Query Details
# Top 10 users with the most ips used to succesfully sign in ## Query Information #### Description Collect the top 10 user with the most IP used to succefully sign in to a tenant. This query displays the 10 users that have used the most IP addresses so sign in. False positives can be a VPN that changes IP addresses, which results in a high number of IPs used to sign in. #### Risk The risk is that an actor uses an rare IP address to sign into your tenant. ## Defender For Endpoint ``` AADSignInEventsBeta | summarize IPsUsed = make_set(IPAddress), locations = make_set(Country) by AccountObjectId | extend CountIP = array_length(IPsUsed) | project-reorder CountIP | top 10 by CountIP ``` ## Sentinel ``` SigninLogs | summarize IPsUsed = make_set(IPAddress), locations = make_set(LocationDetails) by Identity | extend CountIP = array_length(IPsUsed) | project-reorder CountIP | top 10 by CountIP ```
The query collects information about the top 10 users who have used the most IP addresses to successfully sign in to a tenant. It helps identify any potential risks where an actor may be using rare IP addresses to gain access to the tenant. The query is slightly different for Defender for Endpoint and Sentinel, but the overall purpose remains the same.

Bert-Jan Pals
Released: June 7, 2023
Tables
Keywords
Operators