07-09-2019 08:23 AM
07-09-2019 08:23 AM
I am picking up impossible alerts that are not relevant. I have specified successful logins only for the Impossible Travel policy but it still alerting on what seems like failed logins. It is also displaying all the failed logins on the details.
My goal is to use flow and email the user to the activity and if they are unaware of the travel they can contact support. The issue is that it is reporting all the impossible travel in the details of failed logins which will only confuse the user.
Is there a way to only report successful events for Impossible Travel policy?
EXAMPLE DETAILS OF EVENT - These are all failed logins outside the US though.
The user was active from 22.214.171.124 in Korea and 126.96.36.199 in United States within 270 minutes.
The user was active from 188.8.131.52 in Russia and 184.108.40.206 in United States within 382 minutes.
The user was active from 220.127.116.11 in India and 18.104.22.168 in United States within 686 minutes.
The user was active from 22.214.171.124 in China and 126.96.36.199 in United States within 690 minutes.
The user was active from 188.8.131.52 in Korea and 2600:387:9:5::b6 in Puerto Rico within 317 minutes.
The user was active from 184.108.40.206 in United States and 2600:387:9:5::b6 in Puerto Rico within 46 minutes.
The user was active from 220.127.116.11 in India and 2600:387:9:5::b6 in Puerto Rico within 732 minutes.
The user was active from 18.104.22.168 in China and 2600:387:9:5::b6 in Puerto Rico within 736 minutes.
The user was active from 22.214.171.124 in Russia and 2600:387:9:5::b6 in Puerto Rico within 429 minutes.
The user was active from 2600:387:9:5::b6 in Puerto Rico and 126.96.36.199 in Mexico within 35 minutes.
The user was active from 188.8.131.52 in Korea and 184.108.40.206 in Mexico within 353 minutes.
The user was active from 220.127.116.11 in India and 18.104.22.168 in Mexico within 768 minutes.
The user was active from 22.214.171.124 in China and 126.96.36.199 in Mexico within 772 minutes.
The user was active from 188.8.131.52 in Russia and 184.108.40.206 in Mexico within 465 minutes.
07-17-2019 06:41 AM
Ultimately I am trying to find a way to automate some of the user alerts to email them suspicious activity and give them the option to go change their password. The alerts need to be digestible and understood by them though. If they are traveling and access email on their phone and then get into RDS or VPN.. boom! impossible travel. The Impossible Travel alerts description also includes all those failed login locations.
For accounts that we know have been compromised based on some criteria, I see an automated flow that logs them out of all apps, resets their password and then text them that password to their MFA phone number. I know I'm dreaming but one day we will get there.
Thanks for taking the time to get back to me!
05-20-2020 08:45 AM
I know this topic is about a year old but it's still an ongoing problem with our tenant.
Because the alert is a built in anomaly alert, we can't tune it to avoid this. Due to the size of our tenant and (faculty, students, alumni), I can see nearly 200 of these alerts open and almost every one of them is the result of a successful, legitimate, login in the US followed by a failed login elsewhere.
If any malicious actor wishes to overwhelm a security team with alerts, they could easily just begin generating failed logins from around the world.
Please tune the alert (or allow users to tune the alert) to exclude failed logins. Other than tracking possible brute force attempts there is zero useful intelligence gained from knowing there was a failed login at an impossible travel distance.
05-22-2020 01:19 PM
We are having the same issue. The Alert is not useful at all because 99% of the time it is a failed login. So after a while you start to ignore what could be a very useful and important alert.
Any help Microsoft guru type people?
05-28-2020 09:18 AM
We have started receiving Impossible Travel alerts for AT&T via Puerto Rico for people using email on their AT&T mobile devices while located in Florida and Illinois. The IP comes through as
11-11-2020 05:45 AM
Are we asking this question in the wrong place? This question has been sitting here since May with no response other than others having a different issue. Meanwhile I am still getting a bunch of impossible travel alerts from failed logins that aren't helpful because they are masking the real events that I should be paying attention to.
I have it set to text me when I get one of these alerts which is wonderful when I know that it is actually a successful login but I now just ignore these texts because there is so much to sift through.
Can we get any help here? Surely there is a way to change these options.
11-16-2020 04:47 AM - edited 11-16-2020 04:48 AM
I can confirm this is still an issue.
11-18-2020 06:03 AM - edited 11-18-2020 06:07 AM
I should have updated on this but that got overlooked. I am now wondering if the solution is licensing related, and the inaction by MS is intentional to annoy users into paying for a higher tier. Over the summer we went from A3 to A5 licensing (Not sure what those are in non-educational plans) and one thing I found is that I suddenly *do* have the ability to tune the policy triggering the alert. Under advanced configuration there's "Analyze sign-in activities" and it can be set to only successful sign-ins, which has eliminated the problem for me.
the only change in my environment between me not having the option and having it is the licensing. If that's the case it's highly frustrating that they put such a basic thing behind a paywall that can add six figures to your licensing *and* a MS employee responded to this thread and just couldn't clarify that and has left everyone scrambling for over a year.