Back to Resources
Industry InsightsArticle

Impossible Travel and Risky Sign-Ins: Automated Triage and Containment

Impossible travel alerts flood SOC queues daily. Most are false positives from VPNs, mobile networks, and legitimate travel. Learn how to automate triage to filter the noise and contain real threats in seconds.

18th March, 2026
14 min read
BitLyft Security Team

The Impossible Travel Problem

Your user signed in from New York at 9:00 AM, then from London at 9:15 AM. Physically impossible. Must be a compromised account, right?

Not so fast. In reality, 90%+ of impossible travel alerts are false positives. VPNs, corporate proxies, mobile carrier IP changes, cloud applications, and legitimate travel with cached sessions all trigger these alerts. Without automated triage, your SOC drowns in noise while real threats slip through.

Why Impossible Travel Creates So Many False Positives

Understanding why false positives happen is the first step to automating them away. Here are the most common causes:

VPN and Proxy Traffic

User connects to corporate VPN (shows as HQ location), disconnects, then uses local internet (shows as home location). Instant "impossible travel."

Mobile Carrier IP Changes

Mobile carriers route traffic through geographically distributed gateways. User's phone can appear to jump cities without moving.

Cloud App Proxies

Services like Zscaler, Cloudflare Access, and cloud-based security tools proxy traffic through global data centers, masking true location.

Cached Sessions + Travel

User's laptop has cached credentials from home (New York). Lands in London, opens laptop, and token refresh shows "instant" location change.

The Key: Correlating Multiple Risk Signals

Impossible travel alone is a weak signal. The automation magic happens when you correlate it with other risk indicators to separate real threats from noise.

Risk Signal Correlation Matrix

Impossible Travel +Risk LevelRecommended Action
Known VPN/proxy IPLowAuto-dismiss, log for audit
Familiar device + successful MFALowAuto-dismiss, log for audit
New device, successful MFAMediumMonitor session, flag for review
New device + MFA fatigue patternHighRevoke session, require re-auth
Failed MFA + password spray source IPCriticalBlock user, force password reset
Tor exit node or anonymizerCriticalBlock session, investigate immediately
Sensitive data access post sign-inCriticalRevoke session, quarantine account

Automated Triage Workflow

Here's a practical workflow that filters 90%+ of false positives automatically while escalating real threats for immediate containment:

1

Ingest Alert

Receive impossible travel or risky sign-in alert from Microsoft Entra ID Protection, Okta, or your IdP. Extract: user, source IPs, timestamps, device info, sign-in result.

{
"user": "jane.doe@company.com",
"alert_type": "impossible_travel",
"ip_1": "203.0.113.50", "location_1": "New York",
"ip_2": "198.51.100.22", "location_2": "London",
"time_delta_minutes": 15
}
2

Check Known Good IPs

Query your allowlist of corporate VPNs, proxies, and cloud security egress IPs. If either IP matches, auto-dismiss with "known infrastructure" tag.

Corporate VPN rangesZscaler egress IPsCloud proxy IPsBranch office IPs
3

Enrich with Threat Intelligence

Check IPs against threat feeds. Flag if either IP is a known Tor exit node, VPN anonymizer, bulletproof hosting, or on a recent password spray source list.

Tor exit node = Critical
Commercial VPN = Medium
Password spray source = Critical
Clean residential IP = Low
4

Check Device Familiarity

Query sign-in history. Is this a device the user has used before? Familiar device + new location is much lower risk than new device + new location.

Familiar device (seen 5+ times)-2 risk points
New device (first seen)+3 risk points
Unmanaged device + new location+5 risk points
5

Verify MFA Status

Check how authentication succeeded. Strong MFA (FIDO2, authenticator app) is lower risk. MFA fatigue pattern (multiple failed pushes then success) is high risk.

