
Summary
The 'Okta Suspicious Activity Reported' analytic rule is designed to identify instances where users report login attempts as suspicious through emails from Okta. This rule utilizes Okta Identity Management logs, specifically capturing events flagged with the `user.account.report_suspicious_activity_by_enduser` event type. The detection's importance lies in its ability to highlight potential unauthorized access attempts, thus allowing organizations to act promptly to safeguard sensitive information against breaches, data theft, privilege escalation, and further compromises. The rule aggregates data on reported suspicious activities, including user details, their geographical context, and the client user agent. Implementing this detection involves configuring Okta logs ingestion via the Splunk Add-on, along with ensuring users are trained to report unusual activities. Reference documentation from Okta on suspicious activity reporting is also provided for further guidance.
Categories
- Identity Management
- Cloud
- Application
Data Sources
- Pod
- User Account
- Application Log
- Cloud Service
ATT&CK Techniques
- T1078
- T1078.001
Created: 2025-01-21