Forum Discussion
Atypical travel: no logs in MCAS
For Azure AD sign-in activities (Risky sign-in), Cloud App Security only surfaces interactive sign-in activities and sign-in activities from legacy protocols such as ActiveSync. This would explain why there are no activities associated with the alert.
Non-interactive sign-in activities may be viewed in the Azure AD audit log. You should be able to locate the original alert in AAD’s Risky sign-ins blade. You can filter the detection type: Atypical travel and include a filter for the user which triggered the alert. AAD can then provide you with additional information in the basic and risk info details.
Hi John_Lewis
I checked your input and indeed after enabling the preview feature in azure AD I could see the sign-in log that created the atypical travel and the resource.
Placing a screenshot for other who might encounter this question:
Thanks for clarifying this. 🙂
Kind Regards