learn.microsoft.com
Open in
urlscan Pro
2a02:26f0:480:b90::3544
Public Scan
Submitted URL: https://docs.microsoft.com/azure/active-directory/fundamentals/security-operations-user-accounts#short-lived-account
Effective URL: https://learn.microsoft.com/en-us/entra/architecture/security-operations-user-accounts
Submission: On April 09 via api from DE — Scanned from DE
Effective URL: https://learn.microsoft.com/en-us/entra/architecture/security-operations-user-accounts
Submission: On April 09 via api from DE — Scanned from DE
Form analysis
3 forms found in the DOMName: site-header-search-form-mobile — GET /en-us/search/
<form class="flex-grow-1" method="GET" role="search" id="ms--site-header-search-form-mobile" data-bi-name="site-header-search-form-mobile" name="site-header-search-form-mobile" aria-label="Search" action="/en-us/search/">
<div class="autocomplete display-block" data-bi-name="autocomplete"><!---->
<div class="field-body control ">
<input role="combobox" maxlength="100" aria-autocomplete="list" autocapitalize="off" autocomplete="off" autocorrect="off" spellcheck="false" id="site-header-search-autocomplete-input-mobile"
data-test-id="site-header-search-autocomplete-input-mobile" class="autocomplete-input input
width-full" type="search" name="terms" aria-expanded="false" aria-owns="ax-1-listbox" aria-controls="ax-1-listbox" aria-activedescendant="" aria-label="Search" aria-describedby="ms--site-header-search-autocomplete-input-mobile-description"
placeholder="Search" data-bi-name="site-header-search-autocomplete-input-mobile" pattern=".*">
<span aria-hidden="true" class="autocomplete-loader loader has-text-primary " hidden=""></span>
<span hidden="" id="ms--site-header-search-autocomplete-input-mobile-description"> Suggestions will filter as you type </span>
</div>
<ul role="listbox" id="ax-1-listbox" data-test-id="site-header-search-autocomplete-input-mobile-listbox" class="autocomplete-suggestions is-vertically-scrollable padding-xxs " aria-label="Suggestions" hidden="">
</ul>
<!---->
</div>
<!-- mobile safari will not dispatch submit event unless there's a submit button that is not display:none -->
<button type="submit" class="visually-hidden" tabindex="-1" aria-hidden="true"></button>
<input name="category" hidden="" value="">
</form>
Name: site-header-search-form — GET /en-us/search/
<form class="flex-grow-1" method="GET" role="search" id="ms--site-header-search-form" data-bi-name="site-header-search-form" name="site-header-search-form" aria-label="Search" action="/en-us/search/">
<div class="autocomplete display-block" data-bi-name="autocomplete"><!---->
<div class="field-body control ">
<input role="combobox" maxlength="100" aria-autocomplete="list" autocapitalize="off" autocomplete="off" autocorrect="off" spellcheck="false" id="site-header-search-autocomplete-input" data-test-id="site-header-search-autocomplete-input" class="autocomplete-input input input-sm
width-full" type="search" name="terms" aria-expanded="false" aria-owns="ax-0-listbox" aria-controls="ax-0-listbox" aria-activedescendant="" aria-label="Search" aria-describedby="ms--site-header-search-autocomplete-input-description"
placeholder="Search" data-bi-name="site-header-search-autocomplete-input" pattern=".*">
<span aria-hidden="true" class="autocomplete-loader loader has-text-primary " hidden=""></span>
<span hidden="" id="ms--site-header-search-autocomplete-input-description"> Suggestions will filter as you type </span>
</div>
<ul role="listbox" id="ax-0-listbox" data-test-id="site-header-search-autocomplete-input-listbox" class="autocomplete-suggestions is-vertically-scrollable padding-xxs " aria-label="Suggestions" hidden="">
</ul>
<!---->
</div>
<!-- mobile safari will not dispatch submit event unless there's a submit button that is not display:none -->
<button type="submit" class="visually-hidden" tabindex="-1" aria-hidden="true"></button>
<input name="category" hidden="" value="">
</form>
javascript:
<form action="javascript:" role="search" aria-label="Search" class="margin-bottom-xxs"><label class="visually-hidden" for="ax-2">Search</label>
<div class="autocomplete display-block" data-bi-name="autocomplete"><!---->
<div class="field-body control has-icons-left">
<input role="combobox" maxlength="100" aria-autocomplete="list" autocapitalize="off" autocomplete="off" autocorrect="off" spellcheck="false" id="ax-2" data-test-id="ax-2" class="autocomplete-input input input-sm
control has-icons-left
width-full" type="text" aria-expanded="false" aria-owns="ax-3-listbox" aria-controls="ax-3-listbox" aria-activedescendant="" aria-describedby="ms--ax-2-description" placeholder="Filter by title" pattern=".*">
<span aria-hidden="true" class="icon is-small is-left">
<span class="has-text-primary docon docon-filter-settings"></span>
</span>
<span aria-hidden="true" class="autocomplete-loader loader has-text-primary " hidden=""></span>
<span hidden="" id="ms--ax-2-description"> Suggestions will filter as you type </span>
</div>
<ul role="listbox" id="ax-3-listbox" data-test-id="ax-2-listbox" class="autocomplete-suggestions is-vertically-scrollable padding-xxs " aria-label="Suggestions" hidden="">
</ul>
<!---->
</div>
</form>
Text Content
