack.persistence
12 - attack.defense-evasion
13 - attack.initial-access
14 - attack.credential-access
15 - attack.t1078.004
16 - attack.t1110
17logsource:
18 product: azure
19 service: signinlogs
20detection:
21 selection:
22 ActivityDetails: Sign-ins
23 ClientApp:
24 - Other client
25 - IMAP
26 - POP3
27 - MAPI
28 - SMTP
29 - Exchange ActiveSync
30 - Exchange Web Services
31 Username: 'UPN'
32 condition: selection
33falsepositives:
34 - User has been put in acception group so they can use legacy authentication
35level: high
References
Related rules
- Bitbucket User Login Failure
- Failed Authentications From Countries You Do Not Operate Out Of
- Multifactor Authentication Denied
- Multifactor Authentication Interrupted
- Potential MFA Bypass Using Legacy Client Authentication