docs.microsoft.com Open in urlscan Pro
2a02:26f0:6c00:289::353e  Public Scan

Submitted URL: https://aka.ms/atasaguide-authfail
Effective URL: https://docs.microsoft.com/en-us/defender-for-identity/compromised-credentials-alerts
Submission: On June 17 via api from US — Scanned from FR

Form analysis 0 forms found in the DOM

Text Content

Skip to main content


This browser is no longer supported.

Upgrade to Microsoft Edge to take advantage of the latest features, security
updates, and technical support.

Download Microsoft Edge More info

Table of contents Exit focus mode

Read in English Save
Table of contents Read in English Save Feedback Edit

Twitter LinkedIn Facebook Email
Table of contents


TUTORIAL: COMPROMISED CREDENTIAL ALERTS

 * Article
 * 03/15/2022
 * 22 minutes to read
 * 3 contributors




IN THIS ARTICLE

Typically, cyber-attacks are launched against any accessible entity, such as a
low-privileged user, and then quickly move laterally until the attacker gains
access to valuable assets – such as sensitive accounts, domain administrators,
and highly sensitive data. Microsoft Defender for Identity identifies these
advanced threats at the source throughout the entire attack kill chain and
classifies them into the following phases:

 1. Reconnaissance
 2. Compromised credential
 3. Lateral Movements
 4. Domain dominance
 5. Exfiltration

To learn more about how to understand the structure, and common components of
all Defender for Identity security alerts, see Understanding security alerts.
For information about True positive (TP), Benign true positive (B-TP), and False
positive (FP), see security alert classifications.

The following security alerts help you identify and remediate Compromised
credential phase suspicious activities detected by Defender for Identity in your
network. In this tutorial, you'll learn how to understand, classify, remediate
and prevent the following types of attacks:

 * Suspicious modification of a sAMNameAccount attribute (CVE-2021-42278 and
   CVE-2021-42287 exploitation) (external ID 2419)
 * Honeytoken activity (external ID 2014)
 * Suspected Brute Force attack (Kerberos, NTLM) (external ID 2023)
 * Suspected Brute Force attack (LDAP) (external ID 2004)
 * Suspected Brute Force attack (SMB) (external ID 2033)
 * Suspected Kerberos SPN exposure (external ID 2410)
 * Suspected Netlogon privilege elevation attempt (CVE-2020-1472 exploitation)
   (external ID 2411)
 * Suspected AS-REP Roasting attack (external ID 2412)
 * Suspected WannaCry ransomware attack (external ID 2035)
 * Suspected use of Metasploit hacking framework (external ID 2034)
 * Suspicious VPN connection (external ID 2025)


SUSPICIOUS MODIFICATION OF A SAMNAMEACCOUNT ATTRIBUTE (CVE-2021-42278 AND
CVE-2021-42287 EXPLOITATION) (EXTERNAL ID 2419)

Description

An attacker can create a straightforward path to a Domain Admin user in an
Active Directory environment that isn't patched. This escalation attack allows
attackers to easily elevate their privilege to that of a Domain Admin once they
compromise a regular user in the domain.

When performing an authentication using Kerberos, Ticket-Granting-Ticket (TGT)
and the Ticket-Granting-Service (TGS) are requested from the Key Distribution
Center (KDC). If a TGS was requested for an account that couldn't be found, the
KDC will attempt to search it again with a trailing $.

When processing the TGS request, the KDC will fail its lookup for the requestor
machine DC1 the attacker created. Therefore, the KDC will perform another lookup
appending a trailing $. The lookup will succeed. As a result, the KDC will issue
the ticket using the privileges of DC1$.

Combining CVEs CVE-2021-42278 and CVE-2021-42287, an attacker with domain user
credentials can leverage them for granting access as a domain admin.

MITRE

Primary MITRE tactic Credential Access (TA0006) MITRE attack technique Access
Token Manipulation (T1134),Exploitation for Privilege Escalation (T1068),Steal
or Forge Kerberos Tickets (T1558) MITRE attack sub-technique Token
Impersonation/Theft (T1134.001)

Learning period

None

TP, B-TP, or FP

 1. Check and investigate the source computer and its original usage.
 2. Follow the instructions in Understand the scope of the breach.