Skip to main content We use optional cookies to improve your experience on our websites, such as through social media connections, and to display personalized advertising based on your online activity. If you reject optional cookies, only cookies necessary to provide you the services will be used. You may change your selection by clicking “Manage Cookies” at the bottom of the page. Privacy Statement Third-Party Cookies Accept Reject Manage cookies This browser is no longer supported. Upgrade to Microsoft Edge to take advantage of the latest features, security updates, and technical support. Download Microsoft Edge More info about Internet Explorer and Microsoft Edge Learn Suggestions will filter as you type Sign in * Profile * Settings Sign out Learn * Discover * Documentation In-depth articles on Microsoft developer tools and technologies * Training Personalized learning paths and courses * Credentials Globally recognized, industry-endorsed credentials * Q&A Technical questions and answers moderated by Microsoft * Code Samples Code sample library for Microsoft developer tools and technologies * Assessments Interactive, curated guidance and recommendations * Shows Thousands of hours of original programming from Microsoft experts Featured assessment It's your AI learning journey Wherever you are in your AI journey, Microsoft Learn meets you where you are and helps you deepen your skills. * Product documentation * ASP.NET * Azure * Dynamics 365 * Microsoft 365 * Microsoft Edge * Microsoft Entra * Microsoft Graph * Microsoft Intune * Microsoft Purview * Microsoft Teams * .NET * Power Apps * Power Automate * Power BI * Power Platform * PowerShell * SQL * Sysinternals * Visual Studio * Windows * Windows Server View all products Featured assessment It's your AI learning journey Wherever you are in your AI journey, Microsoft Learn meets you where you are and helps you deepen your skills. * Development languages * C++ * DAX * Java * OData * OpenAPI * Power Query M * VBA Featured assessment It's your AI learning journey Wherever you are in your AI journey, Microsoft Learn meets you where you are and helps you deepen your skills. * Topics * Artificial intelligence * Compliance * DevOps * Platform engineering * Security Featured assessment It's your AI learning journey Wherever you are in your AI journey, Microsoft Learn meets you where you are and helps you deepen your skills. Suggestions will filter as you type Sign in * Profile * Settings Sign out Microsoft Entra * Microsoft Entra ID * External ID * Global Secure Access * ID Governance * Permissions Management * Microsoft Security documentation * More * Microsoft Entra ID * External ID * Global Secure Access * ID Governance * Permissions Management * Microsoft Security documentation Admin center Table of contents Exit focus mode Search Suggestions will filter as you type * Architecture * Microsoft Entra architecture * Microsoft Entra architecture icons * Road to the cloud * Parallel identity options * Automate identity provisioning to applications * Multitenant user management * University multilateral federation solutions * Microsoft Entra ID guide for independent software developers * Authentication protocols * Provisioning protocols * Recoverability * Build for resilience * Secure with Microsoft Entra ID * Deployment guide * Migration best practices * Microsoft Entra Operations reference * Microsoft Entra Permissions Management Operations reference * Security * Security baseline * Security operations guide * Security operations overview * Security operations for user accounts * Security operations for consumer accounts * Security operations for privileged accounts * Security operations for PIM * Security operations for applications * Security operations for devices * Security operations for Infrastructure * Protect Microsoft 365 from on-premises attacks * Secure external collaboration * Secure service accounts Download PDF 1. Learn 2. Microsoft Entra 3. Architecture 1. Learn 2. Microsoft Entra 3. Architecture Read in English Add Table of contents Read in English Add to Collections Edit Print Twitter LinkedIn Facebook Email Table of contents MICROSOFT ENTRA SECURITY OPERATIONS FOR USER ACCOUNTS * Article * 10/23/2023 * 7 contributors Feedback IN THIS ARTICLE 1. Define a baseline 2. Where to look 3. Account creation 4. Unusual sign-ins 5. Next steps User identity is one of the most important aspects of protecting your organization and data. This article provides guidance for monitoring account creation, deletion, and account usage. The first portion covers how to monitor for unusual account creation and deletion. The second portion covers how to monitor for unusual account usage. If you have not yet read the Microsoft Entra security operations overview, we recommend you do so before proceeding. This article covers general user accounts. For privileged accounts, see Security operations – privileged accounts. DEFINE A BASELINE To discover anomalous behavior, you first must define what normal and expected behavior is. Defining what expected behavior for your organization is, helps you determine when unexpected behavior occurs. The definition also helps to reduce the noise level of false positives when monitoring and alerting. Once you define what you expect, you perform baseline monitoring to validate your expectations. With that information, you can monitor the logs for anything that falls outside of tolerances you define. Use the Microsoft Entra audit logs, Microsoft Entra sign-in logs, and directory attributes as your data sources for accounts created outside of normal processes. The following are suggestions to help you think about and define what normal is for your organization. * Users account creation – evaluate the following: * Strategy and principles for tools and processes used for creating and managing user accounts. For example, are there standard attributes, formats that are applied to user account attributes. * Approved sources for account creation. For example, originating in Active Directory (AD), Microsoft Entra ID or HR systems like Workday. * Alert strategy for accounts