Skip to content

Azure AD Password Protection

Azure AD Password Protection

About

Microsoft Entra Password Protection detects and blocks known weak passwords and their variants, and can also block additional weak terms that are specific to your organization.

Product Details

Vendor URL: Azure AD Password Protection

Product Type: IAM

Product Tier: Tier III

Integration Method: Syslog

Parser Details

Log Format: JSON

Expected Normalization Rate: 100%

Data Label: AZURE_AD_PASSWORD_PROTECTION

UDM Fields (list of all UDM fields leveraged in the Parser):

Log File Field UDM Field
AccountName principal.user.userid
AccountType principal.user.attribute.roles
ActivityID security_result.detection_fields
Domain principal.user.group_identifiers
EventID metadata.product_event_type
ExecutionProcessID principal.process.pid
ExecutionThreadID principal.process.parent_process.pid
FullName target.user.user_display_name
Hostname principal.hostname
Message metadata.description
ProviderGuid metadata.product_log_id
RecordNumber observer.asset.product_object_id
Severity security_result.severity_details
SourceModuleName principal.resource.name
SourceModuleType principal.resource.resource_subtype
SourceName observer.application
UserID principal.user.windows_sid
UserName target.user.userid

Product Event Types

Event UDM Event Classification
All USER_CHANGE_PASSWORD
Generic GENERIC_EVENT

Log Sample

{"EventTime":"2024-10-07T16:00:27.845108-04:00","Hostname":"EXAMPLE.company.local","Keywords":"0x8000000000000000","LevelValue":4,"EventType":"INFO","SeverityValue":2,"Severity":"INFO","EventID":10014,"SourceName":"Microsoft-AzureADPasswordProtection-DCAgent","ProviderGuid":"{ABC123A0-ABCD-123A-123B-1234ABC5678}","Version":0,"TaskValue":0,"OpcodeValue":0,"RecordNumber":3981,"ActivityID":"{53B068F0-E37E-4ABE-B70F-123456789910}","ExecutionProcessID":852,"ExecutionThreadID":11628,"Channel":"Microsoft-AzureADPasswordProtection-DCAgent/Admin","Domain":"NT AUTHORITY","AccountName":"SYSTEM","UserID":"S-1-5-18","AccountType":"User","Message":"The changed password for the specified user was validated as compliant with the current Azure password policy.\r\n \r\n UserName: janedoe\r\n FullName: Jane Doe\r\n","Opcode":"Info","Level":"Information","Data1":"janedoe","Data2":"Jane Doe","EventReceivedTime":"2024-10-07T16:00:29.389369-04:00","SourceModuleName":"azure_ad_pass_protection","SourceModuleType":"im_msvistalog","TimeZone":"Eastern Daylight Time","TimeZoneOffset":"-0400"}

Sample Parsing

metadata.description = "The changed password for the specified user was validated as compliant with the current Azure password policy.\r\n \r\n UserName: janedoe\r\n FullName: Jane Doe\r\n"
metadata.event_type = "USER_CHANGE_PASSWORD"
metadata.log_type = "AZURE_AD_PASSWORD_PROTECTION"
metadata.product_event_type = "10014"
metadata.product_log_id = "{ABC123A0-ABCD-123A-123B-1234ABC5678}"
metadata.product_name = "Azure AD Password Protection"
metadata.vendor_name = "Microsoft"
observer.application = "Microsoft-AzureADPasswordProtection-DCAgent"
observer.asset.product_object_id = "3981"
principal.hostname = "EXAMPLE.company.local"
principal.process.parent_process.pid = "11628"
principal.process.pid = "852"
principal.resource.name = "azure_ad_pass_protection"
principal.resource.resource_subtype = "im_msvistalog"
principal.user.attribute.roles.name = "User"
principal.user.group_identifiers = "NT AUTHORITY"
principal.user.userid = "SYSTEM"
principal.user.windows_sid = "S-1-5-18"
security_result.detection_fields.value = "{53B068F0-E37E-4ABE-B70F-123456789910}"
security_result.severity = "INFORMATIONAL"
security_result.severity_details = "INFO"
target.user.user_display_name = "Jane Doe"
target.user.userid = "janedoe"