Hi Giovani,
The rule below worked for the situations you described:
<rule id="100034" level="14" frequency="2" timeframe="600">
<if_matched_sid>91545</if_matched_sid>
<same_field>office365.UserId</same_field>
<different_field>office365.ClientIP</different_field>
<group>authentication, multiple_auth, multiple_auth_office365</group>
<description>Multiple Office365 Logins from different IPs</description>
</rule>
<rule id="100035" level="14" frequency="2" timeframe="600">
<if_matched_sid>91545</if_matched_sid>
<same_field>office365.UserId</same_field>
<group>authentication, multiple_auth, multiple_auth_office365</group>
<description>Multiple Office365 Logins</description>
</rule>
Note: The field should be office365.UserId and not data.office365.UserId.
**Phase 3: Completed filtering (rules).
id: '100035'
level: '14'
description: 'Multiple Office365 Logins'
groups: '['local', 'syslog', 'sshd', 'authentication', ' multiple_auth', ' multiple_auth_office365']'
firedtimes: '1'
frequency: '2'
mail: 'True'
**Alert to be generated.
**Phase 3: Completed filtering (rules).
id: '100034'
level: '14'
description: 'Multiple Office365 Logins from different IPs'
groups: '['local', 'syslog', 'sshd', 'authentication', ' multiple_auth', ' multiple_auth_office365']'
firedtimes: '3'
frequency: '2'
mail: 'True'
**Alert to be generated.
Regards,