Sign-in Brute Force against M365 Accounts
Last updated on:
In this page
About the rule
Rule Type
Standard
Rule Description
Detects potential brute-force attempts against Microsoft 365 user accounts by detecting a high number of failed login attempts.
Severity
Critical
Rule Requirement
Criteria
Action1: actionname = "DETECTION_ACTION_M365_FAILED_LOGON_EVENTS" | timewindow 30m | groupby CALLER having COUNT > 10 select Action1.timewindow.CALLER,Action1.timewindow.ERRORCODE,Action1.timewindow.APPLICATIONNAME,Action1.timewindow.IPADDRESS,Action1.timewindow.COUNTRYCODE,Action1.timewindow.RISK_LEVEL,Action1.timewindow.RESULT
Detection
Execution Mode
realtime
Log Sources
Microsoft 365


