
Rule Info
Name
Unfamiliar Sign-In Properties
Author
Mark Morowczynski '@markmorow', Gloria Lee, '@gleeiamglo'
Description
Detects sign-in with properties that are unfamiliar to the user. The detection considers past sign-in history to look for anomalous sign-ins.
Date
2023-09-03 00:00:00
Modified
None
Id
128faeef-79dd-44ca-b43c-a9e236a60f49
Tags
attack.t1078 attack.persistence attack.defense-evasion attack.privilege-escalation attack.initial-access
Type
Community Rule
Link to Public Repo
Rule History
Author
Title
Date
Commit
Nasreddine Bencherchali
Merge PR #4950 from @nasbench - Comply With v2 Spec Changes
2024-08-12
github-actions[bot]
Merge PR #4891 from @nasbench - Promote older rules status from `experimental` to `test`
2024-07-01
Mark Morowczynski
Merge PR #4423 from @MarkMorow - Add Azure AD Identity Protection Rules
2023-09-06