Skip to main content
RAIDEN runs a set of purpose-built detection rules against your Microsoft 365 audit log continuously. Each rule targets a specific attack technique or abuse pattern observed in real M365 environments. This page lists every active detection rule, what it monitors, and what triggers a finding.

How detections work

RAIDEN processes Microsoft 365 audit log events on every poll cycle (every 5 minutes). Events are evaluated against each active detection rule. When a rule’s conditions are met, a finding is created. Related findings for the same user are grouped into a Case with an AI-generated investigation report. All detection rules are:
  • Pure signal — no false-positive-based throttling. Every match creates a finding.
  • Per-user scoped — findings are always attributed to a specific user account.
  • Configurable via suppression — you can suppress a rule for a specific IP, application, or user if it fires on known-safe activity. See Cases & Alerts — Suppression.

Identity & Authentication

SESSION_BAD_ASN

Detects sign-ins from IP addresses belonging to ASNs (Autonomous System Numbers) associated with known threat infrastructure — hosting providers, bulletproof hosting networks, and datacentre ranges commonly used by attackers.
DetailValue
Event sourceAzureActiveDirectory audit log — sign-in events
MITRE ATT&CKT1078 — Valid Accounts
SeverityHigh

SESSION_BAD_ASN_VPN

Detects sign-ins from IP addresses associated with commercial VPN services and anonymising proxies. A legitimate user connecting via VPN is low risk; the same user suddenly switching to a VPN they have never used before — especially during a session with other suspicious indicators — is a strong signal.
DetailValue
Event sourceAzureActiveDirectory audit log
MITRE ATT&CKT1090 — Proxy
SeverityMedium

IMPOSSIBLE_TRAVEL

Detects two successful authentications from the same account within a time window that makes physical travel between the originating locations impossible. For example, a login from London followed 20 minutes later by a login from Singapore.
DetailValue
Event sourceAzureActiveDirectory sign-in events
MITRE ATT&CKT1078 — Valid Accounts
SeverityHigh

BASELINE_ANOMALY

Detects statistically significant deviations from a user’s established behavioural baseline. RAIDEN builds a profile of each user’s normal activity — usual ASNs, locations, session patterns, and application usage — and flags sessions that fall outside those norms. Requires 7–14 days of activity before the baseline is meaningful.
DetailValue
Event sourceAzureActiveDirectory sign-in events
MITRE ATT&CKT1078 — Valid Accounts
SeverityMedium

SESSION_ID_REUSE

Detects when the same session token or session ID is used from two different IP addresses — a strong indicator of token theft and session hijacking.
DetailValue
Event sourceAzureActiveDirectory sign-in events
MITRE ATT&CKT1550.004 — Use Alternate Authentication Material: Web Session Cookie
SeverityHigh

Phishing & Token Theft

DEVICE_CODE_PHISHING

Detects the device code authentication flow being used in suspicious context. Device code phishing is an increasingly common technique where attackers trick users into entering a device code that grants the attacker persistent access to the user’s account.
DetailValue
Event sourceAzureActiveDirectory sign-in events
MITRE ATT&CKT1528 — Steal Application Access Token
SeverityHigh

TOKEN_THEFT_SESSION

Detects indicators of session token theft — authentication events that show characteristics consistent with a replayed or stolen token, such as unusual client metadata, missing device registration, or session origin inconsistencies.
DetailValue
Event sourceAzureActiveDirectory sign-in events
MITRE ATT&CKT1550.004 — Use Alternate Authentication Material: Web Session Cookie
SeverityHigh

AITM_PHISHING

Detects Adversary-in-the-Middle (AiTM) phishing attacks — where an attacker proxies a legitimate Microsoft login to steal credentials and session tokens simultaneously. Triggered by combinations of indicators including unusual ASNs, session reuse, and post-authentication activity patterns.
DetailValue
Event sourceAzureActiveDirectory sign-in events, Exchange audit log
MITRE ATT&CKT1557 — Adversary-in-the-Middle
SeverityCritical

AITM_INTEL_KIT_MATCH

Detects sign-ins from IP addresses and infrastructure previously associated with known AiTM phishing kits (EvilGinx, Modlishka, Muraena, and variants). Matched against a continuously updated threat intelligence feed.
DetailValue
Event sourceAzureActiveDirectory sign-in events
MITRE ATT&CKT1557 — Adversary-in-the-Middle
SeverityHigh