created outside of approved sources. Is there a controlled list of organizations your organization collaborates with? * Provisioning of guest accounts and alert parameters for accounts created outside of entitlement management or other normal processes. * Strategy and alert parameters for accounts created, modified, or disabled by an account that isn't an approved user administrator. * Monitoring and alert strategy for accounts missing standard attributes, such as employee ID or not following organizational naming conventions. * Strategy, principles, and process for account deletion and retention. * On-premises user accounts – evaluate the following for accounts synced with Microsoft Entra Connect: * The forests, domains, and organizational units (OUs) in scope for synchronization. Who are the approved administrators who can change these settings and how often is the scope checked? * The types of accounts that are synchronized. For example, user accounts and or service accounts. * The process for creating privileged on-premises accounts and how the synchronization of this type of account is controlled. * The process for creating on-premises user accounts and how the synchronization of this type of account is managed. For more information for securing and monitoring on-premises accounts, see Protecting Microsoft 365 from on-premises attacks. * Cloud user accounts – evaluate the following: * The process to provision and manage cloud accounts directly in Microsoft Entra ID. * The process to determine the types of users provisioned as Microsoft Entra cloud accounts. For example, do you only allow privileged accounts or do you also allow user accounts? * The process to create and maintain a list of trusted individuals and or processes expected to create and manage cloud user accounts. * The process to create and maintained an alert strategy for non-approved cloud-based accounts. WHERE TO LOOK The log files you use for investigation and monitoring are: * Microsoft Entra audit logs * Sign-in logs * Microsoft 365 Audit logs * Azure Key Vault logs * Risky Users log * UserRiskEvents log From the Azure portal, you can view the Microsoft Entra audit logs and download as comma separated value (CSV) or JavaScript Object Notation (JSON) files. The Azure portal has several ways to integrate Microsoft Entra logs with other tools that allow for greater automation of monitoring and alerting: * Microsoft Sentinel – enables intelligent security analytics at the enterprise level by providing security information and event management (SIEM) capabilities. * Sigma rules - Sigma is an evolving open standard for writing rules and templates that automated management tools can use to parse log files. Where Sigma templates exist for our recommended search criteria, we've added a link to the Sigma repo. The Sigma templates aren't written, tested, and managed by Microsoft. Rather, the repo and templates are created and collected by the worldwide IT security community. * Azure Monitor – enables automated monitoring and alerting of various conditions. Can create or use workbooks to combine data from different sources. * Azure Event Hubs integrated with a SIEM - Microsoft Entra logs can be integrated to other SIEMs such as Splunk, ArcSight, QRadar and Sumo Logic via the Azure Event Hubs integration. * Microsoft Defender for Cloud Apps – enables you to discover and manage apps, govern across apps and resources, and check your cloud apps' compliance. * Securing workload identities with Identity Protection Preview - Used to detect risk on workload identities across sign-in behavior and offline indicators of compromise. Much of what you will monitor and alert on are the effects of your Conditional Access policies. You can use the Conditional Access insights and reporting workbook to examine the effects of one or more Conditional Access policies on your sign-ins, and the results of policies, including device state. This workbook enables you to view a summary, and identify the effects over a specific time period. You can also use the workbook to investigate the sign-ins of a specific user. The remainder of this article describes what we recommend you monitor and alert on, and is organized by the type of threat. Where there are specific pre-built solutions we link to them or provide samples following the table. Otherwise, you can build alerts using the preceding tools. ACCOUNT CREATION Anomalous account creation can indicate a security issue. Short lived accounts, accounts not following naming standards, and accounts created outside of normal processes should be investigated. SHORT-LIVED ACCOUNTS Account creation and deletion outside of normal identity management processes should be monitored in Microsoft Entra ID. Short-lived accounts are accounts created and deleted in a short time span. This type of account creation and quick deletion could mean a bad actor is trying to avoid detection by creating accounts, using them, and then deleting the account. Short-lived account patterns might indicate non-approved people or processes might have the right to create and delete accounts that fall outside of established processes and policies. This type of behavior removes visible markers from the directory. If the data trail for account creation and deletion is not discovered quickly, the information required to investigate an incident may no longer exist. For example, accounts might be deleted and then purged from the recycle bin. Audit logs are retained for 30 days. However, you can export your logs to Azure Monitor or a security information and event management (SIEM) solution for longer term retention. Expand