Azure AAD create a alert to email when conditional access and Audit logs catch a oddity
Step 2: Set Up Alerts to Notify Users of Blocked Sign-Ins
Azure AD logs Conditional Access sign-in events, which you can monitor and send alerts via Azure Monitor and Log Analytics.
A. Enable Diagnostic Settings for Azure AD Sign-In Logs
Go to Azure Active Directory > Monitoring > Diagnostic settings.
Click + Add diagnostic setting.
Select SignInLogs and send logs to a Log Analytics workspace or Azure Monitor.
B. Create an Alert Rule in Azure Monitor
Navigate to Azure Monitor:
Go to the Azure portal > Monitor > Alerts.
Click + Create > Alert rule.
Set Scope:
Select the Log Analytics workspace where you’re sending Azure AD Sign-In Logs.
Add a Condition:
Click Add condition.
Select Custom log search.
Use the following KQL Query to detect blocked sign-ins outside the US:
Adjust filters to your needs, including user names.
Configure Actions to Send Email:
Under Actions, create an action group.
Add Email/SMS/Push/Voice action type.
Provide the user’s email address to notify them.
Set Alert Rule Name and Severity:
Name the alert rule and set the severity (e.g., High).
Save the alert.
Last updated