Multi-Factor Authentication
Adversaries may disable or modify multi-factor authentication (MFA) mechanisms to enable persistent access to compromised accounts. Once adversaries have gained access to a network by either compromising an account lacking MFA or by employing an MFA bypass method such as [Multi-Factor Authentication Request Generation](https://attack.mitre.org/techniques/T1621), adversaries may leverage their access to modify or completely disable MFA defenses. This can be accomplished by abusing legitimate fea...
BY SOURCE
PROCEDURES (12)
Auto-extracted: 8 detections for authentication monitoring
Auto-extracted: 3 detections for cloud
Auto-extracted: 3 detections for api
Auto-extracted: 2 detections for suspicious
Auto-extracted: 2 detections for unusual
Auto-extracted: 1 detections for bypass
Auto-extracted: 1 detections for credential
Auto-extracted: 1 detections for privilege
Auto-extracted: 1 detections for api
Auto-extracted: 1 detections for azure
Auto-extracted: 1 detections for azure
Auto-extracted: 1 detections for general monitoring