Query Details
//Find any single factor sign ins to Azure resources such as the Azure portal //Data connector required for this query - Azure Active Directory - Signin Logs //Microsoft Sentinel query SigninLogs | where TimeGenerated > ago(7d) | where AppDisplayName has "Azure" | where ResultType == 0 | where AuthenticationRequirement == "singleFactorAuthentication" | summarize ['Single Factor Authentications']=make_set(UserPrincipalName) by AppDisplayName | extend ['User Count'] = array_length(['Single Factor Authentications']) | order by ['User Count'] desc //Advanced Hunting query //Data connector required for this query - Advanced Hunting with Azure AD P2 License AADSignInEventsBeta | where Timestamp > ago(7d) | where Application has "Azure" | where ErrorCode == 0 | where LogonType == @"[""interactiveUser""]" | where AuthenticationRequirement == "singleFactorAuthentication" | summarize ['Single Factor Authentications']=make_set(AccountUpn) by Application | extend ['User Count'] = array_length(['Single Factor Authentications']) | order by ['User Count'] desc
The query is looking for single factor sign-ins to Azure resources, specifically the Azure portal. It uses different data connectors depending on the query platform being used (Microsoft Sentinel or Advanced Hunting).
In the Microsoft Sentinel query:
In the Advanced Hunting query:

Matt Zorich
Released: June 17, 2022
Tables
Keywords
Operators