Brute Force Authentication Failures with Multi-Platform Log Correlation

Technique Detected:  Brute Force | T1110

ID: DET0463
Domains: Enterprise
Analytics: AN1275, AN1276, AN1277, AN1278, AN1279
Version: 1.0
Created: 21 October 2025
Last Modified: 21 October 2025

Analytics

AN1275

High volume of failed logon attempts followed by a successful one from a suspicious user, host, or timeframe

Log Sources
Data Component Name Channel
User Account Authentication (DC0002) WinEventLog:Security EventCode=4625, 4624
Mutable Elements
Field Description
TimeWindow Adjustable window to correlate failed logons, e.g., 5-10 minutes
UserContext Define scope of monitored users (e.g., service accounts, admins)
FailureThreshold Count of failed logons before raising an alert (e.g., 10-15)

AN1276

Multiple authentication failures for valid or invalid users followed by success from same IP/user

Log Sources
Data Component Name Channel
User Account Authentication (DC0002) auditd:USER_LOGIN USER_AUTH
Mutable Elements
Field Description
TimeWindow Period of brute force activity correlation (e.g., 5 mins)
IPWhitelist Exclude known monitoring IPs or jump boxes
LoginSource Filter SSH vs. local logins

AN1277

Password spraying or brute force attempts across user pool within short time intervals

Log Sources
Data Component Name Channel
User Account Authentication (DC0002) azure:signinlogs Sign-in logs
Mutable Elements
Field Description
UsernameSprayThreshold Max number of accounts targeted from a single IP
GeoAnomaly Mismatch between user location and request location

AN1278

Multiple failed authentications in unified logs (e.g., loginwindow or sshd)

Log Sources
Data Component Name Channel
User Account Authentication (DC0002) macos:unifiedlog auth
Mutable Elements
Field Description
TimeWindow Scope of authentication failures (e.g., 10-15 mins)
TargetUser Filter known service or decoy accounts

AN1279

Excessive login attempts followed by success from SaaS apps like O365, Dropbox, etc.

Log Sources
Data Component Name Channel
User Account Authentication (DC0002) m365:unified Sign-in logs
Mutable Elements
Field Description
AppName Detect brute force attempts targeting specific apps
UserGroup Limit alert scope to high-value user groups