Identity Posture

MFA_ACTIVITY

Detects suspicious MFA changes — new MFA device registrations, method changes, or MFA-related admin operations on the account. Particularly significant when combined with a recent sign-in from an unusual location.
DetailValue
Event sourceAzureActiveDirectory audit log
MITRE ATT&CKT1556.006 — Modify Authentication Process: Multi-Factor Authentication
SeverityHigh

AUTH_METHOD_POLICY_MODIFIED

Detects changes to the tenant-wide authentication methods policy — for example, enabling or disabling SMS OTP, adding or removing FIDO2 key support, or modifying Temporary Access Pass settings. These are admin-level changes that alter the security posture for all users.
DetailValue
Event sourceAzureActiveDirectory audit log
MITRE ATT&CKT1556 — Modify Authentication Process
SeverityMedium

Exfiltration & Data Access

SPO_MASS_DOWNLOAD

Detects a high volume of SharePoint or OneDrive file download events from a single session within a short time window — a pattern consistent with bulk data exfiltration.
DetailValue
Event sourceSharePoint audit log
MITRE ATT&CKT1030 — Data Transfer Size Limits
SeverityHigh
Detects mass creation of anonymous sharing links for files or folders — a technique used to exfiltrate data without downloading it directly. A high volume of sharing links created in a short window is a strong exfiltration indicator.
DetailValue
Event sourceSharePoint audit log
MITRE ATT&CKT1567 — Exfiltration Over Web Service
SeverityHigh

MAILBOX_DELEGATION

Detects suspicious mailbox delegation — granting another account full mailbox access or send-on-behalf permissions. Commonly used by attackers after compromise to maintain persistent mailbox access without needing the user’s credentials.
DetailValue
Event sourceExchange audit log
MITRE ATT&CKT1098.002 — Account Manipulation: Additional Email Delegate Permissions
SeverityMedium

Persistence & Manipulation

MAIL_FORWARDING

Detects the creation of inbox rules that forward emails to external addresses or hide security-related emails from the user. Both techniques are used by attackers after account compromise to maintain visibility into the victim’s mailbox.
DetailValue
Event sourceExchange audit log
MITRE ATT&CKT1114.003 — Email Collection: Email Forwarding Rule
SeverityHigh

POWER_AUTOMATE_ABUSE

Detects suspicious Power Automate flow creation — particularly flows that connect to external services, perform data exports, or are created immediately after a suspicious authentication event.
DetailValue
Event sourceExchange / M365 audit log
MITRE ATT&CKT1567 — Exfiltration Over Web Service
SeverityMedium

TEAMS_ANOMALY

Detects unusual Microsoft Teams activity — high-volume external message sends, unusual Teams app installations, or Teams usage that deviates significantly from the user’s normal pattern.
DetailValue
Event sourceMicrosoft Teams audit log
MITRE ATT&CKT1534 — Internal Spearphishing
SeverityMedium

OAUTH_APP_ABUSE

Detects OAuth application consent grants that are suspicious — apps requesting high-privilege permissions, apps newly registered with unusual metadata, or consent events immediately following a suspicious sign-in.
DetailValue
Event sourceAzureActiveDirectory audit log
MITRE ATT&CKT1550.001 — Use Alternate Authentication Material: Application Access Token
SeverityHigh

Microsoft Defender Integration

MS_DEFENDER_ALERTS

Ingests security alerts from Microsoft Defender for Endpoint, Defender for Identity, and Defender for Cloud Apps. Defender alerts are treated as first-class RAIDEN findings and grouped into cases alongside RAIDEN-native detections for the same user.
DetailValue
Event sourceMicrosoft Graph Security API (/security/alerts_v2)
MITRE ATT&CKVaries by alert
SeverityInherited from Defender severity
Defender alert ingestion requires SecurityEvents.Read.All permission (included in RAIDEN’s standard permission set). The alerts visible in RAIDEN are the same alerts you would see in the Microsoft Defender portal — RAIDEN adds them to your investigation workflow.

Suppressing false positives

If a detection fires on known-safe activity — for example, a legitimate VPN you use regularly — you can suppress it per IP, application, or user from the alert view. See Cases & Alerts — Marking a false positive for the steps. Suppression is per rule. Suppressing a rule for one IP does not affect other rules or other IPs.