[Rule Tuning] Azure Entra Sign-in Brute Force against Microsoft 365 Accounts #4262
Labels
backlog
community
Domain: Cloud
Domain: SaaS
Integration: Azure
azure related rules
Integration: Microsoft 365
Rule: Tuning
tweaking or tuning an existing rule
Team: TRADE
Link to Rule
https://github.com/elastic/detection-rules/blob/main/rules/integrations/azure/credential_access_entra_signin_brute_force_microsoft_365.toml
Rule Tuning Type
Contextual Tuning - Customizing rules based on specific environment factors.
Description
Hello,
The rule
Azure Entra Sign-in Brute Force against Microsoft 365 Accounts
is super noisy and very hard to troubleshoot. The calculated fields are not usable in the Kibana Alerts gui. There is no context available such as User Agent and Azure Resource. Some user agents are hard to translate into something we can work with.We did multiple changes:
I can understand the se changes are specific to our needs. But is there some way to put the calculated fields in an ECS field (to be created) which is actually mapped so we can add these fields to the Alerts table?
Is the "login_source_count = count(source.ip)" expected? login_source_count and failed_login_count are acutally alsways the same.. Is it possible this needs to be distinct count (unique) of source.ip?
Example Data
No response
The text was updated successfully, but these errors were encountered: