Entra ID Protection Admin Confirmed Compromise
Identifies when an administrator has manually confirmed a user or sign-in as compromised in Microsoft Entra ID Protection. This indicates that an administrator has reviewed the risk detection and determined that the user account or sign-in activity is definitively compromised. This is a high-confidence indicator of account compromise and should be investigated immediately.
Rule type: query
Rule indices:
- logs-azure.identity_protection-*
Rule Severity: critical
Risk Score: 99
Runs every:
Searches indices from: now-9m
Maximum alerts per execution: ?
References:
- https://learn.microsoft.com/en-us/entra/id-protection/howto-identity-protection-investigate-risk
- https://learn.microsoft.com/en-us/entra/id-protection/concept-identity-protection-risks
- https://learn.microsoft.com/en-us/graph/api/resources/riskdetection
Tags:
- Domain: Cloud
- Domain: Identity
- Data Source: Azure
- Data Source: Entra ID
- Data Source: Entra ID Protection Logs
- Use Case: Identity and Access Audit
- Use Case: Threat Detection
- Tactic: Initial Access
- Resources: Investigation Guide
Version: ?
Rule authors:
- Elastic
Rule license: Elastic License v2
To use this rule, ensure that Microsoft Entra ID Protection logs are being collected and streamed into the Elastic Stack via the Azure integration.
This rule detects when an administrator has manually confirmed a user or sign-in as compromised in Microsoft Entra ID Protection. This is a critical security event that requires immediate investigation and response.
- Review the
azure.identityprotection.properties.risk_detailfield to determine if the compromise was confirmed at the sign-in level (adminConfirmedSigninCompromised) or user level (adminConfirmedUserCompromised). - Check the
azure.identityprotection.properties.user_principal_namefield to identify the compromised user account. - Review the
azure.identityprotection.properties.user_display_namefield for additional user identification information. - Examine the
azure.identityprotection.properties.risk_levelfield to understand the severity level assigned to the risk event. - Check the
azure.identityprotection.properties.risk_statefield to verify the current state of the risk (should be confirmed as compromised). - Review the
azure.correlation_idfield to correlate this event with other related security events, including the original risk detections that led to the admin confirmation. - Investigate the timeline of events leading up to the admin confirmation by reviewing Entra ID sign-in logs and audit logs for the affected user.
- Check for any suspicious activities associated with the user account, including:
- Unusual sign-in locations or IP addresses
- Access to sensitive resources or applications
- Changes to user profile, permissions, or MFA settings
- Bulk email sending or data exfiltration activities
- Review the
azure.identityprotection.properties.additional_infofield for any additional context provided by the administrator or Entra ID Protection. - Identify which administrator confirmed the compromise by reviewing Entra ID audit logs for risk state changes.
- Security testing or penetration testing exercises may result in administrators confirming test accounts as compromised. If this is expected behavior, consider excluding specific test accounts or implementing a testing account naming convention to filter.
- Incident response drills or tabletop exercises may involve marking accounts as compromised for training purposes. Coordinate with security teams to identify planned exercises.
- Immediately reset the password for the compromised user account and require the user to set a new password upon next sign-in.
- Revoke all active sessions and authentication tokens for the compromised account, including:
- Primary refresh tokens (PRTs)
- OAuth tokens
- Session cookies
- Application-specific passwords
- Review and revoke any suspicious OAuth consent grants or application permissions added by the compromised account.
- Enable or enforce multi-factor authentication (MFA) for the affected user account if not already enabled.
- Review all activities performed by the compromised account, including:
- Email forwarding rules or inbox rules
- File access and downloads
- Changes to security settings or permissions
- Creation of new users or service principals
- Assess the scope of the compromise by identifying any lateral movement or privilege escalation activities.
- Consider disabling the account temporarily until the investigation is complete and all remediation steps are verified.
- Implement conditional access policies to prevent future compromises, such as requiring MFA from untrusted locations or blocking legacy authentication.
- Review and strengthen identity protection policies and risk-based conditional access rules.
- Document the incident, including the timeline, scope of compromise, and remediation actions taken.
- Conduct a post-incident review to identify gaps in security controls and implement improvements to prevent similar incidents.
event.dataset: azure.identity_protection and
azure.identityprotection.properties.risk_detail: (
"adminConfirmedSigninCompromised" or
"adminConfirmedUserCompromised"
)
Framework: MITRE ATT&CK
Tactic:
- Name: Initial Access
- Id: TA0001
- Reference URL: https://attack.mitre.org/tactics/TA0001/
Technique:
- Name: Valid Accounts
- Id: T1078
- Reference URL: https://attack.mitre.org/techniques/T1078/
Sub Technique:
- Name: Cloud Accounts
- Id: T1078.004
- Reference URL: https://attack.mitre.org/techniques/T1078/004/