Failed sign-ins into LastPass due to MFA
| Id | 760b8467-e6cc-4006-9149-5696845c1a54 |
| Rulename | Failed sign-ins into LastPass due to MFA |
| Description | This rule will check if a sign-in failed into LastPass due to MFA. An incident can indicate the potential brute forcing of a LastPass account. The use of MFA is identified by combining the sign-in logs, this rule assumes LastPass is federated to Entra ID. |
| Severity | Low |
| Tactics | InitialAccess |
| Techniques | T1078 T1190 |
| Required data connectors | AzureActiveDirectory LastPass |
| Kind | Scheduled |
| Query frequency | 1d |
| Query period | 1d |
| Trigger threshold | 0 |
| Trigger operator | gt |
| Source Uri | https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/LastPass/Analytic Rules/FailedSigninDueToMFA.yaml |
| Version | 1.0.1 |
| Arm template | 760b8467-e6cc-4006-9149-5696845c1a54.json |
LastPassNativePoller_CL
| where Action_s == "Log in"
| join (SigninLogs | where AppDisplayName == "LastPass Enterprise") on $left.IP_Address_s == $right.IPAddress and $left.Username_s == $right.UserPrincipalName
| where ResultType in (50074, 50076)
| extend AccountCustomEntity = Username_s, IPCustomEntity = IP_Address_s
query: |
LastPassNativePoller_CL
| where Action_s == "Log in"
| join (SigninLogs | where AppDisplayName == "LastPass Enterprise") on $left.IP_Address_s == $right.IPAddress and $left.Username_s == $right.UserPrincipalName
| where ResultType in (50074, 50076)
| extend AccountCustomEntity = Username_s, IPCustomEntity = IP_Address_s
entityMappings:
- fieldMappings:
- identifier: Name
columnName: AccountCustomEntity
entityType: Account
- fieldMappings:
- identifier: Address
columnName: IPCustomEntity
entityType: IP
triggerOperator: gt
eventGroupingSettings:
aggregationKind: AlertPerResult
description: |
'This rule will check if a sign-in failed into LastPass due to MFA.
An incident can indicate the potential brute forcing of a LastPass account.
The use of MFA is identified by combining the sign-in logs, this rule assumes LastPass is federated to Entra ID.'
tactics:
- InitialAccess
severity: Low
queryFrequency: 1d
kind: Scheduled
name: Failed sign-ins into LastPass due to MFA
triggerThreshold: 0
status: Available
id: 760b8467-e6cc-4006-9149-5696845c1a54
requiredDataConnectors:
- connectorId: LastPass
dataTypes:
- LastPassNativePoller_CL
- connectorId: AzureActiveDirectory
dataTypes:
- SigninLogs
relevantTechniques:
- T1078
- T1190
version: 1.0.1
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/LastPass/Analytic Rules/FailedSigninDueToMFA.yaml
queryPeriod: 1d