A brute force alert typically indicates repeated failed login attempts to one or many valid accounts. The analytics that produces these alerts aims to identify attackers trying to guess the correct password for a valid account. Modern authentication systems generally employ controls to prevent or limit password guessing, which has greatly reduced the number of actual brute force attacks in the wild. However, the prevalence of leaked user passwords and the value of obtaining access to a valid account means adversaries are encouraged to try this technique.
Identify which accounts were trying to be logged into.
Where did the authentication attempts come from? Often, this is either a remote source not associated with your organization, a workstation or server in your environment, or locally on a workstation or server.
Over what period of time did the related authentication activity occur? It can be instructive to note duration and distribution of events, as well as time of day and day of week.
There can be many types of authentication, particularly in a traditional Active Directory based environment. Some authentication events occur strictly between systems with no user interaction, while others are specifically initiated by a user each time. It's important to understand the type of authentication events you are observing to understand what a normal or abnormal volume of events looks like.
How many times was there a related authentication attempt? Often, this context will exist in the alert detail. It's also important to note if any attempts were successful.
By using this website, you agree to the storing of cookies on your device to enhance site navigation, analyze site usage, and assist in our marketing efforts. View our Privacy Policy for more information.