Detections/SigninLogs/AnomalousUserAppSigninLocationIncrease-detection.yaml (5 lines of code) (raw):
id: 0269c54a-8ec8-4f92-8948-da4c9fe6521f
name: Anomalous sign-in location by user account and authenticating application
description: |
'As part of content migration, this file is moved to a new location. You can find it here https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Microsoft%20Entra%20ID/Analytic%20Rules/AnomalousUserAppSigninLocationIncrease-detection.yaml'
version: 1.0.2