Forum Discussion

Tim Settar's avatar
Tim Settar
Copper Contributor
Jul 09, 2019

Impossible travel alerts on failed logins

I am picking up impossible alerts that are not relevant. I have specified successful logins only for the Impossible Travel policy but it still alerting on what seems like failed logins. It is also displaying all the failed logins on the details.

My goal is to use flow and email the user to the activity and if they are unaware of the travel they can contact support. The issue is that it is reporting all the impossible travel in the details of failed logins which will only confuse the user.

Is there a way to only report successful events for Impossible Travel policy?

 

EXAMPLE DETAILS OF EVENT - These are all failed logins outside the US though.

The user was active from 210.217.32.25 in Korea and 8.41.93.10 in United States within 270 minutes.
The user was active from 85.175.226.82 in Russia and 8.41.93.10 in United States within 382 minutes.
The user was active from 182.71.16.42 in India and 8.41.93.10 in United States within 686 minutes.
The user was active from 222.223.41.92 in China and 8.41.93.10 in United States within 690 minutes.
The user was active from 210.217.32.25 in Korea and 2600:387:9:5::b6 in Puerto Rico within 317 minutes.
The user was active from 8.41.93.10 in United States and 2600:387:9:5::b6 in Puerto Rico within 46 minutes.
The user was active from 182.71.16.42 in India and 2600:387:9:5::b6 in Puerto Rico within 732 minutes.
The user was active from 222.223.41.92 in China and 2600:387:9:5::b6 in Puerto Rico within 736 minutes.
The user was active from 85.175.226.82 in Russia and 2600:387:9:5::b6 in Puerto Rico within 429 minutes.
The user was active from 2600:387:9:5::b6 in Puerto Rico and 201.140.110.78 in Mexico within 35 minutes.
The user was active from 210.217.32.25 in Korea and 201.140.110.78 in Mexico within 353 minutes.
The user was active from 182.71.16.42 in India and 201.140.110.78 in Mexico within 768 minutes.
The user was active from 222.223.41.92 in China and 201.140.110.78 in Mexico within 772 minutes.
The user was active from 85.175.226.82 in Russia and 201.140.110.78 in Mexico within 465 minutes. 

  • Tim Settar 

     

    Just to make sure I'm properly tracking your question, you want to be able to filter not just for impossible travel events but also only when those impossible travel events lead to a successful logon?  Is that correct?

    • Tim Settar's avatar
      Tim Settar
      Copper Contributor

      Correct. 

       

      Ultimately I am trying to find a way to automate some of the user alerts to email them suspicious activity and give them the option to go change their password. The alerts need to be digestible and understood by them though. If they are traveling and access email on their phone and then get into RDS or VPN.. boom! impossible travel. The Impossible Travel alerts description also includes all those failed login locations.

      For accounts that we know have been compromised based on some criteria, I see an automated flow that logs them out of all apps, resets their password and then text them that password to their MFA phone number. I know I'm dreaming but one day we will get there.

       

      Thanks for taking the time to get back to me!

      • jvaidya's avatar
        jvaidya
        Copper Contributor

        Tim Settar 

         

        We have been experiencing the same issue with impossible travel alert,  I wonder if you managed to find out a solution for this issue which you can share with the community.

         

        Many thanks in advance,

         

  • jvalente's avatar
    jvalente
    Copper Contributor

    I know this topic is about a year old but it's still an ongoing problem with our tenant.

     

     

    Because the alert is a built in anomaly alert, we can't tune it to avoid this.  Due to the size of our tenant  and (faculty, students, alumni), I can see nearly 200 of these alerts open and almost every one of them is the result of a successful, legitimate, login in the US followed by a failed login elsewhere.

     

    If any malicious actor wishes to overwhelm a security team with alerts, they could easily just begin generating failed logins from around the world.

     

    Please tune the alert (or allow users to tune the alert) to exclude failed logins. Other than tracking possible brute force attempts there is zero useful intelligence gained from knowing there was a failed login at an impossible travel distance.

    • Paul Hawkinson's avatar
      Paul Hawkinson
      Copper Contributor

      jvalente 

       

      We are having the same issue.  The Alert is not useful at all because 99% of the time it is a failed login.  So after a while you start to ignore what could be a very useful and important alert.

       

      Any help Microsoft guru type people?

       

      Paul

      • James Jones's avatar
        James Jones
        Copper Contributor

        We have started receiving Impossible Travel alerts for AT&T via Puerto Rico for people using email on their AT&T mobile devices while located in Florida and Illinois. The IP comes through as 

        2600:387:9:5::c4, (matched the OP), because I have verified with the users and now know that this is legitimate work being done, I am likely going to alter the policy to known IP addresses.

        This really doesn't solve the problem, just masks getting the error from reporting. The real issue is why is AT&T is saying this traffic is from PR.
  • gazzaluty's avatar
    gazzaluty
    Copper Contributor
    Anyone got an answer to this? Even with Successful login selected it still picks out unsuccessful.

Resources