
Summary
The 'Impossible Travel' detection rule is designed to identify suspicious user activities that occur from two or more geographically distant locations within a time frame that exceeds normal travel capabilities. This phenomenon often indicates malicious activity, such as account compromise, where an attacker may use stolen credentials to access user accounts from various locations within a short span of time. The rule leverages telemetry data regarding user sign-ins to detect events categorized as 'impossible travel' and applies risk event type filters specific to Azure cloud services. The rule is crucial for organizations looking to enhance their identity protection strategies by monitoring unusual sign-in patterns that could signify potential threats. With a high detection level, it aims to prompt investigation for atypical user behavior that deviates from established geographical logins, requiring timely response actions to secure user accounts.
Categories
- Cloud
- Identity Management
- Azure
Data Sources
- User Account
Created: 2023-09-03