14.3 Identifying Token Replay in Sign-In Logs
Identifying Token Replay in Sign-In Logs
The hardest part of token replay investigation is distinguishing replay from legitimate multi-device usage. A user who signs into Outlook on their laptop AND on their phone generates sign-ins from two different IPs — which looks identical to token replay. This subsection teaches the specific log fields that differentiate them.
Required role: Microsoft Sentinel Reader.
The key differentiators
Field 1: AuthenticationRequirement. Legitimate sign-ins show multiFactorAuthentication (MFA was completed). Token replay sign-ins show singleFactorAuthentication — because the token already passed MFA, the replaying session does not trigger a new MFA challenge.
Field 2: IsInteractive. Legitimate user sign-ins are typically interactive (the user actively signed in). Token replay via API/script shows as non-interactive (the application silently presented the token).
Field 3: TokenIssuerType. Legitimate sign-ins from managed devices show AzureAD. Sign-ins using a stolen session cookie imported into a non-managed browser may show different issuer characteristics.
Field 4: DeviceDetail. Legitimate sign-ins include device information (OS, browser, device ID). Token replay from attacker infrastructure often has: a different OS/browser than the user’s known devices, or missing device detail entirely (when using API-based access).
The token replay identification query
| |
Pattern analysis: Legitimate multi-device usage shows: MFA completed on each device, consistent device details (known devices), and corporate or home IPs. Token replay shows: single-factor auth from a non-corporate IP, different or missing device details compared to the user’s known devices, and access to resources the user does not normally access from that IP.
The definitive replay test: timeline correlation
| |
If the IP appeared during the original compromise window OR is used by other compromised accounts: confirmed attacker infrastructure. If the IP is entirely new and not associated with any previous compromise: possible re-compromise through a different vector.
Subsection artifact: The token replay identification query and the timeline correlation query. These form the identification section of your token investigation playbook.
Knowledge check
Common false positives and how to rule them out
Not every multi-IP sign-in is token replay. Before escalating, rule out these legitimate scenarios:
VPN disconnect/reconnect. The user’s VPN drops momentarily, and the next request goes through their ISP’s direct IP instead. The sign-in logs show two IPs within minutes. Differentiator: both IPs are from the same geographic area, and the user agent is consistent. Check: is one of the IPs a known corporate VPN exit? If yes: probably VPN failover.
Mobile network handoff. A mobile user moves from WiFi to cellular (or between cellular towers). Their IP changes mid-session. Differentiator: both IPs are in the same country, the device detail shows a mobile OS, and the time gap is seconds (not minutes). Token replay typically shows a different OS or browser.
Legitimate multi-device usage. The user signs into Outlook on their laptop AND on their phone within the same hour. Two different IPs (one corporate WiFi, one cellular). Differentiator: both devices are known to the user (check DeviceDetail.deviceId against the user’s registered devices), and both show MFA completed (not single-factor).
Cloud proxy or CASB. If the organisation routes traffic through a cloud proxy (Zscaler, Netskope), the user’s sign-in may show the proxy’s IP instead of the corporate IP. The proxy IP changes as the user is routed to different proxy nodes. Differentiator: the IPs belong to the proxy provider’s ASN. Add proxy IPs to the CorporateExternalIPs watchlist.
| |
If the IP has been used by many legitimate users over months: it is likely a corporate proxy or VPN exit that is missing from your watchlist. If the IP has been used by only the compromised user (or a small number of known-compromised users): it is attacker infrastructure.
Try it yourself
Query your own SigninLogs for users with 2+ IPs within a 10-minute window in the last 7 days. How many results do you get? For each result: determine whether it is legitimate multi-device usage, VPN failover, or potentially suspicious. This exercise calibrates your understanding of what "normal" multi-IP behaviour looks like in your environment — essential context for distinguishing token replay from legitimate activity.
What you should observe
Most results will be legitimate: VPN failover, mobile handoff, or multi-device usage. The volume of results tells you how noisy the token replay detection rule (Rule 1 in subsection 14.9) will be in your environment — and helps you set appropriate thresholds and exclusions.
Check your understanding
1. A sign-in shows AuthenticationRequirement = "singleFactorAuthentication" from a non-corporate IP. The tenant requires MFA for all users. What does this indicate?