
Summary
The 'Atypical Travel' detection rule focuses on identifying potentially unauthorized access to user accounts by analyzing geolocation data of sign-in events. Specifically, it flags instances where two sign-ins originate from geographically distant locations, which may indicate suspicious behavior. This detection is particularly significant when at least one of the locations diverges from the user’s typical historical sign-in locations. By leveraging the riskEventType 'unlikelyTravel', the detection aims to expose potential credential theft or account compromise attempts. The rule is applicable to environments using Azure's risk detection capabilities, making it relevant for organizations that employ Azure AD for identity management. The implementation requires monitoring of user sign-ins for unusual patterns indicative of risky behaviors, prompting further investigation into flagged sessions in conjunction with additional user sign-in data.
Categories
- Cloud
- Identity Management
- Application
Data Sources
- User Account
- Network Traffic
Created: 2023-09-03