I am building a Chronicle detection rule for Azure AD sign-in logs. I want to detect events where a user logs in from an IP address that has not been observed on the same resource within the past 14 days. Could you please help on this...
Login to the community
Login with SSO
Enter your E-mail address. We'll send you an e-mail with instructions to reset your password.