Azure azure_ad_identity_protection Mappings

Identity Protection is a tool that allows organizations to accomplish three key tasks: Automate the detection and remediation of identity-based risks. Investigate risks using data in the portal. Export risk detection data to third-party utilities for further analysis.

Mappings

Capability ID Capability Description Category Value ATT&CK ID ATT&CK Name Notes
azure_ad_identity_protection Azure AD Identity Protection detect partial T1078 Valid Accounts
azure_ad_identity_protection Azure AD Identity Protection respond partial T1078 Valid Accounts
Comments
This control provides a response capability that accompanies its detection capability that can contain and eradicate the impact of this technique. Because this capability varies between containment (federated accounts) and eradication (cloud accounts) and is only able to respond to some of this technique's sub-techniques, it has been scored as Partial.
References
azure_ad_identity_protection Azure AD Identity Protection detect partial T1078.004 Cloud Accounts
Comments
This control provides risk detections that can be used to detect suspicious uses of valid accounts, e.g.: Anonymous IP address, Atypical travel, Malware linked IP address, Unfamiliar sign-in properties, etc. Microsoft utilizes machine learning and heuristic systems to reduce the false positive rate but there will be false positives. The temporal factor of this control's detection is low because although there are some real-time detections most are offline detections (multi-day).
References
    azure_ad_identity_protection Azure AD Identity Protection respond significant T1078.004 Cloud Accounts
    Comments
    Response Type: Eradication Supports blocking and resetting the user's credentials based on the detection of a risky user/sign-in manually and also supports automation via its user and sign-in risk policies.
    References
      azure_ad_identity_protection Azure AD Identity Protection detect partial T1078.002 Domain Accounts
      Comments
      When Azure Active Directory (AAD) Federation is configured for a tenant, an adversary that compromises a domain credential can use it to access (Azure) cloud resources. Identity Protection supports applying its risk detections (e.g.: Anonymous IP address, Atypical travel, Malware linked IP address, Unfamiliar sign-in properties, etc.) to federated identities thereby providing detection mitigation for this risk. Because this detection is specific to an adversary utilizing valid domain credentials to access cloud resources and does not mitigate the usage of valid domain credentials to access on-premise resources, this detection has been scored as Partial. The temporal factor of this control's detection is low because although there are some real-time detections most are offline detections (multi-day).
      References
        azure_ad_identity_protection Azure AD Identity Protection respond partial T1078.002 Domain Accounts
        Comments
        Response Type: Containment Supports risk detection responses such as blocking a user's access and enforcing MFA. These responses contain the impact of this sub-technique but do not eradicate it (by forcing a password reset).
        References
          azure_ad_identity_protection Azure AD Identity Protection detect partial T1606 Forge Web Credentials
          Comments
          This control can be effective at detecting forged web credentials because it uses environmental properties (e.g. IP address, device info, etc.) to detect risky users and sign-ins even when valid credentials are utilized. It provides partial coverage of this technique's sub-techniques and therefore has been assessed a Partial score.
          References
          azure_ad_identity_protection Azure AD Identity Protection respond partial T1606 Forge Web Credentials
          azure_ad_identity_protection Azure AD Identity Protection detect partial T1606.002 SAML Tokens
          Comments
          This control supports detecting risky sign-ins and users that involve federated users and therefore can potentially alert on this activity. Not all alert types for this control support federated accounts therefore the detection coverage for this technique is partial.
          References
            azure_ad_identity_protection Azure AD Identity Protection respond significant T1606.002 SAML Tokens
            Comments
            Response Type: Eradication Supports blocking and resetting the user's credentials based on the detection of a risky user/sign-in manually and also supports automation via its user and sign-in risk policies.
            References
              azure_ad_identity_protection Azure AD Identity Protection detect minimal T1110 Brute Force
              azure_ad_identity_protection Azure AD Identity Protection respond minimal T1110 Brute Force
              azure_ad_identity_protection Azure AD Identity Protection detect partial T1110.003 Password Spraying
              Comments
              This control specifically provides detection of Password Spray attacks for Azure Active Directory accounts. Microsoft documentation states that this detection is based on a machine learning algorithm that has been improved with the latest improvement yielding a 100 percent increase in recall and 98 percent precision. The temporal factor for this detection is Partial as its detection is described as offline (i.e. detections may not show up in reporting for two to twenty-four hours).
              References
                azure_ad_identity_protection Azure AD Identity Protection respond significant T1110.003 Password Spraying
                Comments
                Response Type: Eradication Supports blocking and resetting the user's credentials based on the detection of a risky user/sign-in (such as Password Spray attack) manually and also supports automation via its user and sign-in risk policies.
                References