Understand the scope of the breach

 1. Investigate the source computer.
 2. Investigate the target domain controller and identify activities that
    occurred after the attack.

Remediation:

 1. Contain the source computer.
    
    * Find the tool that performed the attack and remove it.
    * Look for users who were logged on around the same time as the activity
      occurred, as these users may also be compromised. If you have configured
      the relevant high-risk user policies in Azure Active Directory Identity
      Protection, you can confirm the user is compromised in the Microsoft 365
      Defender user page.


HONEYTOKEN ACTIVITY (EXTERNAL ID 2014)

Previous name: Honeytoken activity

Description

Honeytoken accounts are decoy accounts set up to identify and track malicious
activity that involves these accounts. Honeytoken accounts should be left unused
while having an attractive name to lure attackers (for example, SQL-Admin). Any
activity from them might indicate malicious behavior.

For more information on honeytoken accounts, see Manage sensitive or honeytoken
accounts.

MITRE

Primary MITRE tactic Credential Access (TA0006) Secondary MITRE tactic Discovery
MITRE attack technique Account Discovery (T1087) MITRE attack sub-technique
Domain Account (T1087.002)

TP, B-TP, or FP

 1. Check if the owner of the source computer used the Honeytoken account to
    authenticate, using the method described in the suspicious activity page
    (for example, Kerberos, LDAP, NTLM).
    
    If the owner of the source computer used the honeytoken account to
    authenticate, using the exact method described in the alert, Close the
    security alert, as a B-TP activity.

Understand the scope of the breach

 1. Investigate the source user.

 2. Investigate the source computer.
    
    Note
    
    If the authentication was made using NTLM, in some scenarios, there may not
    be enough information available about the server the source computer tried
    to access. Defender for Identity captures the source computer data based on
    Windows Event 4776, which contains the computer defined source computer
    name. Using Windows Event 4776 to capture this information, the source field
    for this information is occasionally overwritten by the device or software
    to display only Workstation or MSTSC. If you frequently have devices that
    display as Workstation or MSTSC, make sure to enable NTLM auditing on the
    relevant domain controllers to get the true source computer name. To enable
    NTLM auditing, turn on Windows Event 8004 (NTLM authentication event that
    includes information about the source computer, user account, and the server
    the source machine tried to access).

Suggested remediation and steps for prevention

 1. Contain the source computer.
    * Find the tool that performed the attack and remove it.
    * Look for users who were logged on around the same time as the activity
      occurred, as these users may also be compromised. Reset their passwords
      and enable MFA or, if you have configured the relevant high-risk user
      policies in Azure Active Directory Identity Protection, you can confirm
      the user is compromised in the Microsoft 365 Defender user page.


SUSPECTED BRUTE FORCE ATTACK (KERBEROS, NTLM) (EXTERNAL ID 2023)

Previous name: Suspicious authentication failures

Description

In a brute-force attack, the attacker attempts to authenticate with multiple
passwords on different accounts until a correct password is found or by using
one password in a large-scale password spray that works for at least one
account. Once found, the attacker logs in using the authenticated account.

In this detection, an alert is triggered when many authentication failures occur
using Kerberos, NTLM, or use of a password spray is detected. Using Kerberos or
NTLM, this type of attack is typically committed either horizontal, using a
small set of passwords across many users, vertical with a large set of passwords
on a few users, or any combination of the two.

In a password spray, after successfully enumerating a list of valid users from
the domain controller, attackers try ONE carefully crafted password against ALL
of the known user accounts (one password to many accounts). If the initial
password spray fails, they try again, utilizing a different carefully crafted
password, normally after waiting 30 minutes between attempts. The wait time
allows attackers to avoid triggering most time-based account lockout thresholds.
Password spray has quickly become a favorite technique of both attackers and pen
testers. Password spray attacks have proven to be effective at gaining an
initial foothold in an organization, and for making subsequent lateral moves,
trying to escalate privileges. The minimum period before an alert can be
triggered is one week.