table What to monitor Risk Level Where Filter/sub-filter Notes Account creation and deletion events within a close time frame. High Microsoft Entra audit logs Activity: Add user Status = success -and- Activity: Delete user Status = success Search for user principal name (UPN) events. Look for accounts created and then deleted in under 24 hours. Microsoft Sentinel template Accounts created and deleted by non-approved users or processes. Medium Microsoft Entra audit logs Initiated by (actor) – USER PRINCIPAL NAME -and- Activity: Add user Status = success and-or Activity: Delete user Status = success If the actors are non-approved users, configure to send an alert. Microsoft Sentinel template Accounts from non-approved sources. Medium Microsoft Entra audit logs Activity: Add user Status = success Target(s) = USER PRINCIPAL NAME If the entry isn't from an approved domain or is a known blocked domain, configure to send an alert. Microsoft Sentinel template Accounts assigned to a privileged role. High Microsoft Entra audit logs Activity: Add user Status = success -and- Activity: Delete user Status = success -and- Activity: Add member to role Status = success If the account is assigned to a Microsoft Entra role, Azure role, or privileged group membership, alert and prioritize the investigation. Microsoft Sentinel template Sigma rules Both privileged and non-privileged accounts should be monitored and alerted. However, since privileged accounts have administrative permissions, they should have higher priority in your monitor, alert, and respond processes. ACCOUNTS NOT FOLLOWING NAMING POLICIES User accounts not following naming policies might have been created outside of organizational policies. A best practice is to have a naming policy for user objects. Having a naming policy makes management easier and helps provide consistency. The policy can also help discover when users have been created outside of approved processes. A bad actor might not be aware of your naming standards and might make it easier to detect an account provisioned outside of your organizational processes. Organizations tend to have specific formats and attributes that are used for creating user and or privileged accounts. For example: * Admin account UPN = ADM_firstname.lastname@tenant.onmicrosoft.com * User account UPN = Firstname.Lastname@contoso.com Frequently, user accounts have an attribute that identifies a real user. For example, EMPID = XXXNNN. Use the following suggestions to help define normal for your organization, and when defining a baseline for log entries when accounts don't follow your naming convention: * Accounts that don't follow the naming convention. For example, nnnnnnn@contoso.com versus firstname.lastname@contoso.com. * Accounts that don't have the standard attributes populated or aren't in the correct format. For example, not having a valid employee ID. Expand table What to monitor Risk Level Where Filter/sub-filter Notes User accounts that don't have expected attributes defined. Low Microsoft Entra audit logs Activity: Add user Status = success Look for accounts with your standard attributes either null or in the wrong format. For example, EmployeeID Microsoft Sentinel template User accounts created using incorrect naming format. Low Microsoft Entra audit logs Activity: Add user Status = success Look for accounts with a UPN that does not follow your naming policy. Microsoft Sentinel template Privileged accounts that don't follow naming policy. High Azure Subscription List Azure role assignments using the Azure portal - Azure RBAC List role assignments for subscriptions and alert where sign-in name does not match your organizations format. For example, ADM_ as a prefix. Privileged accounts that don't follow naming policy. High Microsoft Entra directory List Microsoft Entra role assignments List roles assignments for Microsoft Entra roles alert where UPN doesn't match your organizations format. For example, ADM_ as a prefix. For more information on parsing, see: * Microsoft Entra audit logs - Parse text data in Azure Monitor Logs * Azure Subscriptions - List Azure role assignments using Azure PowerShell * Microsoft Entra ID - List Microsoft Entra role assignments ACCOUNTS CREATED OUTSIDE NORMAL PROCESSES Having standard processes to create users and privileged accounts is important so that you can securely control the lifecycle of identities. If users are provisioned and deprovisioned outside of established processes, it can introduce security risks. Operating outside of established processes can also introduce identity management problems. Potential risks include: * User and privileged accounts might not be governed to adhere to organizational policies. This can lead to a wider attack surface on accounts that aren't managed correctly. * It becomes harder to detect when bad actors create accounts for malicious purposes. By having valid accounts created outside of established procedures, it becomes harder to detect when accounts are created, or permissions modified for malicious purposes. We recommend that user and privileged accounts only be created following your organization policies. For example, an account should be created with the correct naming standards, organizational information and under scope of the appropriate identity governance. Organizations should have rigorous controls for who has the rights to create, manage, and delete identities. Roles to create these accounts should be tightly managed and the rights only available after following an established workflow to approve and obtain these permissions. Expand table What to monitor Risk Level Where Filter/sub-filter