{ "id": "CASE-2026-1005", "memory_type": "case", "scenario": "o365_suspicious_login", "title": "Traveling executive triggered impossible travel but activity was legitimate", "abstract": "Executive account triggered impossible travel due to corporate VPN exit node while the user was on an approved overseas trip.", "verdict": "false_positive", "severity": "medium", "entities": { "users": [ "grace@corp.example" ], "hosts": [ "VIP-LAPTOP-01" ], "mailboxes": [ "grace@corp.example" ] }, "observables": { "ips": [ "192.0.2.90", "203.0.113.77" ], "domains": [], "urls": [], "hashes": [] }, "evidence": [ "Approved travel request existed.", "One login originated from corporate VPN exit node.", "Device and user agent were consistent with known user profile." ], "patterns": [ "verdict:false_positive", "scenario:o365_suspicious_login", "alert_type:azuread_impossible_travel" ], "related_refs": { "playbooks": [ "PB-O365-LOGIN-001" ], "kb": [ "KB-O365-IMPOSSIBLE-TRAVEL" ], "cases": [] }, "source_path": "/home/tom/soc_memory_poc/evaluation/datasets/mock_cases/o365_suspicious_login/CASE-2026-1005.json", "tags": [ "o365", "login", "false-positive", "travel" ] }