Forum Discussion
Impossible travel alerts on failed logins
I am picking up impossible alerts that are not relevant. I have specified successful logins only for the Impossible Travel policy but it still alerting on what seems like failed logins. It is also displaying all the failed logins on the details.
My goal is to use flow and email the user to the activity and if they are unaware of the travel they can contact support. The issue is that it is reporting all the impossible travel in the details of failed logins which will only confuse the user.
Is there a way to only report successful events for Impossible Travel policy?
EXAMPLE DETAILS OF EVENT - These are all failed logins outside the US though.
The user was active from 210.217.32.25 in Korea and 8.41.93.10 in United States within 270 minutes.
The user was active from 85.175.226.82 in Russia and 8.41.93.10 in United States within 382 minutes.
The user was active from 182.71.16.42 in India and 8.41.93.10 in United States within 686 minutes.
The user was active from 222.223.41.92 in China and 8.41.93.10 in United States within 690 minutes.
The user was active from 210.217.32.25 in Korea and 2600:387:9:5::b6 in Puerto Rico within 317 minutes.
The user was active from 8.41.93.10 in United States and 2600:387:9:5::b6 in Puerto Rico within 46 minutes.
The user was active from 182.71.16.42 in India and 2600:387:9:5::b6 in Puerto Rico within 732 minutes.
The user was active from 222.223.41.92 in China and 2600:387:9:5::b6 in Puerto Rico within 736 minutes.
The user was active from 85.175.226.82 in Russia and 2600:387:9:5::b6 in Puerto Rico within 429 minutes.
The user was active from 2600:387:9:5::b6 in Puerto Rico and 201.140.110.78 in Mexico within 35 minutes.
The user was active from 210.217.32.25 in Korea and 201.140.110.78 in Mexico within 353 minutes.
The user was active from 182.71.16.42 in India and 201.140.110.78 in Mexico within 768 minutes.
The user was active from 222.223.41.92 in China and 201.140.110.78 in Mexico within 772 minutes.
The user was active from 85.175.226.82 in Russia and 201.140.110.78 in Mexico within 465 minutes.
Just to make sure I'm properly tracking your question, you want to be able to filter not just for impossible travel events but also only when those impossible travel events lead to a successful logon? Is that correct?
- Tim SettarCopper Contributor
Correct.
Ultimately I am trying to find a way to automate some of the user alerts to email them suspicious activity and give them the option to go change their password. The alerts need to be digestible and understood by them though. If they are traveling and access email on their phone and then get into RDS or VPN.. boom! impossible travel. The Impossible Travel alerts description also includes all those failed login locations.
For accounts that we know have been compromised based on some criteria, I see an automated flow that logs them out of all apps, resets their password and then text them that password to their MFA phone number. I know I'm dreaming but one day we will get there.
Thanks for taking the time to get back to me!
- jvaidyaCopper Contributor
We have been experiencing the same issue with impossible travel alert, I wonder if you managed to find out a solution for this issue which you can share with the community.
Many thanks in advance,
- jvalenteCopper Contributor
I know this topic is about a year old but it's still an ongoing problem with our tenant.
Because the alert is a built in anomaly alert, we can't tune it to avoid this. Due to the size of our tenant and (faculty, students, alumni), I can see nearly 200 of these alerts open and almost every one of them is the result of a successful, legitimate, login in the US followed by a failed login elsewhere.
If any malicious actor wishes to overwhelm a security team with alerts, they could easily just begin generating failed logins from around the world.
Please tune the alert (or allow users to tune the alert) to exclude failed logins. Other than tracking possible brute force attempts there is zero useful intelligence gained from knowing there was a failed login at an impossible travel distance.
- Paul HawkinsonCopper Contributor
We are having the same issue. The Alert is not useful at all because 99% of the time it is a failed login. So after a while you start to ignore what could be a very useful and important alert.
Any help Microsoft guru type people?
Paul
- James JonesCopper Contributor
We have started receiving Impossible Travel alerts for AT&T via Puerto Rico for people using email on their AT&T mobile devices while located in Florida and Illinois. The IP comes through as
2600:387:9:5::c4, (matched the OP), because I have verified with the users and now know that this is legitimate work being done, I am likely going to alter the policy to known IP addresses.
This really doesn't solve the problem, just masks getting the error from reporting. The real issue is why is AT&T is saying this traffic is from PR.
- gazzalutyCopper ContributorAnyone got an answer to this? Even with Successful login selected it still picks out unsuccessful.
- WoonjasCopper ContributorI'm even getting impossible travel alerts for DISABLED accounts.
This alert is totally useless in its current form- Joe StockerBronze Contributoryou have to create an authentication policy to block sign-in attempts using legacy protocols such as IMAP, POP and SMTP. Just disabling these protocols in Exchange is not enough, otherwise you will still have people trying to brute force against these disabled accounts.
https://docs.microsoft.com/en-us/exchange/clients-and-mobile-in-exchange-online/disable-basic-authentication-in-exchange-online#create-and-apply-authentication-policies
- Joe StockerBronze Contributorin my tenant, when I change it to successful sign-ins, I stopped getting the false positives about the failed logons. Perhaps you just need to give it a bit more time.
- LouisMastelinckBrass Contributor
I can confirm this is still an issue.