Microsoft Entra security operations for consumer accounts
Consumer identity activities are an important area for your organization to protect and monitor. This article is for Azure Active Directory B2C (Azure AD B2C) tenants and has guidance for monitoring consumer account activities. The activities are:
- Consumer account
- Privileged account
- Application
- Infrastructure
Before you begin
Before using the guidance in this article, we recommend you read, Microsoft Entra security operations guide.
Define a baseline
To discover anomalous behavior, define normal and expected behavior. Defining expected behavior for your organization helps you discover unexpected behavior. Use the definition to help reduce false positives, during monitoring and alerting.
With expected behavior defined, perform baseline monitoring to validate expectations. Then, monitor logs for what falls outside tolerance.
For accounts created outside normal processes, use the Microsoft Entra audit logs, Microsoft Entra sign-in logs, and directory attributes as your data sources. The following suggestions can help you define normal.
Consumer account creation
Evaluate the following list:
- Strategy and principles for tools and processes to create and manage consumer accounts
- For example, standard attributes and formats applied to consumer account attributes
- Approved sources for account creation.
- For example, onboarding custom policies, customer provisioning or migration tool
- Alert strategy for accounts created outside approved sources.
- Create a controlled list of organizations your organization collaborates with
- Strategy and alert parameters for accounts created, modified, or disabled by an unapproved consumer account administrator
- Monitoring and alert strategy for consumer accounts missing standard attributes, such as customer number, or not following organizational naming conventions
- Strategy, principles, and process for account deletion and retention
Where to look
Use log files to investigate and monitor. See the following articles for more:
- Audit logs in Microsoft Entra ID
- Sign-in logs in Microsoft Entra ID (preview)
- How To: Investigate risk
Audit logs and automation tools
From the Azure portal, you can view Microsoft Entra audit logs and download as comma separated value (CSV) or JavaScript Object Notation (JSON) files. Use the Azure portal to integrate Microsoft Entra logs with other tools to automate monitoring and alerting:
- Microsoft Sentinel – security analytics with security information and event management (SIEM) capabilities
- Sigma rules - an open standard for writing rules and templates that automated management tools can use to parse log files. If there are Sigma templates for our recommended search criteria, we added a link to the Sigma repo. Microsoft doesn't write, test, or manage Sigma templates. The repo and templates are created, and collected, by the IT security community.
- Azure Monitor – automated monitoring and alerting of various conditions. Create or use workbooks to combine data from different sources.
- Azure Event Hubs integrated with a SIEM - integrate Microsoft Entra logs with SIEMs such as Splunk, ArcSight, QRadar and Sumo Logic with Azure Event Hubs
- Microsoft Defender for Cloud Apps – discover and manage apps, govern across apps and resources, and conform cloud app compliance
- Microsoft Entra ID Protection - detect risk on workload identities across sign-in behavior and offline indicators of compromise
Use the remainder of the article for recommendations on what to monitor and alert. Refer to the tables, organized by threat type. See links to pre-built solutions or samples following the table. Build alerts using the previously mentioned tools.
Consumer accounts
What to monitor | Risk level | Where | Filter / subfilter | Notes |
---|---|---|---|---|
Large number of account creations or deletions | High | Microsoft Entra audit logs | Activity: Add user Status = success Initiated by (actor) = CPIM Service -and- Activity: Delete user Status = success Initiated by (actor) = CPIM Service |
Define a baseline threshold, and then monitor and adjust to suit your organizational behaviors. Limit false alerts. |
Accounts created and deleted by nonapproved users or processes | Medium | Microsoft Entra audit logs | Initiated by (actor) – USER PRINCIPAL NAME -and- Activity: Add user Status = success Initiated by (actor) != CPIM Service and-or Activity: Delete user Status = success Initiated by (actor) != CPIM Service |
If the actors are nonapproved users, configure to send an alert. |
Accounts assigned to a privileged role | High | Microsoft Entra audit logs | Activity: Add user Status = success Initiated by (actor) == CPIM Service -and- Activity: Add member to role Status = success |
If the account is assigned to a Microsoft Entra role, Azure role, or privileged group membership, alert and prioritize the investigation. |
Failed sign-in attempts | Medium - if Isolated incident High - if many accounts are experiencing the same pattern |
