
Summary
The 'Okta ThreatInsight Security Threat Detected' rule identifies requests coming from potentially malicious IP addresses, leveraging the Okta threat management capabilities. This detection rule specifically analyzes logs captured by Okta's system to pinpoint suspicious behavior, particularly IP addresses associated with unusual login patterns, such as password spraying and a high number of login failures from unknown users. The severity of the threat is classified as high, indicating potential risk to the organization. The detection mechanism is triggered based on a defined threshold of one event within a specified deduplication period, ensuring that repetitive noise does not flood the alerting system. The rule also contains tests to validate its effectiveness by simulating expected log results from both denied and successful requests. The rule is tailored to protect user accounts against unauthorized access attempts originating from greylisted or known malicious IPs, thereby enhancing the organization's security posture.
Categories
- Identity Management
- Cloud
- Web
Data Sources
- User Account
- Network Traffic
Created: 2022-12-15