Unusually High Number of M365 Login Failures
Last updated on:
In this page
About the rule
Rule Type
Anomaly
Rule Description
Monitors for abnormal M365 login failure volumes that may indicate brute-force attempts.
Severity
Attention
Rule Requirement
Criteria
Action1:
actionname = "DETECTION_ACTION_M365_FAILED_LOGON_EVENTS"
| isanomalous(User at an unusual Time)
| isanomalous(User with abnormal Count)
| isanomalous(User with unusual IP Address)
select Action1.CALLER,Action1.ERRORCODE,Action1.APPLICATIONNAME,Action1.IPADDRESS,Action1.COUNTRYCODE,Action1.RISK_LEVEL,Action1.RESULT
Detection
Execution Mode
Intelligent
Log Sources
Microsoft 365