Microsoft Entra sign-in log | Status = failed -and- Sign-in error code 50126 - Error validating credentials due to invalid username or password. -and- Application == "CPIM PowerShell Client" -or- Application == "ProxyIdentityExperienceFramework" |
Define a baseline threshold, and then monitor and adjust to suit your organizational behaviors and limit false alerts from being generated. |
Smart lock-out events | Medium - if Isolated incident High - if many accounts are experiencing the same pattern or a VIP |
Microsoft Entra sign-in log | Status = failed -and- Sign-in error code = 50053 – IdsLocked -and- Application == "CPIM PowerShell Client" -or- Application =="ProxyIdentityExperienceFramework" |
Define a baseline threshold, and then monitor and adjust to suit your organizational behaviors and limit false alerts. |
Failed authentications from countries or regions you don't operate from | Medium | Microsoft Entra sign-in log | Status = failed -and- Location = <unapproved location> -and- Application == "CPIM PowerShell Client" -or- Application == "ProxyIdentityExperienceFramework" |
Monitor entries not equal to provided city names. |
Increased failed authentications of any type | Medium | Microsoft Entra sign-in log | Status = failed -and- Application == "CPIM PowerShell Client" -or- Application == "ProxyIdentityExperienceFramework" |
If you don't have a threshold, monitor and alert if failures increase by 10%, or greater. |
Account disabled/blocked for sign-ins | Low | Microsoft Entra sign-in log | Status = Failure -and- error code = 50057, The user account is disabled. |
This scenario could indicate someone trying to gain access to an account after they left an organization. The account is blocked, but it's important to log and alert this activity. |
Measurable increase of successful sign-ins | Low | Microsoft Entra sign-in log | Status = Success -and- Application == "CPIM PowerShell Client" -or- Application == "ProxyIdentityExperienceFramework" |
If you don't have a threshold, monitor and alert if successful authentications increase by 10%, or greater. |
Privileged accounts
What to monitor | Risk level | Where | Filter / subfilter | Notes |
---|---|---|---|---|
Sign-in failure, bad password threshold | High | Microsoft Entra sign-in log | Status = Failure -and- error code = 50126 |
Define a baseline threshold and monitor and adjust to suit your organizational behaviors. Limit false alerts. |
Failure because of Conditional Access requirement | High | Microsoft Entra sign-in log | Status = Failure -and- error code = 53003 -and- Failure reason = Blocked by Conditional Access |
The event can indicate an attacker is trying to get into the account. |
Interrupt | High, medium | Microsoft Entra sign-in log | Status = Failure -and- error code = 53003 -and- Failure reason = Blocked by Conditional Access |
The event can indicate an attacker has the account password, but can't pass the MFA challenge. |
Account lockout | High | Microsoft Entra sign-in log | Status = Failure -and- error code = 50053 |
Define a baseline threshold, then monitor and adjust to suit your organizational behaviors. Limit false alerts. |
Account disabled or blocked for sign-ins | low | Microsoft Entra sign-in log | Status = Failure -and- Target = User UPN -and- error code = 50057 |
The event could indicate someone trying to gain account access after they've left the organization. Although the account is blocked, log and alert this activity. |
MFA fraud alert or block | High | Microsoft Entra sign-in log/Azure Log Analytics | Sign-ins>Authentication details Result details = MFA denied, fraud code entered |
Privileged user indicates they haven't instigated the MFA prompt, which could indicate an attacker has the account password. |
MFA fraud alert or block | High | Microsoft Entra sign-in log/Azure Log Analytics | Activity type = Fraud reported - User is blocked for MFA or fraud reported - No action taken, based on fraud report tenant-level settings | Privileged user indicated no instigation of the MFA prompt. The scenario can indicate an attacker has the account password. |
Privileged account sign-ins outside of expected controls | High | Microsoft Entra sign-in log | Status = Failure UserPricipalName = <Admin account> Location = <unapproved location> IP address = <unapproved IP> Device info = <unapproved Browser, Operating System> |
Monitor and alert entries you defined as unapproved. |
Outside of normal sign-in times | High | Microsoft Entra sign-in log | Status = Success -and- Location = -and- Time = Outside of working hours |
Monitor and alert if sign-ins occur outside expected times. Find the normal working pattern for each privileged account and alert if there are unplanned changes outside normal working times. Sign-ins outside normal working hours could indicate compromise or possible insider threat. |
Password change | High | Microsoft Entra audit logs | Activity actor = Admin/self-service -and- Target = User -and- Status = Success or failure |
Alert when any administrator account password changes. Write a query for privileged accounts. |
