Skip to main content

Entra ID Threats

The following threats are monitored for Microsoft Entra ID.

Application Permission Change

The Application Permission Change is when a sensitive or risky permission is granted to an application.

Application Permission Change
DefinitionApplication permissions are usually granted to them at their creation time. In some cases, new permissions are required to be granted at a later stage. An attacker can leverage Microsoft Entra ID applications by adding the new permissions and using them for privilege escalation or persistence in your Microsoft Entra ID tenant.
ExampleAn application is given the "Directory.ReadWrite.All" permission or any permission that requires admin consent.
TriggerA threat is created when an application is granted admin consent to a permission.

Compromised User Activity

The Compromised User Activity is when a user is marked as "Confirmed Compromised" and that user takes an action within your Microsoft Entra ID tenant.

Compromised User Activity
DefinitionThe Compromised User activity threat involves detecting any activity from a user that was marked as "Confirmed Compromised" by Microsoft Entra ID. Any action taken by such users is considered potentially malicious and should be reviewed immediately.
ExampleA confirmed compromised user grants another user the "global administrator" role.
TriggerA confirmed compromised user performs any action in your Microsoft Entra ID tenant.

Impossible Travel

The Impossible Travel is when a user logs in from one geographical location and then quickly (and impossibly) logs in from another far away geographical location.

Impossible Travel
DefinitionHighlights accounts associated with multiple authentications from different geographical locations in a short period of time.
ExampleA user logs in from a New York city, then 10 minutes later logs in from Moscow.
TriggerA threat is triggered when a user logs in from two distant locations within a short period of time.

New Applicaton Credentials

If an application suddenly gets a new set of credentials/client secrets, Threat Manager raises an alarm as to why these credentials are added.

New Application Credentials
DefinitionApplication credentials are usually provided at the time of application creation or when a secret is close to its expiry. New credentials can be added on need basis as well. An attacker can leverage Microsoft Entra ID applications by adding new credentials and using them for privilege escalation or persistence within an Microsoft Entra ID tenant.
ExampleA new client secret was generated for an existing application and used for a cybersecurity product.
TriggerA client secret is added to an application.

Sensitive Role Changes

Sensitive Role Change is assigning a privilege role to an Microsoft Entra ID object.

Sensitive Role Changes
DefinitionThe sensitive role changes threat detects when a privileged role is assigned to an Microsoft Entra ID object. The privilege roles have a high level of access to Microsoft Entra ID objects. They can make unauthorized changes which can pose significant security risks.
ExampleA user gives another user the "Global Administrator" role.
TriggerWhen an Microsoft Entra ID object is granted a privileged role.