
Summary
The "Okta New Admin Console Behaviours" detection rule focuses on identifying unusual activities within the Okta Admin Console that may indicate potential security risks. The rule triggers when Okta detects new activity characterized by the evaluation of sign-on policies within the console. Specifically, it monitors for events labeled as 'policy.evaluate_sign_on' targeting the Okta Admin Console and checks for certain positive behaviors in the debug context. If any debug data indicates the presence of positivity flags during these events, the rule activates. False positives are notably present when an admin begins using the Admin Console, and Okta's heuristic logic mistakenly flags their actions as irregular. This rule is categorized under high severity, reflecting the importance of monitoring admin-level access to prevent unauthorized entry and potential compromises of sensitive configurations.
Categories
- Cloud
- Identity Management
Data Sources
- User Account
- Application Log
- Network Traffic
Created: 2023-09-07