尝试暴力破解 Microsoft 365 用户帐户

编辑

尝试暴力破解 Microsoft 365 用户帐户编辑

识别尝试暴力破解 Microsoft 365 用户帐户的行为。攻击者可能会尝试进行暴力破解攻击以获取对用户帐户的未经授权访问。

规则类型: esql

规则索引: 无

严重程度: 中

风险评分: 47

运行频率: 5 分钟

搜索的索引范围: now-9m(日期数学格式,另请参阅 其他回溯时间

每次执行的最大警报数: 100

参考资料:

标签:

  • 域: 云
  • 域: SaaS
  • 数据源: Microsoft 365
  • 用例: 身份和访问审核
  • 策略: 凭据访问

版本: 209

规则作者:

  • Elastic
  • Willem D’Haese
  • Austin Songer

规则许可证: Elastic 许可证 v2

调查指南编辑

设置编辑

要与此规则兼容,需要使用 Office 365 日志 Fleet 集成、Filebeat 模块或结构相似的数据。

规则查询编辑

from logs-o365.audit-*
| MV_EXPAND event.category
| WHERE event.dataset == "o365.audit"
  AND event.category == "authentication"

  // filter only on Entra ID or Exchange audit logs in O365 integration
  AND event.provider in ("AzureActiveDirectory", "Exchange")

  // filter only for UserLoginFailed or partial failures
  AND event.action in ("UserLoginFailed", "PasswordLogonInitialAuthUsingPassword")

  // ignore specific logon errors
  AND not o365.audit.LogonError in (
    "EntitlementGrantsNotFound",
    "UserStrongAuthEnrollmentRequired",
    "UserStrongAuthClientAuthNRequired",
    "InvalidReplyTo",
    "SsoArtifactExpiredDueToConditionalAccess",
    "PasswordResetRegistrationRequiredInterrupt",
    "SsoUserAccountNotFoundInResourceTenant",
    "UserStrongAuthExpired",
    "CmsiInterrupt"
)
  // filters out non user or application logins based on target
  AND o365.audit.Target.Type in ("0", "2", "3", "5", "6", "10")

  // filters only for logins from user or application, ignoring oauth:token
  AND to_lower(o365.audit.ExtendedProperties.RequestType) rlike "(.*)login(.*)"

| STATS
  // count the number of failed login attempts target per user
  login_attempt_counts = COUNT(*) by o365.audit.Target.ID, o365.audit.LogonError

| WHERE login_attempt_counts > 10

框架: MITRE ATT&CKTM