Notes User accounts created or deleted by non-approved users or processes. Medium Microsoft Entra audit logs Activity: Add user Status = success and-or- Activity: Delete user Status = success -and- Initiated by (actor) = USER PRINCIPAL NAME Alert on accounts created by non-approved users or processes. Prioritize accounts created with heightened privileges. Microsoft Sentinel template User accounts created or deleted from non-approved sources. Medium Microsoft Entra audit logs Activity: Add user Status = success -or- Activity: Delete user Status = success -and- Target(s) = USER PRINCIPAL NAME Alert when the domain is non-approved or known blocked domain. UNUSUAL SIGN-INS Seeing failures for user authentication is normal. But seeing patterns or blocks of failures can be an indicator that something is happening with a user's Identity. For example, during Password spray or Brute Force attacks, or when a user account is compromised. It's critical that you monitor and alert when patterns emerge. This helps ensure you can protect the user and your organization's data. Success appears to say all is well. But it can mean that a bad actor has successfully accessed a service. Monitoring successful logins helps you detect user accounts that are gaining access but aren't user accounts that should have access. User authentication successes are normal entries in Microsoft Entra sign-in logs. We recommend you monitor and alert to detect when patterns emerge. This helps ensure you can protect user accounts and your organization's data. As you design and operationalize a log monitoring and alerting strategy, consider the tools available to you through the Azure portal. Identity Protection enables you to automate the detection, protection, and remediation of identity-based risks. Identity protection uses intelligence-fed machine learning and heuristic systems to detect risk and assign a risk score for users and sign-ins. Customers can configure policies based on a risk level for when to allow or deny access or allow the user to securely self-remediate from a risk. The following Identity Protection risk detections inform risk levels today: Expand table What to monitor Risk Level Where Filter/sub-filter Notes Leaked credentials user risk detection High Microsoft Entra risk detection logs UX: Leaked credentials API: See riskDetection resource type - Microsoft Graph See What is risk? Microsoft Entra ID Protection Sigma rules Microsoft Entra Threat Intelligence user risk detection High Microsoft Entra risk detection logs UX: Microsoft Entra threat intelligence API: See riskDetection resource type - Microsoft Graph See What is risk? Microsoft Entra ID Protection Sigma rules Anonymous IP address sign-in risk detection Varies Microsoft Entra risk detection logs UX: Anonymous IP address API: See riskDetection resource type - Microsoft Graph See What is risk? Microsoft Entra ID Protection Sigma rules Atypical travel sign-in risk detection Varies Microsoft Entra risk detection logs UX: Atypical travel API: See riskDetection resource type - Microsoft Graph See What is risk? Microsoft Entra ID Protection Sigma rules Anomalous Token Varies Microsoft Entra risk detection logs UX: Anomalous Token API: See riskDetection resource type - Microsoft Graph See What is risk? Microsoft Entra ID Protection Sigma rules Malware linked IP address sign-in risk detection Varies Microsoft Entra risk detection logs UX: Malware linked IP address API: See riskDetection resource type - Microsoft Graph See What is risk? Microsoft Entra ID Protection Sigma rules Suspicious browser sign-in risk detection Varies Microsoft Entra risk detection logs UX: Suspicious browser API: See riskDetection resource type - Microsoft Graph See What is risk? Microsoft Entra ID Protection Sigma rules Unfamiliar sign-in properties sign-in risk detection Varies Microsoft Entra risk detection logs UX: Unfamiliar sign-in properties API: See riskDetection resource type - Microsoft Graph See What is risk? Microsoft Entra ID Protection Sigma rules Malicious IP address sign-in risk detection Varies Microsoft Entra risk detection logs UX: Malicious IP address API: See riskDetection resource type - Microsoft Graph See What is risk? Microsoft Entra ID Protection Sigma rules Suspicious inbox manipulation rules sign-in risk detection Varies Microsoft Entra risk detection logs UX: Suspicious inbox manipulation rules API: See riskDetection resource type - Microsoft Graph See What is risk? Microsoft Entra ID Protection Sigma rules Password Spray sign-in risk detection High Microsoft Entra risk detection logs UX: Password spray API: See riskDetection resource type - Microsoft Graph See What is risk? Microsoft Entra ID Protection Sigma rules Impossible travel sign-in risk detection Varies Microsoft Entra risk detection logs UX: Impossible travel API: See riskDetection resource type - Microsoft Graph See What is risk? Microsoft Entra ID Protection Sigma rules New country/region sign-in risk detection Varies Microsoft Entra risk detection logs UX: New country/region API: See riskDetection resource type - Microsoft Graph See What is risk? Microsoft Entra ID Protection Sigma rules Activity from anonymous IP address sign-in risk detection Varies Microsoft Entra risk detection logs UX: Activity from Anonymous IP address API: See riskDetection resource type - Microsoft Graph See What is risk? Microsoft Entra ID Protection Sigma rules Suspicious inbox forwarding sign-in risk detection Varies Microsoft Entra risk detection logs UX: Suspicious inbox forwarding API: See riskDetection resource type - Microsoft Graph See What is risk? Microsoft Entra ID Protection Sigma rules