Hi.
We get a lot of these alerts as users from oversees authenticate via Azure then they log into a web app hosted in the USA.
Is there a place in IDR settings that I can add the external/internet IP address of my hosted apps so IDR can ignore these events and not trigger alerts?
For the Multiple Country Authentication, I do not believe so. It is part of the Legacy Detection Rules so until it moves over into the regular detection rule library, I dont think you will be able to without the use of something like InsightConnect
We have an option via support request to whitelist entire geoip organizations, so that if you see things like Netskope or Zscaler for instance you can ignore those entirely from Multi country auth events
Hey David - did you end up sending all Zscaler IPs to whitelist? It’s a huge list… we’re running into the same issue and need to add exceptions when IP location contains Zscaler. We cannot since exceptions are not supported in legacy rules.
This requires a support ticket for us to whitelist on your behalf, we simply ignore all geo_ip organizations which are Zscaler. It doesn’t need all of the IPs.
We’re looking to ignore multicountry alerts if the non-US country IP belongs to Zscaler. Therefore track the activity but do not create an alert. We asked Zscaler to create PAC rules to keep all of our traffic in the US when the asset is physically in the US but given our proximity to Canada we seem to still be hitting Zscaler’s Canadian nodes - not for all traffic but regularly. Which then raises alarms/creates investigations in R7. If we could exclude Zscaler Canada IPs from creating investigations, that would help.
For sure - it’s only the Canada datacenters that throw the alerts. A small list of IPs and one FQDN. As long as we can still see the traffic in the logs, excluding these IPs from alerts would be perfect.