+ SECUREKusto Query LanguageMicrosoft Sentinel

List Conditional Access Application Sign-in Failure

Description

This KQL query lists all applications that trigger failed sign-in requests due to conditional access failures. This can indicate that a certain policy is not well configured and need to be changed in order for accounts to be able to access the application. On the other hand it can also be that the failed sign-ins are valid credentials that adversaries have obtained and they are used to try and gain access to certain applications in your environment. The CA policy will only block if the previous authentication requirements have already been met (e.g. username + password (+mfa)).

Risk

Adversaries have access to cloud credentials and are stopped due to CA policies.

Query

Microsoft Sentinel
Kusto
SigninLogs
| where ResultType != 0
| where ResultDescription has "Conditional Access"
| summarize Total = count(), ResultTypes = make_set(ResultType), ResultDescriptions = make_set(ResultDescription) by AppDisplayName
| sort by Total

References

Leave a Reply

Your email address will not be published. Required fields are marked *