SSPR/MFA
What Is SSPR
Attack
If you have control of an MFA method that is available to a user, you can reset their password without knowing their password.
Detect
Hunt for known bad MFA devices
Below scripts lists all MFA methods by every user and lists their properties.


What logs are available?
Audit Logs:
Password is not required for SSPR, only an alternate authentication method.
SSPR activity flow:
User submitted their user ID
User was presented with verification options
User started the mobile app code verification option
User completed the mobile app code verification option
User completed all verification steps required to reset their password
User submitted a new password
Reset user password
Update StsRefreshTokenValidFrom Timestamp
Successfully completed reset.
First MFA:
AuthenticationFlavor is updated from null, to authenticator (not sure why):
"AuthenticatorFlavor":null,
"AuthenticatorFlavor":"Authenticator",
LastAuthenticatedTimestamp is sometimes updated (note sure when):
"LastAuthenticatedTimestamp":"2023-10-25T06:38:08.344692Z",
"LastAuthenticatedTimestamp":"2024-12-12T12:38:08.344692Z",
Get audit log details, OData queries not support for filtering. Will have to get through graph explorer and copy paste to .txt file.
Sign-In Logs:
Mitigate
Last updated