MITRE

Primary MITRE tactic Credential Access (TA0006) MITRE attack technique Brute
Force (T1110) MITRE attack sub-technique Password Guessing (T1110.001), Password
Spraying (T1110.003)

Learning period

1 week

TP, B-TP, or FP

It is important to check if any login attempts ended with successful
authentication.

 1. If any login attempts ended successfully, check if any of the Guessed
    accounts are normally used from that source computer.
    
    * Is there any chance these accounts failed because a wrong password was
      used?
    
    * Check with the user(s) if they generated the activity, (failed to login a
      fe times and then succeeded).
      
      If the answer to the questions above is yes, Close the security alert as a
      B-TP activity.

 2. If there are no Guessed accounts, check if any of the Attacked accounts are
    normally used from the source computer.
    
    * Check if there is a script running on the source computer with wrong/old
      credentials?
    * If the answer to the previous question is yes, stop and edit, or delete
      the script. Close the security alert as a B-TP activity.

Understand the scope of the breach

 1. Investigate the source computer.

 2. On the alert page, check which, if any, users were guessed successfully.
    
    * For each user that was guessed successfully, check their profile to
      investigate further.
    
    Note
    
    Examine the evidence to learn the authentication protocol used. If NTLM
    authentication was used, enable NTLM auditing of Windows Event 8004 on the
    domain controller to determine the resource server the users attempted to
    access. Windows Event 8004 is the NTLM authentication event that includes
    information about the source computer, user account, and server that the
    source user account attempted to access. Defender for Identity captures the
    source computer data based on Windows Event 4776, which contains the
    computer defined source computer name. Using Windows Event 4776 to capture
    this information, the information source field is occasionally overwritten
    by the device or software and only displays Workstation or MSTSC as the
    information source. In addition, the source computer might not actually
    exist on your network. This is possible because adversaries commonly target
    open, internet-accessible servers from outside the network and then use it
    to enumerate your users. If you frequently have devices that display as
    Workstation or MSTSC, make sure to enable NTLM auditing on the domain
    controllers to get the accessed resource server name. You should also
    investigate this server, check if it is opened to the internet, and if you
    can, close it.

 3. When you learn which server sent the authentication validation, investigate
    the server by checking events, such as Windows Event 4624, to better
    understand the authentication process.

 4. Check if this server is exposed to the internet using any open ports. For
    example, is the server open using RDP to the internet?

Suggested remediation and steps for prevention

 1. Reset the passwords of the guessed users and enable MFA or, if you have
    configured the relevant high-risk user policies in Azure Active Directory
    Identity Protection, you can confirm the user is compromised in the
    Microsoft 365 Defender user page.
 2. Contain the source computer.
    * Find the tool that performed the attack and remove it.
    * Look for users who were logged on around the same time as the activity
      occurred, as these users may also be compromised. Reset their passwords
      and enable MFA or, if you have configured the relevant high-risk user
      policies in Azure Active Directory Identity Protection, you can confirm
      the user is compromised in the Microsoft 365 Defender user page.
 3. Reset the passwords of the source user and enable MFA or, if you have
    configured the relevant high-risk user policies in Azure Active Directory
    Identity Protection, you can confirm the user is compromised in the
    Microsoft 365 Defender user page.
 4. Enforce complex and long passwords in the organization, it will provide the
    necessary first level of security against future brute-force attacks.


SUSPECTED BRUTE FORCE ATTACK (LDAP) (EXTERNAL ID 2004)

Previous name: Brute force attack using LDAP simple bind

Description

In a brute-force attack, the attacker attempts to authenticate with many
different passwords for different accounts until a correct password is found for
at least one account. Once found, an attacker can log in using that account.

In this detection, an alert is triggered when Defender for Identity detects a
massive number of simple bind authentications. This alert detects brute force
attacks performed either horizontally with a small set of passwords across many
users, vertically with a large set of passwords on just a few users, or any
combination of the two options. The alert is based on authentication events from
sensors running on domain controller and AD FS servers.

