azuread_account_provisioning_activity_report_reviewedazuread_admin_consent_workflow_enabledazuread_admin_user_mfa_enabledazuread_all_user_mfa_enabledazuread_audit_log_search_enabledazuread_authorization_policy_accessing_company_data_not_allowedazuread_global_admin_range_restrictedazuread_group_not_publicazuread_guest_user_infoazuread_legacy_authentication_disabledazuread_microsoft_azure_management_limited_to_administrative_rolesazuread_password_protection_enabledazuread_risky_sign_ins_reportazuread_security_default_disabledazuread_signin_frequency_policyazuread_signin_risk_policyazuread_third_party_application_not_allowedazuread_user_password_not_set_to_expireazuread_user_risk_policyazuread_user_sspr_enabledmicrosoft365_calendar_sharing_disabled
Query: azuread_risky_sign_ins_report
Usage
powerpipe query microsoft365_compliance.query.azuread_risky_sign_ins_report
Steampipe Tables
SQL
with risky_sign_ins_report as ( select id, tenant_id, _ctx, risk_level_aggregated from azuread_sign_in_report where risk_level_aggregated = 'high' and created_date_time::timestamp >= (current_date - interval '7' day))select tenant_id as resource, 'info' as status, case when count(*) < 1 then tenant_id || ' has no risky sign-ins reported in last week.' else tenant_id || ' has ' || count(*) || ' risky sign-ins reported in last week.' end as reason , tenant_id as tenant_idfrom risky_sign_ins_reportgroup by tenant_id, _ctx;
Controls
The query is being used by the following controls:
- 5.3 Ensure the Azure AD 'Risky sign-ins' report is reviewed at least weekly
- 5.3 Ensure the Azure AD 'Risky sign-ins' report is reviewed at least weekly
- 5.4 Ensure the Azure AD 'Risky sign-ins' report is reviewed at least weekly
- 5.2.6.1 Ensure the Azure AD 'Risky sign-ins' report is reviewed at least weekly