event.dataset:o365.audit and
event.provider:AzureActiveDirectory and
event.action:UserLoggedIn and
event.outcome:success and
o365.audit.Target.Type:(0 or 10 or 2 or 3 or 5 or 6) and
o365.audit.UserId:(* and not "Not Available") and
source.geo.region_iso_code:* and
o365.audit.Target.ID:(
00000006-0000-0ff1-ce00-000000000000 or
4765445b-32c6-49b0-83e6-1d93765276ca
) and not o365.audit.ApplicationId:(
29d9ed98-a469-4536-ade2-f981bc1d605e or
38aa3b87-a06d-4817-b275-7a316988d93b or
a809996b-059e-42e2-9866-db24b99a9782
) and not o365.audit.ExtendedProperties.RequestType:(
"Cmsi:Cmsi" or
"Consent:Set" or
"Login:reprocess" or
"Login:resume" or
"MessagePrompt:MessagePrompt" or
"SAS:EndAuth"
)
Install detection rules in Elastic Security
Detect M365 Portal Login (Atypical Travel) in the Elastic Security detection engine by installing this rule into your Elastic Stack.
To setup this rule, check out the installation guide for Prebuilt Security Detection Rules(opens in a new tab or window).