Catégorie : Azure Sentinel

Azure Sentinel – AAD Use Cases


In this article, I will share with you some Azure Active Directory Use Cases created by Microsoft.

Use Case NameDescription
Anomalous sign-in location by user account and authenticating applicationThis query over Azure Active Directory sign-in considers all user sign-ins for each Azure Active Directory application and picks out the most anomalous change in location profile for a user within an individual application. An alert is generated for recent sign-ins that have location counts that are anomalous over last day but also over the last 3-day and 7-day periods.
Azure Active Directory PowerShell accessing non-AAD resourcesThis will alert when a user or application signs in using Azure Active Directory PowerShell to access non-Active Directory resources, such as the Azure Key Vault, which may be undesired or unauthorized behavior.
Attempt to bypass conditional access rule in Azure ADIdentifies an attempt to Bypass conditional access rule(s) in Azure Active Directory.
The ConditionalAccessStatus column value details if there was an attempt to bypass Conditional Access or if the Conditional access rule was not satisfied (ConditionalAccessStatus == 1).
Attempts to sign in to disabled accountsIdentifies failed attempts to sign in to disabled accounts across multiple Azure Applications.
Default threshold for Azure Applications attempted to sign in to is 3.
50057 – User account is disabled. The account has been disabled by an administrator.’
Distributed Password cracking attempts in AzureADIdentifies distributed password cracking attempts from the Azure Active Directory SigninLogs.
The query looks for unusually high number of failed password attempts coming from multiple locations for a user account.
50053 Account is locked because the user tried to sign in too many times with an incorrect user ID or password.
50055 Invalid password, entered expired password.
50056 Invalid or null password – Password does not exist in store for this user.
50126 Invalid username or password, or invalid on-premises username or password.
Explicit MFA DenyUser explicitly denies MFA push, indicating that login was not expected and the account’s password may be compromised.
Failed login attempts to Azure PortalIdentifies failed login attempts in the Azure Active Directory SigninLogs to the Azure Portal. Many failed logon attempts or some failed logon attempts from multiple IPs could indicate a potential brute force attack.
The following are excluded due to success and non-failure results:
0 – successful logon
50125 – Sign-in was interrupted due to a password reset or password registration entry.
50140 – This error occurred due to ‘Keep me signed in’ interrupt when the user was signing-in.
Sign-ins from IPs that attempt sign-ins to disabled accountsIdentifies IPs with failed attempts to sign in to one or more disabled accounts signed in successfully to another account.
50057 – User account is disabled. The account has been disabled by an administrator.
Brute force attack against Azure PortalIdentifies evidence of brute force activity against Azure Portal by highlighting multiple authentication failures and by a successful authentication within a given time window.
(The query does not enforce any sequence – eg requiring the successful authentication to occur last.)
Default Failure count is 5, Default Success count is 1 and default Time Window is 20 minutes.
Password spray attack against Azure AD applicationIdentifies evidence of password spray activity against Azure AD applications by looking for failures from multiple accounts from the same IP address within a time window. If the number of accounts breaches the threshold just once, all failures from the IP address within the time range are bought into the result. Details on whether there were successful authentications by the IP address within the time window are also included.
This can be an indicator that an attack was successful
Successful logon from IP and failure from a different IPIdentifies when a user account successfully logs onto an Azure App from one IP and within 10 mins failed to logon to the same App via a different IP.
This may indicate a malicious attempt at password guessing based on knowledge of the users account.


Azure Sentinel – Activer le Service


Après un premier article de présentation du service Azure Sentinel, je vous invite à découvrir comment activer le service Azure Sentinel.

Pour cela je vous donne rendez-vous sur le portail Azure :

Je vous invite soit à sélectionner un workspace existant, si vous n’avez pas de workspace je vous invite à cliquer sur: « Add » puis cliquer sur « Create a new workspace »

Définir un nom pour votre votre nouveau Log Analytics Workspace, un nom pour votre resource group, l’emplacement ainsi que le Pricing tier.

Une fois votre workspace ajouté, je vous invite à le sélectionner et cliquer sur « Add ».

Félicitation! Vous venez de créer un workspace Log Analytics et le lier au service Azure Sentinel.

Dans un prochain article, nous verrons ensemble comment ajouter des source de données.


Microsoft Ignite 2019 !


J’ai eu le plaisir de participer à la conférence Microsoft Ignite 2019 qui avait lieu à Orlando, Floride. Une semaine de conférences est à chaque fois quelque chose d’éprouvant, on marche énormément, on dort peu et on parle beaucoup!

Ci-dessous quelques sessions que j’ai pu voir dans la semaine:

Vous pouvez retrouver l’ensemble des sessions :

Si vous n’avez pas pu assister à Microsoft Ignite, vous pouvez assister à Microsoft Ignite 2019-2020 The Tour directement dans votre ville!

Au plaisir de vous croiser à l’édition de Toronto, le 8 et 9 Janvier 2020.