Managed Sentinel – Alert 002
Alert ID | MS-A002 |
Alert Name | Anomalous Azure Active Directory apps based on authentication location |
Description | This query over Azure AD sign-in activity highlights Azure AD apps with an unusually high ratio of distinct geolocations versus total number of authentications. Source: Github - Microsoft |
Severity Level | Low |
Threat Indicator | Unauthorized Access |
MITRE ATT&CK Tactics | Initial Access |
Log sources | Azure Signin Logs |
Recommendations | Review the LocationString, Identity and AppDisplayName fields and validate if these are within the normal parameters in your organization. Look for users accessing different applications within a short timeframe from various locations. If any abnormal behavior is identified, immediately disable the affected user accounts in Azure AD. |