MITRE

Primary MITRE tactic Credential Access (TA0006) MITRE attack technique Brute
Force (T1110) MITRE attack sub-technique Password Guessing (T1110.001), Password
Spraying (T1110.003)

TP, B-TP, or FP

It is important to check if any login attempts ended with successful
authentication.

 1. If any login attempts ended successfully, are any of the Guessed accounts
    normally used from that source computer?
    
    * Is there any chance these accounts failed because a wrong password was
      used?
    
    * Check with the user(s) if they generated the activity, (failed to login a
      few times and then succeeded).
      
      If the answer to the previous questions is yes, Close the security alert
      as a B-TP activity.

 2. If there are no Guessed accounts, check if any of the Attacked accounts are
    normally used from the source computer.
    
    * Check if there is a script running on the source computer with wrong/old
      credentials?
      
      If the answer to the previous question is yes, stop and edit, or delete
      the script. Close the security alert as a B-TP activity.

Understand the scope of the breach

 1. Investigate the source computer.
 2. On the alert page, check which users, if any, were guessed successfully. For
    each user that was guessed successfully, check their profile to investigate
    further.

Suggested remediation and steps for prevention

 1. Reset the passwords of the guessed users and enable MFA or, if you have
    configured the relevant high-risk user policies in Azure Active Directory
    Identity Protection, you can confirm the user is compromised in the
    Microsoft 365 Defender user page.
 2. Contain the source computer.
    * Find the tool that performed the attack and remove it.
    * Look for users who were logged on around the same time as the activity
      occurred, as these users may also be compromised. Reset their passwords
      and enable MFA or, if you have configured the relevant high-risk user
      policies in Azure Active Directory Identity Protection, you can confirm
      the user is compromised in the Microsoft 365 Defender user page.
 3. Reset the passwords of the source user and enable MFA or, if you have
    configured the relevant high-risk user policies in Azure Active Directory
    Identity Protection, you can confirm the user is compromised in the
    Microsoft 365 Defender user page.
 4. Enforce complex and long passwords in the organization, it will provide the
    necessary first level of security against future brute-force attacks.
 5. Prevent future usage of LDAP clear text protocol in your organization.


SUSPECTED BRUTE FORCE ATTACK (SMB) (EXTERNAL ID 2033)

Previous name: Unusual protocol implementation (potential use of malicious tools
such as Hydra)

Description

Attackers use tools that implement various protocols such as SMB, Kerberos, and
NTLM in non-standard ways. While this type of network traffic is accepted by
Windows without warnings, Defender for Identity is able to recognize potential
malicious intent. The behavior is indicative of brute force techniques.

MITRE

Primary MITRE tactic Lateral Movement (TA0008) MITRE attack technique Brute
Force (T1110) MITRE attack sub-technique Password Guessing (T1110.001), Password
Spraying (T1110.003)

TP, B-TP, or FP

 1. Check if the source computer is running an attack tool such as Hydra.
    1. If the source computer is running an attack tool, this alert is a TP.
       Follow the instructions in Understand the scope of the breach.

Occasionally, applications implement their own NTLM or SMB stack.

 1. Check if the source computer is running its own NTLM or SMB stack type of
    application.
    1. If the source computer is found running that type of application, and it
       should not continue to run, fix the application configuration as needed.
       Close the security alert as a B-TP activity.
    2. If the source computer is found running that type of application, and it
       should continue doing so, Close the security alert as a B-TP activity,
       and exclude that computer.

