heroui logo

Okta Alerts Following Unusual Proxy Authentication

Elastic Detection Rules

View Source
Summary
The rule "Okta Alerts Following Unusual Proxy Authentication" aims to detect potentially malicious activity by correlating user authentication events through a proxy with subsequent security alerts within the Okta environment. Attackers often leverage proxy services, such as VPNs and Tor, to obscure their identity when exploiting stolen credentials. This rule capitalizes on that behavior by monitoring for the initial authentications made via a proxy, followed by alerts that could indicate further security threats or account compromises related to the same user. It employs an EQL sequence to identify such events that occur within one hour of the proxy authentication. The rule also outlines investigation steps for security analysts, including user activity review and threat intelligence correlation, as well as response strategies should account compromise be suspected.
Categories
  • Identity Management
  • Cloud
Data Sources
  • User Account
  • Logon Session
  • Application Log
  • Cloud Service
  • Service
ATT&CK Techniques
  • T1078
  • T1078.004
Created: 2026-02-20