Sign-in Brute Force against M365 Accounts

Last updated on:

About the rule

Rule Type

Standard

Rule Description

Detects potential brute-force attempts against Microsoft 365 user accounts by detecting a high number of failed login attempts.

Severity

Critical

Rule Requirement

Criteria

Action1: actionname = "DETECTION_ACTION_M365_FAILED_LOGON_EVENTS" | timewindow 30m | groupby CALLER having COUNT > 10 select Action1.timewindow.CALLER,Action1.timewindow.ERRORCODE,Action1.timewindow.APPLICATIONNAME,Action1.timewindow.IPADDRESS,Action1.timewindow.COUNTRYCODE,Action1.timewindow.RISK_LEVEL,Action1.timewindow.RESULT

Detection

Execution Mode

realtime

Log Sources

Microsoft 365