Understand the scope of the breach

 1. Investigate the source computer.
 2. Investigate the source user) (if there is a source user).

Suggested remediation and steps for prevention

 1. Reset the passwords of the guessed users and enable MFA or, if you have
    configured the relevant high-risk user policies in Azure Active Directory
    Identity Protection, you can confirm the user is compromised in the
    Microsoft 365 Defender user page.
 2. Contain the source computer
    1. Find the tool that performed the attack and remove it.
    2. Search for users logged on around the time of the activity, as they may
       also be compromised.
    3. Reset their passwords and enable MFA or, if you have configured the
       relevant high-risk user policies in Azure Active Directory Identity
       Protection, you can confirm the user is compromised in the Microsoft 365
       Defender user page.
 3. Enforce Complex and long passwords in the organization. Complex and long
    passwords provide the necessary first level of security against future
    brute-force attacks.
 4. Disable SMBv1


SUSPECTED KERBEROS SPN EXPOSURE (EXTERNAL ID 2410)

Description

Attackers use tools to enumerate service accounts and their respective SPNs
(Service principal names), request a Kerberos service ticket for the services,
capture the Ticket Granting Service (TGS) tickets from memory and extract their
hashes, and save them for later use in an offline brute force attack.

MITRE

Primary MITRE tactic Credential Access (TA0006) MITRE attack technique Steal or
Forge Kerberos Tickets (T1558) MITRE attack sub-technique Kerberoasting
(T1558.003)

Learning period

None

TP, B-TP, or FP

 1. Check if the source computer is running an attack tool, such as PowerSploit
    or Rubeus.
    1. If yes, it is a true positive. Follow the instructions in Understand the
       scope of the breach.
    2. If the source computer is found running that type of application, and it
       should continue doing so, Close the security alert as a B-TP activity,
       and exclude that computer.

Understand the scope of the breach

 1. Investigate the exposed accounts. Check for malicious activity or suspicious
    behavior for these accounts.
 2. Investigate the source computer.

Remediation:

 1. Contain the source computer.
    * Find the tool that performed the attack and remove it.
    * Look for users who were logged on around the same time as the activity
      occurred, as these users may also be compromised. Reset their passwords
      and enable MFA or, if you have configured the relevant high-risk user
      policies in Azure Active Directory Identity Protection, you can confirm
      the user is compromised in the Microsoft 365 Defender user page.
 2. Reset the passwords of the exposed users and enable MFA or, if you have
    configured the relevant high-risk user policies in Azure Active Directory
    Identity Protection, you can confirm the user is compromised in the
    Microsoft 365 Defender user page.




SUSPECTED NETLOGON PRIVILEGE ELEVATION ATTEMPT (CVE-2020-1472 EXPLOITATION)
(EXTERNAL ID 2411)

Microsoft published CVE-2020-1472 announcing that a new vulnerability exists
that allows the elevation of privileges to the domain controller.

An elevation of privilege vulnerability exists when an attacker establishes a
vulnerable Netlogon secure channel connection to a domain controller, using the
Netlogon Remote Protocol (MS-NRPC), also known as Netlogon Elevation of
Privilege Vulnerability.

MITRE

|Primary MITRE tactic | Privilege Escalation (TA0004) |

Learning period

None

TP, B-TP, or FP

If the source computer is a domain controller (DC), failed or low certainty
resolution can prevent Defender for Identity from being able to confirm its
identification.

 1. If the source computer is a domain controller, Close the alert as a B-TP
    activity.

 2. If this source computer is supposed to generate this type of activity and is
    expected to continue generating this type of activity in the future, Close
    the security alert as a B-TP activity and exclude the computer to avoid
    additional benign alerts.

Otherwise, consider this alert a TP and follow the instructions in Understand
the scope of the breach.

Understand the scope of the breach

 1. Investigate source computer, check for malicious scripts or tools that made
    the connection to the DC.

 2. Investigate the destination DC for any suspicious activities that happened
    after the vulnerability was used.

Remediation:

 1. Patch all of your machines making sure to apply security updates.
 2. Review our guidance on managing changes in Netlogon secure channel
    connection which relate to and can prevent this vulnerability.
 3. Contain the source computer.
    * Find the tool that performed the attack and remove it.


