Microsoft Secure Tech Accelerator
Apr 03 2024, 07:00 AM - 11:00 AM (PDT)
Microsoft Tech Community

Trying to understand "Anomalous sign-in location by user account and authenticating application"

Copper Contributor

Im pretty new to Azure sentinel so it might be obvious.

 

I got this incident in our Sentinel setup but i cant seem to understand what its acutally telling me.

When i look up the events for the incidents, i cant see the actually locations, but only the location count.

So 

how can i see the location for the logins to determine whether or not its the actually user who just logged in from a new location?
Is it succesfull logins or just attempt?

 

Hope someone can clarify this for me.

 

8 Replies

@mircasa 

 

You can use the Query

SigninLogs
| where TimeGenerated > ago(14d)
| where UserPrincipalName == "...."
| extend locationString = strcat(tostring(LocationDetails["countryOrRegion"]), "/", tostring(LocationDetails["state"]), "/", tostring(LocationDetails["city"]), ";")
summarize count() by locationString

 

@Ofer_Shezaf 

Thanks for the answer.

 

This gave a good view of the sign-ins.

But are these successfull sign-ins or does it also count the failed sign-ins?

@mircasa 

 

It is all sign ins because I kept to the data as analyzed by the rule itself. If you want to investigqate Signins with more flexiblity, you can use the Signins workbook which is very useful. You can learn more about this workbook (as well as the sign-in mapping workbook) in the "Day in a SOC analyst life" webinar (see module 12 of https://aka.ms/sentinelninjatraining)

@Ofer_Shezaf 

 

Okay, i will look into that.


Im just trying to understand why the incident is actually being created and what the response should be to it.

 

Thanks for the help

@mircasa - Thanks for the feedback.  I am looking at the detection and we will likely have some updates in the next week available on the Azure Sentinel GitHub.  The involved App should already be coming thru in the AppDisplayName, but agreed we should bring thru the Location information, the ResultType for the sign in (meaning success or fail error code), along with IPAddresses related to the UserPrincipalName that is making the Signin attempt.  The goal of this detection is to indicate a UserPrincipalName for a given AppDisplayName is anomalous based on the location the IP is associated with, all relative to the last day, 7 days and 14 days.  If an alert fires for this, then using the workbook that Ofer points out would be a next step to understand context for the user and Signins.  We can also look at improving the description to help with this.  I will post back once the new version is available.

@shainw 

 

definitely think that location info and resultType would be a good addition.

Looking forward to the update.

 

Thanks for all the answers! 

@shainw  Also interested in this update, looking for Sentinel to flag us when a user sign's in to Office 365 from a country other then their own.

@shainw 

Is there a solution, I have the same problem. But I don't understand why the query doesn't show more details like for example the exact location or the error code?