Login to Disabled Account

Detect failed attempts to sign in to disabled accounts.

Sigma rule (View on GitHub)

 1title: Login to Disabled Account
 2id: 908655e0-25cf-4ae1-b775-1c8ce9cf43d8
 3status: test
 4description: Detect failed attempts to sign in to disabled accounts.
 5references:
 6    - https://learn.microsoft.com/en-us/entra/architecture/security-operations-privileged-accounts
 7author: AlertIQ
 8date: 2021-10-10
 9modified: 2022-12-25
10tags:
11    - attack.privilege-escalation
12    - attack.persistence
13    - attack.defense-evasion
14    - attack.initial-access
15    - attack.t1078.004
16logsource:
17    product: azure
18    service: signinlogs
19detection:
20    selection:
21        ResultType: 50057
22        ResultDescription: 'User account is disabled. The account has been disabled by an administrator.'
23    condition: selection
24falsepositives:
25    - Unknown
26level: medium

References

Related rules

to-top