Initial Access (TA0001)(external, opens in a new tab or window)
text code block:event.dataset:o365.audit and event.provider:AzureActiveDirectory and event.action:UserLoggedIn and event.outcome:success and o365.audit.Target.Type:(0 or 10 or 2 or 3 or 5 or 6) and o365.audit.UserId:(* and not "Not Available") and source.geo.region_iso_code:* and not o365.audit.ApplicationId:( 29d9ed98-a469-4536-ade2-f981bc1d605e or 38aa3b87-a06d-4817-b275-7a316988d93b or a809996b-059e-42e2-9866-db24b99a9782 ) and not o365.audit.ExtendedProperties.RequestType:( "Cmsi:Cmsi" or "Consent:Set" or "Login:reprocess" or "Login:resume" or "MessagePrompt:MessagePrompt" or "SAS:EndAuth" )
Install detection rules in Elastic Security
Detect M365 Identity Login from Impossible Travel Location in the Elastic Security detection engine by installing this rule into your Elastic Stack.
To setup this rule, check out the installation guide for Prebuilt Security Detection Rules(external, opens in a new tab or window).