Forum Discussion

Huw_W1's avatar
Huw_W1
Copper Contributor
Feb 28, 2020
Solved

Detect compromised passwords

After looking in the Sign-in view and seeing all the login attempts trying to guess passwords we implemented MFA, so feel a little more secure! However we still get phishing emails and users will be users so passwords are still going to get compromised, now any attempt to login should get blocked by MFA but i would like to be able to detect these and reset the users passwords, so any suggestions on how i would recognise a login attempt where a correct password was entered but it was blocked by MFA?

 

Thanks

 Huw

  • Huw_W1,

     

    You'll see a failure reason of "other" in the sign-in logs, as opposed to "invalid username or password":

     

    or...

     

     

    The sign-in error code is also key - 500121 above relates to a failed strong authentication in the context of "other":

     

     

    Regards,

     

    Kelvin

7 Replies

  • Kelvin Papp's avatar
    Kelvin Papp
    Brass Contributor

    Hi Huw_W1,

     

    There’s a distinction here between identifying, and alerting on this type of activity. As the previous replies have indicated there are proactive alerting mechanisms in the form of MCAS / Sentinel, but clearly these may carry over a cost to you over more manual ways of identifying this sort of behaviour. 

    As Vasil suggested, at a base level you will see these reflected in the Azure AD sign-in logs as failed sign-ins (due to lack of MFA, as opposed to an incorrect password which you will be able to distinguish from the log data). Not as elegant as an alert based solution (which I’d recommend), but it will allow you to identify those accounts where passwords have been compromised with a bit of leg work.

     

    Obviously this will be supplemented by Microsoft’s leaked credential detection service assuming you have AAD P1 or P2 🙂

     

    Hope this helps,

     

    Kelvin

    • Huw_W1's avatar
      Huw_W1
      Copper Contributor

      Kelvin Papp 

      Thanks for your response, I guess my question is really what should i look for in the sign in  logs to spot a login attempt which presents a correct password but then fails the MFA check?

      • Kelvin Papp's avatar
        Kelvin Papp
        Brass Contributor

        Huw_W1,

         

        You'll see a failure reason of "other" in the sign-in logs, as opposed to "invalid username or password":

         

        or...

         

         

        The sign-in error code is also key - 500121 above relates to a failed strong authentication in the context of "other":

         

         

        Regards,

         

        Kelvin

  • Tim67's avatar
    Tim67
    Brass Contributor

    Huw_W1 you have quite a few options. 

     

    https://docs.microsoft.com/en-us/cloud-app-security/getting-started-with-cloud-app-security

    https://docs.microsoft.com/en-us/cloud-app-security/getting-started-with-cloud-app-security 

    from there you will be able to automate rules and receive notifications via email

     

    Azure AD Sentinel

    https://docs.microsoft.com/en-us/azure/active-directory/reports-monitoring/concept-risky-sign-ins

    more difficult and you have to learn how to use this tool

     

    O365 ATP with E5 licence

    https://docs.microsoft.com/en-us/microsoft-365/compliance/alert-policies?view=o365-worldwide

    A very informative place to start looking if you have E5 license in addition with E5 you can also configure "safe links" 

    https://docs.microsoft.com/en-us/microsoft-365/security/office-365-security/set-up-atp-safe-links-policies?view=o365-worldwide

     

    and of course third party tool like Mimecast 🙂 

     

    Regards _tim

     

  • Thijs Lecomte's avatar
    Thijs Lecomte
    Bronze Contributor
    I personally like to use Azure Sentinel for this.
    You could configure an extra rule in Azure Sentinel which detects certain Azure AD Sign-in Error codes and throw an alert on certain conditions
  • Moe_Kinani's avatar
    Moe_Kinani
    Bronze Contributor
    Hi Huw,

    There are two types of log detections and they’re both migrated to MCAS (Cloud Apps Security)-> Alerts.

    1. Multiple logon failures: Which represent logins from different countries with brute force attacks.

    2. Sign in from unfamiliar locations: These are legit, someone trying to access accounts using right password from unfamiliar locations.

    Recommendations

    1. I highly recommend enabling Geo-Fencing to access your O365 by location.

    https://cloudbymoe.com/f/geo-fencing-access-to-o365-using-conditional-access


    2. Use PowerBI to connect to MSFT Graph Security API to have dynamic rich reports that refresh automatically.

    https://cloudbymoe.com/f/connect-powerbi-to-microsoft-graph-security

    Hope this helps!
    Moe

Resources