Apr 11 2020 10:55 AM - last edited on Nov 09 2023 11:08 AM by
Hi,
I see a number of Risky Sign-ins with the code 50173 - Fresh auth token is needed. Have the user re-sign using fresh credentials. And the status is "Failure".
But I noticed the IP address captured is of another country. How to interpret the error code?
Thanks.
Apr 12 2020 07:18 AM
Apr 12 2020 08:21 AM
Is there a possibility where someone else has also setup the access to the user account from another country?
Thanks.
Apr 12 2020 09:13 AM - edited Apr 12 2020 09:25 AM
Apr 13 2020 01:15 AM
If you get an alert from Identity Protection, you can never be 100% sure why it was flagged as risky as Microsoft keeps these methods confidential.
I would suggest you check with the never if he has any clue why this login occurred ( he might be travelling, using roaming data or VPN).
If he doesn't know anything about this login, I would advise you to change his password and expire all his tokens. Even if he has MFA, his account could still be breached.
Apr 13 2020 09:33 AM
Thanks for your advice. I have reset the password.
If the status of the code shows "Failure", is that also indicating that the user account has been compromise? Or someone did successfully gain access to the account prior to this?
Or it could be just an attempt? Thanks.
Apr 13 2020 11:51 AM - edited Apr 13 2020 12:07 PM
Apr 13 2020 11:10 PM
You need to review the sign-in and check what the failure reason is.
If it failed because of a bad PW, no harm done
If it failed because of MFA, this is a breach as the password has been breached.
Apr 14 2020 01:58 AM
I think is not MFA. This is the failure reason.
I assume someone out there is trying to established the connection. But I wasn't sure whether by "token auth", does it mean somebody has successfully created/login to the account before.
Apr 14 2020 02:01 AM
I haven't seen this before.
A token is given to the user after successful authentication.
The error makes it seem that the token is expired, which would indicate that the user has signed into that device before.
Apr 14 2020 02:26 AM
@Thijs Lecomte
Is this anything we can do based on the information captured by the Sign-In data? Like the IP address of the session? Block it or any security measure? Thanks.
Apr 14 2020 02:38 AM