Forum Discussion
Trying to understand "Anomalous sign-in location by user account and authenticating application"
Okay, i will look into that.
Im just trying to understand why the incident is actually being created and what the response should be to it.
Thanks for the help
mircasa - Thanks for the feedback. I am looking at the detection and we will likely have some updates in the next week available on the Azure Sentinel GitHub. The involved App should already be coming thru in the AppDisplayName, but agreed we should bring thru the Location information, the ResultType for the sign in (meaning success or fail error code), along with IPAddresses related to the UserPrincipalName that is making the Signin attempt. The goal of this detection is to indicate a UserPrincipalName for a given AppDisplayName is anomalous based on the location the IP is associated with, all relative to the last day, 7 days and 14 days. If an alert fires for this, then using the workbook that Ofer points out would be a next step to understand context for the user and Signins. We can also look at improving the description to help with this. I will post back once the new version is available.
- mircasaMay 15, 2020Copper Contributor
definitely think that location info and resultType would be a good addition.
Looking forward to the update.
Thanks for all the answers!
- steveburkettnzMay 25, 2020Brass Contributor
shainw Also interested in this update, looking for Sentinel to flag us when a user sign's in to Office 365 from a country other then their own.