Changes to authentication methods | High | Microsoft Entra audit logs | Activity: Create identity provider Category: ResourceManagement Target: User Principal Name |
The change could indicate an attacker adding an auth method to the account to have continued access. |
Identity Provider updated by nonapproved actors | High | Microsoft Entra audit logs | Activity: Update identity provider Category: ResourceManagement Target: User Principal Name |
The change could indicate an attacker adding an auth method to the account to have continued access. |
Identity Provider deleted by nonapproved actors | High | Microsoft Entra access reviews | Activity: Delete identity provider Category: ResourceManagement Target: User Principal Name |
The change could indicate an attacker adding an auth method to the account to have continued access. |
Applications
What to monitor | Risk level | Where | Filter / subfilter | Notes |
---|---|---|---|---|
Added credentials to applications | High | Microsoft Entra audit logs | Service-Core Directory, Category-ApplicationManagement Activity: Update Application-Certificates and secrets management -and- Activity: Update Service principal/Update Application |
Alert when credentials are: added outside normal business hours or workflows, types not used in your environment, or added to a non-SAML flow supporting service principal. |
App assigned to an Azure role-based access control (RBAC) role, or Microsoft Entra role | High to medium | Microsoft Entra audit logs | Type: service principal Activity: “Add member to role” or “Add eligible member to role” -or- “Add scoped member to role.” |
N/A |
App granted highly privileged permissions, such as permissions with “.All” (Directory.ReadWrite.All) or wide-ranging permissions (Mail.) | High | Microsoft Entra audit logs | N/A | Apps granted broad permissions such as “.All” (Directory.ReadWrite.All) or wide-ranging permissions (Mail.) |
Administrator granting application permissions (app roles), or highly privileged delegated permissions | High | Microsoft 365 portal | “Add app role assignment to service principal” -where- Target(s) identifies an API with sensitive data (such as Microsoft Graph) “Add delegated permission grant” -where- Target(s) identifies an API with sensitive data (such as Microsoft Graph) -and- DelegatedPermissionGrant.Scope includes high-privilege permissions. |
Alert when a global, application, or cloud application administrator consents to an application. Especially look for consent outside normal activity and change procedures. |
Application is granted permissions for Microsoft Graph, Exchange, SharePoint, or Microsoft Entra ID. | High | Microsoft Entra audit logs | “Add delegated permission grant” -or- “Add app role assignment to service principal” -where- Target(s) identifies an API with sensitive data (such as Microsoft Graph, Exchange Online, and so on) |
Use the alert in the preceding row. |
Highly privileged delegated permissions granted on behalf of all users | High | Microsoft Entra audit logs | “Add delegated permission grant” where Target(s) identifies an API with sensitive data (such as Microsoft Graph) DelegatedPermissionGrant.Scope includes high-privilege permissions -and- DelegatedPermissionGrant.ConsentType is “AllPrincipals”. |
Use the alert in the preceding row. |
Applications that are using the ROPC authentication flow | Medium | Microsoft Entra sign-in log | Status=Success Authentication Protocol-ROPC |
High level of trust is placed in this application because the credentials can be cached or stored. If possible, move to a more secure authentication flow. Use the process only in automated application testing, if ever. |
Dangling URI | High | Microsoft Entra logs and Application Registration | Service-Core Directory Category-ApplicationManagement Activity: Update Application Success – Property Name AppAddress |
For example, look for dangling URIs pointing to a domain name that is gone, or one you don’t own. |
Redirect URI configuration changes | High | Microsoft Entra logs | Service-Core Directory Category-ApplicationManagement Activity: Update Application Success – Property Name AppAddress |
Look for URIs not using HTTPS*, URIs with wildcards at the end or the domain of the URL, URIs that are not unique to the application, URIs that point to a domain you don't control. |
Changes to AppID URI | High | Microsoft Entra logs | Service-Core Directory Category-ApplicationManagement Activity: Update Application Activity: Update Service principal |
Look for AppID URI modifications, such as adding, modifying, or removing the URI. |
Changes to application ownership | Medium | Microsoft Entra logs | Service-Core Directory Category-ApplicationManagement Activity: Add owner to application |
Look for instances of users added as application owners outside normal change management activities. |
Changes to sign out URL | Low | Microsoft Entra logs | Service-Core Directory Category-ApplicationManagement Activity: Update Application -and- Activity: Update service principle |
