<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Microsoft-Entra-Id — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/microsoft-entra-id/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 18 May 2026 09:02:10 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/microsoft-entra-id/feed.xml" rel="self" type="application/rss+xml"/><item><title>Microsoft Graph Multi-Category Reconnaissance Burst</title><link>https://feed.craftedsignal.io/briefs/2026-05-microsoft-graph-recon/</link><pubDate>Mon, 18 May 2026 09:02:10 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-microsoft-graph-recon/</guid><description>The rule detects Microsoft Graph activity from delegated user tokens where a single user session and source IP rapidly touches multiple high-value Graph paths indicative of reconnaissance, suggesting a broad enumeration playbook.</description><content:encoded><![CDATA[<p>This detection rule identifies suspicious reconnaissance activity within Microsoft Graph Activity Logs. It focuses on delegated user tokens (client_auth_method 0) where a single user session and source IP rapidly access multiple high-value Graph paths. The rule categorizes these requests into distinct areas such as role discovery, cross-tenant relationship queries, mailbox paths, contact harvesting, and organization/licensing metadata. A short burst of activity touching three or more distinct categories suggests a broader enumeration playbook, potentially indicating malicious reconnaissance efforts. The rule leverages Microsoft Graph Activity Logs ingested into <code>logs-azure.graphactivitylogs-*</code>.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains unauthorized access to a user account or leverages a compromised application with delegated permissions.</li>
<li>The attacker or compromised application initiates a series of Microsoft Graph API requests using a delegated user token (client_auth_method 0).</li>
<li>The requests target high-value Graph endpoints related to role management, cross-tenant relationships, mailbox settings, contacts, and organization metadata.</li>
<li>The requests are classified into categories such as role_discovery, cross_tenant_recon, mailbox_recon, contact_harvesting, and org_and_licensing_recon based on the accessed URL paths.</li>
<li>The system aggregates the API requests based on user principal object ID, source IP, session ID (c_sid), and tenant ID.</li>
<li>The rule identifies instances where at least four distinct recon categories are accessed within a short time frame (60 seconds), exceeding a threshold of 20 total high-value calls.</li>
<li>The system flags this behavior as a potential reconnaissance burst, indicating a broad enumeration attempt.</li>
<li>The attacker gains insights into the organization&rsquo;s structure, roles, user information, and other sensitive data, facilitating further malicious activities such as privilege escalation or data exfiltration.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful reconnaissance can provide attackers with valuable information about an organization&rsquo;s cloud environment, including user roles, relationships with other tenants, mailbox configurations, contact lists, and licensing details. This information can be used to facilitate privilege escalation, data theft, or other malicious activities. The scope of the impact depends on the level of access granted to the compromised user or application and the sensitivity of the data exposed through the Graph API.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect Microsoft Graph Multi-Category Reconnaissance Burst</code> to your SIEM and tune the threshold (<code>Esql.distinct_categories &gt;= 4 and Esql.total_high_value_calls &gt;= 20</code>) and path lists for your tenant, to reduce false positives.</li>
<li>Review the <code>Esql.categories</code> and <code>Esql.sample_paths</code> fields in the alert to understand which Graph endpoints were accessed and whether they align with the expected application behavior.</li>
<li>Validate <code>azure.graphactivitylogs.properties.app_id</code> and <code>user_agent.original</code> against approved applications.</li>
<li>Correlate with Entra ID sign-in logs for the same user and session to investigate MFA, conditional access, and token issuance context.</li>
<li>Check whether <code>failed_calls</code> indicates probing or permission errors, which could indicate a more targeted attack.</li>
<li>Revoke refresh tokens for the user, disable or restrict the application consent, and reset credentials per policy if malicious activity is confirmed (see rule <code>Microsoft Graph Multi-Category Reconnaissance Burst</code>).</li>
<li>Add conditional access or block rules for high-risk Graph patterns to prevent future reconnaissance attempts.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>cloud</category><category>identity</category><category>api</category><category>azure</category><category>microsoft-entra-id</category><category>microsoft-graph</category><category>threat-detection</category><category>discovery</category></item></channel></rss>