May 04 2020 03:07 AM
May 04 2020 03:07 AM
Im pretty new to Azure sentinel so it might be obvious.
I got this incident in our Sentinel setup but i cant seem to understand what its acutally telling me.
When i look up the events for the incidents, i cant see the actually locations, but only the location count.
how can i see the location for the logins to determine whether or not its the actually user who just logged in from a new location?
Is it succesfull logins or just attempt?
Hope someone can clarify this for me.
May 12 2020 04:27 PM
You can use the Query
| where TimeGenerated > ago(14d)
| where UserPrincipalName == "...."
| extend locationString = strcat(tostring(LocationDetails["countryOrRegion"]), "/", tostring(LocationDetails["state"]), "/", tostring(LocationDetails["city"]), ";")
summarize count() by locationString
May 14 2020 01:16 AM
Thanks for the answer.
This gave a good view of the sign-ins.
But are these successfull sign-ins or does it also count the failed sign-ins?
May 14 2020 01:38 AM
It is all sign ins because I kept to the data as analyzed by the rule itself. If you want to investigqate Signins with more flexiblity, you can use the Signins workbook which is very useful. You can learn more about this workbook (as well as the sign-in mapping workbook) in the "Day in a SOC analyst life" webinar (see module 12 of https://aka.ms/sentinelninjatraining)
May 14 2020 01:45 AM
Okay, i will look into that.
Im just trying to understand why the incident is actually being created and what the response should be to it.
Thanks for the help
May 14 2020 10:27 AM
@mircasa - Thanks for the feedback. I am looking at the detection and we will likely have some updates in the next week available on the Azure Sentinel GitHub. The involved App should already be coming thru in the AppDisplayName, but agreed we should bring thru the Location information, the ResultType for the sign in (meaning success or fail error code), along with IPAddresses related to the UserPrincipalName that is making the Signin attempt. The goal of this detection is to indicate a UserPrincipalName for a given AppDisplayName is anomalous based on the location the IP is associated with, all relative to the last day, 7 days and 14 days. If an alert fires for this, then using the workbook that Ofer points out would be a next step to understand context for the user and Signins. We can also look at improving the description to help with this. I will post back once the new version is available.
May 14 2020 11:36 PM
definitely think that location info and resultType would be a good addition.
Looking forward to the update.
Thanks for all the answers!
May 25 2020 03:18 PM
@shainw Also interested in this update, looking for Sentinel to flag us when a user sign's in to Office 365 from a country other then their own.