Look for modifications to a sign out URL. Blank entries or entries to non-existent locations would stop a user from terminating a session. |
Infrastructure
What to monitor | Risk Level | Where | Filter / subfilter | Notes |
---|---|---|---|---|
New Conditional Access Policy created by nonapproved actors | High | Microsoft Entra audit logs | Activity: Add Conditional Access policy Category: Policy Initiated by (actor): User Principal Name |
Monitor and alert Conditional Access changes. Initiated by (actor): approved to make changes to Conditional Access? |
Conditional Access Policy removed by nonapproved actors | Medium | Microsoft Entra audit logs | Activity: Delete Conditional Access policy Category: Policy Initiated by (actor): User Principal Name |
Monitor and alert Conditional Access changes. Initiated by (actor): approved to make changes to Conditional Access? |
Conditional Access Policy updated by nonapproved actors | High | Microsoft Entra audit logs | Activity: Update Conditional Access policy Category: Policy Initiated by (actor): User Principal Name |
Monitor and alert Conditional Access changes. Initiated by (actor): approved to make changes to Conditional Access? Review Modified Properties and compare old vs. new value |
B2C custom policy created by nonapproved actors | High | Microsoft Entra audit logs | Activity: Create custom policy Category: ResourceManagement Target: User Principal Name |
Monitor and alert custom policy changes. Initiated by (actor): approved to make changes to custom policies? |
B2C custom policy updated by nonapproved actors | High | Microsoft Entra audit logs | Activity: Get custom policies Category: ResourceManagement Target: User Principal Name |
Monitor and alert custom policy changes. Initiated by (actor): approved to make changes to custom policies? |
B2C custom policy deleted by nonapproved actors | Medium | Microsoft Entra audit logs | Activity: Delete custom policy Category: ResourceManagement Target: User Principal Name |
Monitor and alert custom policy changes. Initiated by (actor): approved to make changes to custom policies? |
User flow created by nonapproved actors | High | Microsoft Entra audit logs | Activity: Create user flow Category: ResourceManagement Target: User Principal Name |
Monitor and alert on user flow changes. Initiated by (actor): approved to make changes to user flows? |
User flow updated by nonapproved actors | High | Microsoft Entra audit logs | Activity: Update user flow Category: ResourceManagement Target: User Principal Name |
Monitor and alert on user flow changes. Initiated by (actor): approved to make changes to user flows? |
User flow deleted by nonapproved actors | Medium | Microsoft Entra audit logs | Activity: Delete user flow Category: ResourceManagement Target: User Principal Name |
Monitor and alert on user flow changes. Initiated by (actor): approved to make changes to user flows? |
API connectors created by nonapproved actors | Medium | Microsoft Entra audit logs | Activity: Create API connector Category: ResourceManagement Target: User Principal Name |
Monitor and alert API connector changes. Initiated by (actor): approved to make changes to API connectors? |
API connectors updated by nonapproved actors | Medium | Microsoft Entra audit logs | Activity: Update API connector Category: ResourceManagement Target: User Principal Name: ResourceManagement |
Monitor and alert API connector changes. Initiated by (actor): approved to make changes to API connectors? |
API connectors deleted by nonapproved actors | Medium | Microsoft Entra audit logs | Activity: Update API connector Category: ResourceManagment Target: User Principal Name: ResourceManagment |
Monitor and alert API connector changes. Initiated by (actor): approved to make changes to API connectors? |
Identity provider (IdP) created by nonapproved actors | High | Microsoft Entra audit logs | Activity: Create identity provider Category: ResourceManagement Target: User Principal Name |
Monitor and alert IdP changes. Initiated by (actor): approved to make changes to IdP configuration? |
IdP updated by nonapproved actors | High | Microsoft Entra audit logs | Activity: Update identity provider Category: ResourceManagement Target: User Principal Name |
Monitor and alert IdP changes. Initiated by (actor): approved to make changes to IdP configuration? |
IdP deleted by nonapproved actors | Medium | Microsoft Entra audit logs | Activity: Delete identity provider Category: ResourceManagement Target: User Principal Name |
Monitor and alert IdP changes. Initiated by (actor): approved to make changes to IdP configuration? |
Next steps
To learn more, see the following security operations articles:
- Microsoft Entra security operations guide
- Microsoft Entra security operations for user accounts
- Security operations for privileged accounts in Microsoft Entra ID
- Microsoft Entra security operations for Privileged Identity Management
- Microsoft Entra security operations guide for applications
- Microsoft Entra security operations for devices
- Security operations for infrastructure