SUSPECTED AS-REP ROASTING ATTACK (EXTERNAL ID 2412)

Attackers use tools to detect accounts with their Kerberos preauthentication
disabled and send AS-REQ requests without the encrypted timestamp. In response
they receive AS-REP messages with TGT data, which may be encrypted with an
insecure algorithm such as RC4, and save them for later use in an offline
password cracking attack (similar to Kerberoasting) and expose plaintext
credentials.

MITRE

Primary MITRE tactic Credential Access (TA0006) MITRE attack technique Steal or
Forge Kerberos Tickets (T1558) MITRE attack sub-technique AS-REP Roasting
(T1558.004)

Learning period

None

TP, B-TP, or FP

 1. Check if the source computer is running an attack tool, such as PowerSploit
    or Rubeus.
    1. If yes, it is a true positive. Follow the instructions in Understand the
       scope of the breach.
    2. If the source computer is found running that type of application, and it
       should continue doing so, Close the security alert as a B-TP activity,
       and exclude that computer.

Understand the scope of the breach

 1. Investigate the exposed accounts. Check for malicious activity or suspicious
    behavior for these accounts.
 2. Investigate the source computer.

Remediation:

 1. Contain the source computer.
    * Find the tool that performed the attack and remove it.
    * Look for users who were logged on around the same time as the activity
      occurred, as these users may also be compromised. Reset their passwords
      and enable MFA or, if you have configured the relevant high-risk user
      policies in Azure Active Directory Identity Protection, you can confirm
      the user is compromised in the Microsoft 365 Defender user page.
 2. Enable Kerberos preauthentication. For more information about account
    attributes and how to remediate them, see Unsecure account attributes.


SUSPECTED WANNACRY RANSOMWARE ATTACK (EXTERNAL ID 2035)

Previous name: Unusual protocol implementation (potential WannaCry ransomware
attack)

Description

Attackers use tools that implement various protocols in non-standard ways. While
this type of network traffic is accepted by Windows without warnings, Defender
for Identity is able to recognize potential malicious intent. The behavior is
indicative of techniques used by advanced ransomware, such as WannaCry.

MITRE

Primary MITRE tactic Lateral Movement (TA0008) MITRE attack technique
Exploitation of Remote Services (T1210) MITRE attack sub-technique N/A

TP, B-TP, or FP

 1. Check if WannaCry is running on the source computer.
    
    * If WannaCry is running, this alert is a TP. Follow the instructions in
      understand the scope of the breach, above.

Occasionally, applications implement their own NTLM or SMB stack.

 1. Check if the source computer is running its own NTLM or SMB stack type of
    application.
    1. If the source computer is found running that type of application, and it
       should not continue to run, fix the application configuration as needed.
       Close the security alert as a B-TP activity.
    2. If the source computer is found running that type of application, and it
       should continue doing so, Close the security alert as a B-TP activity,
       and exclude that computer.

Understand the scope of the breach

 1. Investigate the source computer.
 2. Investigate the compromised user.

Suggested remediation and steps for prevention

 1. Contain the source computer.
    * Remove WannaCry
    * WannaCry can decrypt the data in the hands of some ransom software, but
      only if the user has not restarted or turned off the computer. For more
      information, see WannaCry Ransomware
    * Look for users logged on around the time of the activity, as they might
      also be compromised. Reset their passwords and enable MFA or, if you have
      configured the relevant high-risk user policies in Azure Active Directory
      Identity Protection, you can confirm the user is compromised in the
      Microsoft 365 Defender user page.
 2. Patch all of your machines, making sure to apply security updates.
    * Disable SMBv1


SUSPECTED USE OF METASPLOIT HACKING FRAMEWORK (EXTERNAL ID 2034)

Previous name: Unusual protocol implementation (potential use of Metasploit
hacking tools)

Description

Attackers use tools that implement various protocols (SMB, Kerberos, NTLM) in
non-standard ways. While this type of network traffic is accepted by Windows
without warnings, Defender for Identity is able to recognize potential malicious
intent. The behavior is indicative of techniques such as use of the Metasploit
hacking framework.

