Deprecated - Potential Password Spraying of Microsoft 365 User Accounts

Last updated 3 months ago on 2024-09-05
Created 4 years ago on 2020-12-01

About

Identifies a high number (25) of failed Microsoft 365 user authentication attempts from a single IP address within 30 minutes, which could be indicative of a password spraying attack. An adversary may attempt a password spraying attack to obtain unauthorized access to user accounts.
Tags
Domain: CloudData Source: Microsoft 365Use Case: Identity and Access AuditTactic: Credential Access
Severity
high
Risk Score
73
MITRE ATT&CK™

Credential Access (TA0006)(opens in a new tab or window)

False Positive Examples
Automated processes that attempt to authenticate using expired credentials and unbounded retries may lead to false positives.
License
Elastic License v2(opens in a new tab or window)

Definition

Rule Type
Threshold Rule
Integration Pack
Prebuilt Security Detection Rules
Index Patterns
filebeat-*logs-o365*
Related Integrations

o365(opens in a new tab or window)

Query
event.dataset:o365.audit and event.provider:(Exchange or AzureActiveDirectory) and event.category:authentication and
event.action:("UserLoginFailed" or "PasswordLogonInitialAuthUsingPassword")

Install detection rules in Elastic Security

Detect Deprecated - Potential Password Spraying of Microsoft 365 User Accounts in the Elastic Security detection engine by installing this rule into your Elastic Stack.

To setup this rule, check out the installation guide for Prebuilt Security Detection Rules(opens in a new tab or window).