event.dataset:o365.audit and
event.provider:AzureActiveDirectory and
event.action:UserLoggedIn and
event.outcome:success and
o365.audit.Target.Type:(0 or 10 or 2 or 3 or 5 or 6) and
o365.audit.UserId:(* and not "Not Available") and
source.geo.region_iso_code:* and
not o365.audit.ApplicationId:(
29d9ed98-a469-4536-ade2-f981bc1d605e or
38aa3b87-a06d-4817-b275-7a316988d93b or
a809996b-059e-42e2-9866-db24b99a9782
) and not o365.audit.ExtendedProperties.RequestType:(
"Cmsi:Cmsi" or
"Consent:Set" or
"Login:reprocess" or
"Login:resume" or
"MessagePrompt:MessagePrompt" or
"SAS:EndAuth"
)
Install detection rules in Elastic Security
Detect M365 Identity Login from Impossible Travel Location in the Elastic Security detection engine by installing this rule into your Elastic Stack.
To setup this rule, check out the installation guide for Prebuilt Security Detection Rules(opens in a new tab or window).