Unusually High Number of M365 Login Failures

Last updated on:

About the rule

Rule Type

Anomaly

Rule Description

Monitors for abnormal M365 login failure volumes that may indicate brute-force attempts.

Severity

Attention

Rule Requirement

Criteria

Action1: actionname = "DETECTION_ACTION_M365_FAILED_LOGON_EVENTS" | isanomalous(User at an unusual Time) | isanomalous(User with abnormal Count) | isanomalous(User with unusual IP Address) select Action1.CALLER,Action1.ERRORCODE,Action1.APPLICATIONNAME,Action1.IPADDRESS,Action1.COUNTRYCODE,Action1.RISK_LEVEL,Action1.RESULT

Detection

Execution Mode

Intelligent

Log Sources

Microsoft 365