Hi!
We regulary have this kind of logins in our environment (Large, mostly Students). Both, successful and failed logins:

Details from Defender for Cloud:
"ApplicationId": "04b07795-8ddb-461a-bbee-02f9e1bf7b46",
"ApplicationName": "Microsoft Azure CLI",
"Call": "OAuth2:Token",
"Client": "[x-client-sku, MSAL.Python];[x-client-ver, 1.20.0];[x-client-cpu, x86];[x-client-os, win32]",
"CorrelationId": "XXX",
"DeviceInfo": ";;Python Requests 2.26;",
…
}
Are there any legitimate use cases for a third party (not the user himself) to produce such logs?
I'm asking, because the source IP addresses are registered to Microsoft most of the time:
{
"ip": "20.170.20.146",
"city": "Frankfurt am Main",
"region": "Hesse",
"country": "DE",
"loc": "50.1025,8.6299",
"org": "AS8075 Microsoft Corporation",
"postal": "60326",
"timezone": "Europe/Berlin",
"readme": "https://ipinfo.io/missingauth"
}
Thanks for your input! Christian