IPaddress showing null value for User submitted their user ID step in passwordreset activity.

Ashok 1 Reputation point
2021-01-19T03:22:17.433+00:00

Hi,

I'm trying to perform password reset from a vpn IP to test whether I can detect password reset attempts from unknown IP's from azure sentinel. As checked from AuditLogs table I couldn't see IpAddress value instead it is showing null
57816-capture.png

why azure SSPR behaviour unable to detect the IP value.

Microsoft Security Microsoft Entra Microsoft Entra ID
Microsoft Security Microsoft Sentinel
{count} votes

1 answer

Sort by: Most helpful
  1. Rinki Bera 1 Reputation point
    2021-01-20T06:17:59.52+00:00

    Hi @Ashok , the audit logs in Azure AD will not show you the IP address. If you see the columns in audit logs, you will find that the IP Address property is not included. Ref -> https://learn.microsoft.com/en-us/azure/azure-monitor/reference/tables/auditlogs#columns and https://learn.microsoft.com/en-us/azure/active-directory/reports-monitoring/concept-audit-logs

    IP Address is included as a property in the columns of sign-in logs in Azure AD. Ref -> https://learn.microsoft.com/en-us/azure/active-directory/reports-monitoring/concept-sign-ins

    So to get IP Address of the user whenever there is a password reset activity, you can correlate between the audit logs and the sign in logs. Please ref the correlation id from the audit logs for the SSPR activity and filter it in the sign in logs, from where you could get the IP address of the user.
    Alternatively, you can match the Object Id in the Audit logs which should be the user id in the sign in logs along with the timestamp.

    Audit Log :

    58484-image.png

    Sign in Log:

    58388-image.png


Your answer

Answers can be marked as Accepted Answers by the question author, which helps users to know the answer solved the author's problem.