-
Notifications
You must be signed in to change notification settings - Fork 3.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Redundant rule templates about MFA Rejection/Deny #10380
Comments
Hi @roniegh, Thanks for flagging this issue, we will investigate this issue and get back to you with some updates by 03-05-2024. Thanks! |
Hey @roniegh, Thanks for highlighting the templates. As per the use case description of both templates, they can be used as MFA denies/rejected. but the "MFA Rejected by User" rule is more enhanced to identifying potentially compromised accounts by considering user behavior and risk factors as compared to "Explicit MFA Deny". Sharing doc for more detail's info and reference:- |
@v-sudkharat I didn't find anything on the aforementioned doc in regards to diferences between the redundant rules. The only reference I see is a link to a past version of the MFARejectedbyUser rule. Both rules query the same table SigninLogs with virtually the same where clause. While the MFARejectedbyUser rule returns more information, the ExplicitMFADeny rule also queries the AADNonInteractiveUserSignInLogs table. Also, as you can see by @shainw post in #3516 (comment) the MFARejectedbyUser rule was added without checking if such a rule already existed. Could you please explain what you mean by "MFA Rejected by User rule is more enhanced to identifying potentially compromised accounts by considering user behavior and risk factors as compared to Explicit MFA Deny" ? Please reopen this issue. |
@roniegh, Sure, Happy to reopen this case and share info with you. Thanks! |
@v-sudkharat Could you please explain how MFARejectedbyUser's current code is doing the "more comprehensive analysis by considering behavioral patterns and risk factors associated with user activities" ? |
Sure. Adding to it, as it is having logs from BehaviorAnalytics. These logs provide insights into various aspects of behavior, such as failed attempts, activity insights and investigation priorities associated with IP addresses. Which is into below query - |
@ashwin-patil - please have a look at this. |
There are two redundant rule templates for basically the same thing. Please merge them or at least add a deprecation warning to the legacy one.
https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Microsoft%20Entra%20ID/Analytic%20Rules/ExplicitMFADeny.yaml
https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Microsoft%20Entra%20ID/Analytic%20Rules/MFARejectedbyUser.yaml
The text was updated successfully, but these errors were encountered: