Hi,
i'm using Wazuh 4.3.10 with Office's module enabled, and i'm able to see all the events regarding user accounts, such as account's modification, creation etc, as well as events regarding email revision, so Quarantined messages etc.
However, I notice that parameters are absent that would be very useful to me, namely those related to risky sing-ins.
Is the 365 module able to extrapolate risky sign-ins from Azure?
That way I could identify, on the fly, if a user is logging in (or attempting to log in) from a geolocated IP in an unusual location.
Currently, my Office's365 module has the following subscriptions:
<subscription>Audit.AzureActiveDirectory</subscription>
<subscription>Audit.General</subscription>
<subscription>Audit.Exchange</subscription>
<subscription>DLP.All</subscription>
And all of them seems to work as they should.
unfortunately, I repeat, I do not seem to receive information regarding access , or access attempts, considered risky. Am I doing something wrong? is it possible?
Thanks,
Joh