MITRE

Primary MITRE tactic Lateral Movement (TA0008) MITRE attack technique
Exploitation of Remote Services (T1210) MITRE attack sub-technique N/A

TP, B-TP, or FP

 1. Check if the source computer is running an attack tool such as Metasploit or
    Medusa.

 2. If yes, it is a true positive. Follow the instructions in understand the
    scope of the breach, above.

Occasionally, applications implement their own NTLM or SMB stack.

 1. Check if the source computer is running its own NTLM or SMB stack type of
    application.
    1. If the source computer is found running that type of application, and it
       should not continue to run, fix the application configuration as needed.
       Close the security alert as a B-TP activity.
    2. If the source computer is found running that type of application, and it
       should continue doing so, Close the security alert as a B-TP activity,
       and exclude that computer.

Understand the scope of the breach

 1. Investigate the source computer.
 2. If there is a source user, investigate the user.

Suggested remediation and steps for prevention

 1. Reset the passwords of the guessed users and enable MFA or, if you have
    configured the relevant high-risk user policies in Azure Active Directory
    Identity Protection, you can confirm the user is compromised in the
    Microsoft 365 Defender user page.
 2. Contain the source computer.
    1. Find the tool that performed the attack and remove it.
    2. Search for users logged on around the time of the activity, as they may
       also be compromised. Reset their passwords and enable MFA or, if you have
       configured the relevant high-risk user policies in Azure Active Directory
       Identity Protection, you can confirm the user is compromised in the
       Microsoft 365 Defender user page.
 3. Reset the passwords of the source user and enable MFA or, if you have
    configured the relevant high-risk user policies in Azure Active Directory
    Identity Protection, you can confirm the user is compromised in the
    Microsoft 365 Defender user page.
 4. Disable SMBv1


SUSPICIOUS VPN CONNECTION (EXTERNAL ID 2025)

Previous name: Suspicious VPN connection

Description

Defender for Identity learns the entity behavior for users VPN connections over
a sliding period of one month.

The VPN-behavior model is based on the machines users log in to and the
locations the users connect from.

An alert is opened when there is a deviation from the user's behavior based on a
machine learning algorithm.

MITRE

Primary MITRE tactic Defense Evasion (TA0005) Secondary MITRE tactic Persistence
(TA0003) MITRE attack technique External Remote Services (T1133) MITRE attack
sub-technique N/A

Learning period

30 days from the first VPN connection, and at least 5 VPN connections in the
last 30 days, per user.

TP, B-TP, or FP

 1. Is the suspicious user supposed to be performing these operations?
    1. Did the user recently change their location?
    2. Is the user travelling and connecting from a new device?

If the answer is yes to the questions above, Close the security alert as a B-TP
activity.

Understand the scope of the breach

 1. Investigate the source computer.
 2. If there is a source user, investigate the user.

Suggested remediation and steps for prevention

 1. Reset the password of the user and enable MFA or, if you have configured the
    relevant high-risk user policies in Azure Active Directory Identity
    Protection, you can confirm the user is compromised in the Microsoft 365
    Defender user page.
 2. Consider blocking this user from connecting using VPN.
 3. Consider blocking this computer from connecting using VPN.
 4. Check if there are other users connected through VPN from these locations,
    and check if they are compromised.

Lateral Movement alert tutorial


SEE ALSO

 * Investigate a computer
 * Investigate a user
 * Working with security alerts
 * Working with lateral movement paths
 * Reconnaissance alerts
 * Lateral movement alerts
 * Domain dominance alerts
 * Exfiltration alerts
 * Check out the Defender for Identity forum!







FEEDBACK

Submit and view feedback for

This product This page
View all page feedback

Theme
 * Light
 * Dark
 * High contrast

 * 
 * Previous Version Docs
 * Blog
 * Contribute
 * Privacy & Cookies
 * Terms of Use
 * Trademarks
 * © Microsoft 2022


IN THIS ARTICLE




Theme
 * Light
 * Dark
 * High contrast

 * 
 * Previous Version Docs
 * Blog
 * Contribute
 * Privacy & Cookies
 * Terms of Use
 * Trademarks
 * © Microsoft 2022