Techniques
Sample rules
Azure AD Account Credential Leaked
- source: sigma
- technicques:
- t1589
Description
Indicates that the user’s valid credentials have been leaked.
Detection logic
condition: selection
selection:
riskEventType: leakedCredentials
LoFP
/
a rare hash collision.