Microsoft 365 - Impossible Travel Activity (d7eab125-5f94-43df-8710-795b80fa1189)
Detects when a Microsoft Cloud App Security reported a risky sign-in attempt due to a login associated with an impossible travel.
Cluster A | Galaxy A | Cluster B | Galaxy B | Level |
---|---|---|---|---|
Valid Accounts - T1078 (b17a1a56-e99c-403c-8948-561df0cffe81) | Attack Pattern | Microsoft 365 - Impossible Travel Activity (d7eab125-5f94-43df-8710-795b80fa1189) | Sigma-Rules | 1 |