Microsoft Entra threat intelligence sign-in risk detection High Microsoft Entra risk detection logs UX: Microsoft Entra threat intelligence API: See riskDetection resource type - Microsoft Graph See What is risk? Microsoft Entra ID Protection Sigma rules For more information, visit What is Identity Protection. WHAT TO LOOK FOR Configure monitoring on the data within the Microsoft Entra sign-in logs to ensure that alerting occurs and adheres to your organization's security policies. Some examples of this are: * Failed Authentications: As humans we all get our passwords wrong from time to time. However, many failed authentications can indicate that a bad actor is trying to obtain access. Attacks differ in ferocity but can range from a few attempts per hour to a much higher rate. For example, Password Spray normally preys on easier passwords against many accounts, while Brute Force attempts many passwords against targeted accounts. * Interrupted Authentications: An Interrupt in Microsoft Entra ID represents an injection of a process to satisfy authentication, such as when enforcing a control in a Conditional Access policy. This is a normal event and can happen when applications aren't configured correctly. But when you see many interrupts for a user account it could indicate something is happening with that account. * For example, if you filtered on a user in Sign-in logs and see a large volume of sign in status = Interrupted and Conditional Access = Failure. Digging deeper it may show in authentication details that the password is correct, but that strong authentication is required. This could mean the user isn't completing multi-factor authentication (MFA) which could indicate the user's password is compromised and the bad actor is unable to fulfill MFA. * Smart lock-out: Microsoft Entra ID provides a smart lock-out service which introduces the concept of familiar and non-familiar locations to the authentication process. A user account visiting a familiar location might authenticate successfully while a bad actor unfamiliar with the same location is blocked after several attempts. Look for accounts that have been locked out and investigate further. * IP changes: It is normal to see users originating from different IP addresses. However, Zero Trust states never trust and always verify. Seeing a large volume of IP addresses and failed sign-ins can be an indicator of intrusion. Look for a pattern of many failed authentications taking place from multiple IP addresses. Note, virtual private network (VPN) connections can cause false positives. Regardless of the challenges, we recommend you monitor for IP address changes and if possible, use Microsoft Entra ID Protection to automatically detect and mitigate these risks. * Locations: Generally, you expect a user account to be in the same geographical location. You also expect sign-ins from locations where you have employees or business relations. When the user account comes from a different international location in less time than it would take to travel there, it can indicate the user account is being abused. Note, VPNs can cause false positives, we recommend you monitor for user accounts signing in from geographically distant locations and if possible, use Microsoft Entra ID Protection to automatically detect and mitigate these risks. For this risk area, we recommend you monitor standard user accounts and privileged accounts but prioritize investigations of privileged accounts. Privileged accounts are the most important accounts in any Microsoft Entra tenant. For specific guidance for privileged accounts, see Security operations – privileged accounts. HOW TO DETECT You use Microsoft Entra ID Protection and the Microsoft Entra sign-in logs to help discover threats indicated by unusual sign-in characteristics. Information about Identity Protection is available at What is Identity Protection. You can also replicate the data to Azure Monitor or a SIEM for monitoring and alerting purposes. To define normal for your environment and to set a baseline, determine: * the parameters you consider normal for your user base. * the average number of tries of a password over a time before the user calls the service desk or performs a self-service password reset. * how many failed attempts you want to allow before alerting, and if it will be different for user accounts and privileged accounts. * how many MFA attempts you want to allow before alerting, and if it will be different for user accounts and privileged accounts. * if legacy authentication is enabled and your roadmap for discontinuing usage. * the known egress IP addresses are for your organization. * the countries/regions your users operate from. * whether there are groups of users that remain stationary within a network location or country/region. * Identify any other indicators for unusual sign-ins that are specific to your organization. For example days or times of the week or year that your organization doesn't operate. After you scope what normal is for the accounts in your environment, consider the following list to help determine scenarios you want to monitor and alert on, and to fine-tune your alerting. * Do you need to monitor and alert if Identity Protection is configured? * Are there stricter conditions applied to privileged accounts that you can use to monitor and alert on? For example, requiring privileged accounts only be used from trusted IP addresses. * Are the baselines you set too aggressive? Having too many alerts might result in alerts being ignored or missed. Configure Identity Protection to help ensure protection is in place that supports your security baseline