Microsoft Entra ID User Reported Suspicious Activity
editMicrosoft Entra ID User Reported Suspicious Activity
editIdentifies suspicious activity reported by users in Microsoft Entra ID where users have reported suspicious activity related to their accounts, which may indicate potential compromise or unauthorized access attempts. Reported suspicious activity typically occurs during the authentication process and may involve various authentication methods, such as password resets, account recovery, or multi-factor authentication challenges. Adversaries may attempt to exploit user accounts by leveraging social engineering techniques or other methods to gain unauthorized access to sensitive information or resources.
Rule type: query
Rule indices:
- logs-azure.auditlogs-*
Severity: medium
Risk score: 47
Runs every: 5m
Searches indices from: now-9m (Date Math format, see also Additional look-back time
)
Maximum alerts per execution: 100
References:
Tags:
- Domain: Cloud
- Data Source: Azure
- Data Source: Microsoft Entra ID
- Data Source: Microsoft Entra ID Audit Logs
- Use Case: Identity and Access Audit
- Resources: Investigation Guide
- Tactic: Initial Access
Version: 2
Rule authors:
- Elastic
- Willem D’Haese
Rule license: Elastic License v2
Investigation guide
editTriage and Analysis
Investigating Microsoft Entra ID User Reported Suspicious Activity
This rule detects when a user in Microsoft Entra ID reports suspicious activity associated with their account. This feature is often used to report MFA fatigue or unsolicited push notifications, and is logged during authentication flows involving methods like Microsoft Authenticator. Such events may indicate that an attacker attempted unauthorized access and triggered a push that was denied or flagged by the user.
Possible investigation steps
-
Review the
azure.auditlogs.identity
field to identify the reporting user. -
Confirm that
event.action
is"Suspicious activity reported"
and the result was"success"
. -
Check the
azure.auditlogs.properties.additional_details
array forAuthenticationMethod
, which shows how the login attempt was performed (e.g.,PhoneAppNotification
). -
Look at the
azure.auditlogs.properties.initiated_by.user.userPrincipalName
anddisplayName
to confirm which user reported the suspicious activity. -
Investigate recent sign-in activity (
signinlogs
) for the same user. Focus on: - IP address geolocation and ASN.
- Device, operating system, and browser.
- MFA prompt patterns or unusual login attempts.
- Determine whether the user actually initiated a login attempt, or if it was unexpected and aligns with MFA fatigue or phishing attempts.
- Correlate this report with any risky sign-in detections, conditional access blocks, or password resets in the past 24–48 hours.
False positive analysis
- Users unfamiliar with MFA push notifications may mistakenly report legitimate sign-in attempts.
- Shared accounts or device switching can also trigger unintended notifications.
- Legitimate travel or network changes might confuse users into thinking activity was malicious.
Response and remediation
- Contact the user to validate the suspicious activity report and assess whether they were targeted or tricked by a malicious actor.
- If the report is confirmed to be valid:
- Reset the user’s credentials immediately.
- Revoke active sessions and refresh tokens.
- Review their activity across Microsoft 365 services for signs of compromise.
- If other users report similar behavior around the same time, assess for a broader MFA fatigue campaign or targeted phishing.
- Consider tuning conditional access policies to require number matching or stronger MFA mechanisms.
- Educate users on reporting suspicious MFA prompts and following up with IT/security teams promptly.
Rule query
editevent.dataset: "azure.auditlogs" and azure.auditlogs.operation_name: "Suspicious activity reported" and azure.auditlogs.properties.additional_details.key: "AuthenticationMethod" and azure.auditlogs.properties.target_resources.*.type: "User" and event.outcome: "success"
Framework: MITRE ATT&CKTM
-
Tactic:
- Name: Initial Access
- ID: TA0001
- Reference URL: https://attack.mitre.org/tactics/TA0001/
-
Technique:
- Name: Valid Accounts
- ID: T1078
- Reference URL: https://attack.mitre.org/techniques/T1078/