Hi, I got an issue with password spraying attack where log source type is Microsoft Office 365 and Protocol Type is Office 365 REST AP. QRadar creates 1 offense for every event of 'User Login Failure'. The attached image is a snapshot from the Offense tab. Usernames is left out- examples 'invoice@xx.com, account@xx.com, payment@xx.com'. The attack lasted 10 minutes.
Rule:
Has anyone experienced this and is this related to the log source type or occurs because source IPs is IPv6? How can I tweak the rule so these events will trigger just 1 offense? Any updates or App content that will fix this issue?
QRadar version v7.3.2 Build 20190705120852. IBM QRadar Content Extension for Office 365. IBM QRadar Content Extension for Monitoring Microsoft Azure
------------------------------
Jan Vegar
------------------------------