event.dataset:azure.signinlogs and
azure.signinlogs.properties.risk_state:("confirmedCompromised" or "atRisk") and event.outcome:(success or Success)
Install detection rules in Elastic Security
Detect Azure Active Directory High Risk User Sign-in Heuristic in the Elastic Security detection engine by installing this rule into your Elastic Stack.
To setup this rule, check out the installation guide for Prebuilt Security Detection Rules(opens in a new tab or window).