policies. For example, blocking users if risk = high. This risk level indicates with a high degree of confidence that a user account is compromised. For more information on setting up sign in risk policies and user risk policies, visit Identity Protection policies. For more information on setting up Conditional Access, visit Conditional Access: Sign-in risk-based Conditional Access. The following are listed in order of importance based on the effect and severity of the entries. MONITORING EXTERNAL USER SIGN INS Expand table What to monitor Risk Level Where Filter/sub-filter Notes Users authenticating to other Microsoft Entra tenants. Low Microsoft Entra sign-in log Status = success Resource tenantID != Home Tenant ID Detects when a user has successfully authenticated to another Microsoft Entra tenant with an identity in your organization's tenant. Alert if Resource TenantID isn't equal to Home Tenant ID Microsoft Sentinel template Sigma rules User state changed from Guest to Member Medium Microsoft Entra audit logs Activity: Update user Category: UserManagement UserType changed from Guest to Member Monitor and alert on change of user type from Guest to Member. Was this expected? Microsoft Sentinel template Sigma rules Guest users invited to tenant by non-approved inviters Medium Microsoft Entra audit logs Activity: Invite external user Category: UserManagement Initiated by (actor): User Principal Name Monitor and alert on non-approved actors inviting external users. Microsoft Sentinel template Sigma rules MONITORING FOR FAILED UNUSUAL SIGN INS Expand table What to monitor Risk Level Where Filter/sub-filter Notes Failed sign-in attempts. Medium - if Isolated Incident High - if many accounts are experiencing the same pattern or a VIP. Microsoft Entra sign-in log Status = failed -and- Sign-in error code 50126 - Error validating credentials due to invalid username or password. Define a baseline threshold, and then monitor and adjust to suite your organizational behaviors and limit false alerts from being generated. Microsoft Sentinel template Sigma rules Smart lock-out events. Medium - if Isolated Incident High - if many accounts are experiencing the same pattern or a VIP. Microsoft Entra sign-in log Status = failed -and- Sign-in error code = 50053 – IdsLocked Define a baseline threshold, and then monitor and adjust to suite your organizational behaviors and limit false alerts from being generated. Microsoft Sentinel template Sigma rules Interrupts Medium - if Isolated Incident High - if many accounts are experiencing the same pattern or a VIP. Microsoft Entra sign-in log 500121, Authentication failed during strong authentication request. -or- 50097, Device authentication is required or 50074, Strong Authentication is required. -or- 50155, DeviceAuthenticationFailed -or- 50158, ExternalSecurityChallenge - External security challenge wasn't satisfied -or- 53003 and Failure reason = blocked by Conditional Access Monitor and alert on interrupts. Define a baseline threshold, and then monitor and adjust to suite your organizational behaviors and limit false alerts from being generated. Microsoft Sentinel template Sigma rules The following are listed in order of importance based on the effect and severity of the entries. Expand table What to monitor Risk Level Where Filter/sub-filter Notes Multi-factor authentication (MFA) fraud alerts. High Microsoft Entra sign-in log Status = failed -and- Details = MFA Denied Monitor and alert on any entry. Microsoft Sentinel template Sigma rules Failed authentications from countries/regions you don't operate out of. Medium Microsoft Entra sign-in log Location = <unapproved location> Monitor and alert on any entries. Microsoft Sentinel template Sigma rules Failed authentications for legacy protocols or protocols that aren't used. Medium Microsoft Entra sign-in log Status = failure -and- Client app = Other Clients, POP, IMAP, MAPI, SMTP, ActiveSync Monitor and alert on any entries. Microsoft Sentinel template Sigma rules Failures blocked by Conditional Access. Medium Microsoft Entra sign-in log Error code = 53003 -and- Failure reason = blocked by Conditional Access Monitor and alert on any entries. Microsoft Sentinel template Sigma rules Increased failed authentications of any type. Medium Microsoft Entra sign-in log Capture increases in failures across the board. That is, the failure total for today is >10% on the same day, the previous week. If you don't have a set threshold, monitor and alert if failures increase by 10% or greater. Microsoft Sentinel template Authentication occurring at times and days of the week when countries/regions don't conduct normal business operations. Low Microsoft Entra sign-in log Capture interactive authentication occurring outside of normal operating days\time. Status = success -and- Location = <location> -and- Day\Time = <not normal working hours> Monitor and alert on any entries. Microsoft Sentinel template Account disabled/blocked for sign-ins Low Microsoft Entra sign-in log Status = Failure -and- error code = 50057, The user account is disabled. This could indicate someone is trying to gain access to an account once they have left an organization. Although the account is blocked, it is important to log and alert on this activity. Microsoft Sentinel template Sigma rules MONITORING FOR SUCCESSFUL UNUSUAL SIGN INS Expand table What to monitor Risk Level Where Filter/sub-filter Notes Authentications of privileged accounts outside of expected controls. High Microsoft Entra sign-in log Status = success -and- UserPricipalName = <Admin account> -and- Location = <unapproved location> -and- IP Address = <unapproved