Forum Discussion
Detect compromised passwords
- Mar 02, 2020
You'll see a failure reason of "other" in the sign-in logs, as opposed to "invalid username or password":
or...
The sign-in error code is also key - 500121 above relates to a failed strong authentication in the context of "other":
Regards,
Kelvin
Huw_W1 you have quite a few options.
https://docs.microsoft.com/en-us/cloud-app-security/getting-started-with-cloud-app-security
https://docs.microsoft.com/en-us/cloud-app-security/getting-started-with-cloud-app-security
from there you will be able to automate rules and receive notifications via email
Azure AD Sentinel
https://docs.microsoft.com/en-us/azure/active-directory/reports-monitoring/concept-risky-sign-ins
more difficult and you have to learn how to use this tool
O365 ATP with E5 licence
https://docs.microsoft.com/en-us/microsoft-365/compliance/alert-policies?view=o365-worldwide
A very informative place to start looking if you have E5 license in addition with E5 you can also configure "safe links"
https://docs.microsoft.com/en-us/microsoft-365/security/office-365-security/set-up-atp-safe-links-policies?view=o365-worldwide
and of course third party tool like Mimecast 🙂
Regards _tim