For AI agents: A markdown version of this page is available at https://docs.datadoghq.com/security/default_rules/rrb-osy-cuu.md. A documentation index is available at /llms.txt.

Azure AD brute force login

Goal

Detect when a user is a victim of an Account Take Over (ATO) by a brute force attack.

Strategy

Monitor Azure Active Directory Sign-in logs and detect when any @evt.category is equal to SignInLogs, and @evt.outcome is equal to failure.

Triage and response

  1. Inspect the log and determine if this was a valid login attempt.
  2. If the user was compromised, rotate user credentials.

Changelog

  • 26 October 2022 - Updated query.