Which user accounts are involved in "Sign-ins from IPs that attempt sign-ins to disabled accounts"

Copper Contributor


My recently deployed Sentinel instance for a small school (approx 120 users) keeps giving me this incident, based on the rule "Sign-ins from IPs that attempt sign-ins to disabled accounts". However, it shows the IP addresses where the logins are coming from but NOT the user accounts that were attempted to be logged into, nor the account that was successful. 

I'm confused - wouldn't Sentinel know which user accounts are involved (to be able to raise the alert) and just include that information in the Incident? And if it doesn't - how do I find out?


Grateful for any hints,


Paul Schnackenburg

2 Replies

@Paul Schnackenburg It looks the information is in the query although I am not sure why it isn't exposed.  There is a column being returned called "disabledAccountSet" that will list all the accounts being accessed.

Since this is stored as a dynamic array, I used the mv-expand command to get 1 row per account so it can be assigned to an Entity.

NOTE: I do not actually have this query returning any results in my environment but this should work.

1) Add the following code to the end of the query in the Analytic rule

| mv-expand disabledAccountSet

2) Setup an entity to use that column so that the results are mapped to an entity so you can see it.


That should do it!

best response confirmed by Paul Schnackenburg (Copper Contributor)
@Gary Bushey. Thanks, that did the trick, much appreciated.