Unless you know for sure that it's originating from the user's laptop and is expected activity, I would treat it as malicious and have the user reset their password.
Suspicious Sign In va Microsoft Graph
I have noticed suspicious sign in from a user account. The user is in California but the sign in appears from New Jersey from a Micorosft Graph app that is running on the user laptop. Please note the laptop is joined with AD. Does anyone know if this is expected or is it indeed a security risk. More information is below. Thanks
Location
Mount Laurel, New Jersey, US
IP address
2603:3024:107f:a100:ec4a:12d7:df8c:4ab0
Autonomous system number
7922
**
Device ID**
dd6b2a01-9c07-4068-8bff-77e327acf27e
Browser
Edge 114.0.1823
Operating System
Windows 10
Compliant
No
Managed
No
Join Type
Azure AD joined
Request ID XXXXX Correlation ID XXX
Authentication requirement Multifactor authentication Status Success Continuous access evaluation No Additional Details MFA requirement satisfied by claim in the token Troubleshoot Event Follow these steps:
- Launch the Sign-in Diagnostic.
- Review the diagnosis and act on suggested fixes. User XXXXX Username XXXXX User ID XXXXX Sign-in identifier User type Member Cross tenant access type None
Application My Signins Application ID XXXXXXX Resource Microsoft Graph Resource ID XXXXX Resource tenant ID XXXXX Home tenant ID XXXXX Home tenant name Client app Browser Client credential type None Service principal ID Service principal name Resource service principal ID XXXXX Unique token identifier XXXXX Token issuer type Azure AD Token issuer name Incoming token type Primary refresh token Authentication Protocol None Latency 108ms Flagged for review No User agent Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.0.0 Safari/537.36 Edg/114.0.1823.43