Use of Legacy Authentication Protocols

Alert on when legacy authentication has been used on an account

Sigma rule (View on GitHub)

 1title: Use of Legacy Authentication Protocols
 2id: 60f6535a-760f-42a9-be3f-c9a0a025906e
 3status: test
 4description: Alert on when legacy authentication has been used on an account
 5references:
 6    - https://learn.microsoft.com/en-gb/entra/architecture/security-operations-privileged-accounts
 7author: Yochana Henderson, '@Yochana-H'
 8date: 2022-06-17
 9tags:
10    - attack.privilege-escalation
11    - attack.persistence
12    - attack.defense-evasion
13    - attack.initial-access
14    - attack.credential-access
15    - attack.t1078.004
16    - attack.t1110
17logsource:
18    product: azure
19    service: signinlogs
20detection:
21    selection:
22        ActivityDetails: Sign-ins
23        ClientApp:
24            - Other client
25            - IMAP
26            - POP3
27            - MAPI
28            - SMTP
29            - Exchange ActiveSync
30            - Exchange Web Services
31        Username: 'UPN'
32    condition: selection
33falsepositives:
34    - User has been put in acception group so they can use legacy authentication
35level: high

References

Related rules

to-top