IP> Device Info= <unapproved Browser, Operating System> Monitor and alert on successful authentication for privileged accounts outside of expected controls. Three common controls are listed. Microsoft Sentinel template Sigma rules When only single-factor authentication is required. Low Microsoft Entra sign-in log Status = success Authentication requirement = Single-factor authentication Monitor periodically and ensure expected behavior. Sigma rules Discover privileged accounts not registered for MFA. High Azure Graph API Query for IsMFARegistered eq false for administrator accounts. List credentialUserRegistrationDetails - Microsoft Graph beta Audit and investigate to determine if intentional or an oversight. Successful authentications from countries/regions your organization doesn't operate out of. Medium Microsoft Entra sign-in log Status = success Location = <unapproved country/region> Monitor and alert on any entries not equal to the city names you provide. Sigma rules Successful authentication, session blocked by Conditional Access. Medium Microsoft Entra sign-in log Status = success -and- error code = 53003 – Failure reason, blocked by Conditional Access Monitor and investigate when authentication is successful, but session is blocked by Conditional Access. Microsoft Sentinel template Sigma rules Successful authentication after you have disabled legacy authentication. Medium Microsoft Entra sign-in log status = success -and- Client app = Other Clients, POP, IMAP, MAPI, SMTP, ActiveSync If your organization has disabled legacy authentication, monitor and alert when successful legacy authentication has taken place. Microsoft Sentinel template Sigma rules We recommend you periodically review authentications to medium business impact (MBI) and high business impact (HBI) applications where only single-factor authentication is required. For each, you want to determine if single-factor authentication was expected or not. In addition, review for successful authentication increases or at unexpected times, based on the location. Expand table What to monitor Risk Level Where Filter/sub-filter Notes Authentications to MBI and HBI application using single-factor authentication. Low Microsoft Entra sign-in log status = success -and- Application ID = <HBI app> -and- Authentication requirement = single-factor authentication. Review and validate this configuration is intentional. Sigma rules Authentications at days and times of the week or year that countries/regions do not conduct normal business operations. Low Microsoft Entra sign-in log Capture interactive authentication occurring outside of normal operating days\time. Status = success Location = <location> Date\Time = <not normal working hours> Monitor and alert on authentications days and times of the week or year that countries/regions do not conduct normal business operations. Sigma rules Measurable increase of successful sign ins. Low Microsoft Entra sign-in log Capture increases in successful authentication across the board. That is, success totals for today are >10% on the same day, the previous week. If you don't have a set threshold, monitor and alert if successful authentications increase by 10% or greater. Microsoft Sentinel template Sigma rules NEXT STEPS See these security operations guide articles: Microsoft Entra security operations overview Security operations for consumer accounts Security operations for privileged accounts Security operations for Privileged Identity Management Security operations for applications Security operations for devices Security operations for infrastructure FEEDBACK Coming soon: Throughout 2024 we will be phasing out GitHub Issues as the feedback mechanism for content and replacing it with a new feedback system. For more information see: https://aka.ms/ContentUserFeedback. Submit and view feedback for This product This page View all page feedback -------------------------------------------------------------------------------- ADDITIONAL RESOURCES -------------------------------------------------------------------------------- Training Module Monitor and maintain Microsoft Entra ID - Training Audit and diagnostic logs within Microsoft Entra ID provide a rich view into how users are accessing your Azure solution. Learn to monitor, troubleshoot, and analyze sign-in data. Certification Microsoft Certified: Identity and Access Administrator Associate - Certifications Demonstrate the features of Microsoft Entra ID to modernize identity solutions, implement hybrid solutions, and implement identity governance. English (United States) California Consumer Privacy Act (CCPA) Opt-Out Icon Your Privacy Choices Theme * Light * Dark * High contrast * Manage cookies * Previous Versions * Blog * Contribute * Privacy * Terms of Use * Trademarks * © Microsoft 2024 ADDITIONAL RESOURCES -------------------------------------------------------------------------------- Training Module Monitor and maintain Microsoft Entra ID - Training Audit and diagnostic logs within Microsoft Entra ID provide a rich view into how users are accessing your Azure solution. Learn to monitor, troubleshoot, and analyze sign-in data. Certification Microsoft Certified: Identity and Access Administrator Associate - Certifications Demonstrate the features of Microsoft Entra ID to modernize identity solutions, implement hybrid solutions, and implement identity governance. IN THIS ARTICLE English (United States) California Consumer Privacy Act (CCPA) Opt-Out Icon Your Privacy Choices Theme * Light * Dark * High contrast * Manage cookies * Previous Versions * Blog * Contribute * Privacy * Terms of Use * Trademarks * © Microsoft 2024