Low Risk MFA
  • FIDO2 security key
  • Authenticator app (single prompt)
  • Windows Hello
High Risk MFA
  • SMS OTP (SIM swap risk)
  • 3+ push attempts before success
  • MFA bypassed or not required
6

Calculate Risk Score and Act

Sum risk points from all checks. Route to automated action based on threshold:

Score 0-3: Auto-DismissLog for audit, no action
Score 4-6: MonitorFlag session, queue for review
Score 7-9: Soft ContainRequire re-auth, notify user
Score 10+: Hard ContainRevoke sessions, block sign-in

Containment Actions by Severity

When automated triage identifies a real threat, containment must be immediate. Here are the actions to automate at each severity level:

Medium Risk: Soft Containment

Automated Actions

  • Require step-up MFA for current session
  • Send Slack/Teams notification to user
  • Enable enhanced session logging
  • Queue for analyst review within 4 hours

User Notification

"We detected a sign-in from an unusual location. If this was you, no action needed. If not, please contact security@company.com immediately."

High Risk: Active Containment

Automated Actions

  • Revoke current session tokens
  • Force re-authentication with MFA
  • Temporarily restrict to known locations
  • Alert SOC for immediate review

Analyst Tasks

  • Review sign-in logs for past 24 hours
  • Check for mailbox rules or OAuth grants
  • Verify with user via out-of-band channel

Critical Risk: Full Lockdown

Automated Actions (Immediate)

  • Revoke ALL active sessions
  • Disable sign-in (block account)
  • Reset refresh tokens
  • Revoke OAuth app consents (last 24h)

Investigation Actions

  • Collect UAL logs for forensics
  • Check for data exfiltration
  • Review mailbox forwarding rules
  • Contact user via phone (not email)

Beyond Impossible Travel: Other Risky Sign-In Types

Impossible travel is just one signal. Here are other risky sign-in patterns to automate triage for:

Sign-In TypeWhat It IndicatesAuto-Triage Check
Unfamiliar locationFirst sign-in from this geoCheck if user travel is scheduled (calendar)
Anonymous IPTor, VPN anonymizer detectedIs user in a role that requires anonymity?
Leaked credentialsPassword found in breach dumpForce password reset, revoke sessions
Password sprayMany accounts, few passwordsBlock source IP, notify all affected users
Malware-linked IPIP associated with C2 trafficBlock immediately, isolate device
Suspicious inbox activityRules created post-loginCorrelate with risky sign-in, escalate if match

Implementation Checklist

Build your Known Good IP list

Document all corporate VPNs, proxies, cloud security egress, branch offices. Update quarterly.

Integrate threat intelligence feeds

Connect Tor exit node lists, commercial VPN IPs, password spray source feeds.

Define risk scoring thresholds

Start conservative (higher thresholds for containment), tune based on false positive rate.

Create VIP exception list

Executives and frequent travelers may need softer containment with human approval.

Test containment actions in audit mode

Run for 2 weeks logging what would happen without taking action. Validate accuracy.

Build user notification templates

Clear, non-alarming messages that explain what happened and what the user should do.

Automate Impossible Travel Triage with BitLyft AIR

BitLyft AIR comes with pre-built impossible travel and risky sign-in playbooks that integrate with Microsoft Entra ID, Okta, and other identity providers. Filter 90%+ of false positives automatically and contain real threats in seconds.

Frequently Asked Questions

What percentage of impossible travel alerts are typically false positives?

In most organizations, 90-95% of impossible travel alerts are false positives caused by VPNs, proxies, mobile carriers, and cloud services. This is why automated triage is essential—manual review at this volume is impossible.

Should we auto-block on impossible travel, or always require human review?

Never auto-block on impossible travel alone. It must be correlated with other risk signals (Tor exit node, MFA fatigue, new device) to justify automatic containment. Soft containment (require re-auth) is safer than hard containment (block account) for medium-risk scenarios.

How do we handle VIPs who travel frequently?

Create a VIP list with softer containment policies. For these users, impossible travel triggers monitoring and notification rather than session revocation. Require human approval before any disruptive action. Consider integrating with travel booking systems to pre-approve expected locations.

What's the difference between Microsoft Entra ID Protection and a third-party ITDR solution?

Entra ID Protection provides basic risk detection and Conditional Access integration, but limited customization and cross-platform visibility. Third-party ITDR solutions like BitLyft AIR offer deeper correlation, custom playbooks, multi-IdP support, and more granular automated response options.

Related Articles