
Summary
The "Okta New Behaviors Accessing Admin Console" rule is designed to detect unauthorized or suspicious access patterns to the Okta Admin Console, particularly when a user attempts to log in from a new device or IP address. The detection mechanism leverages logs from the Okta System Log to identify instances where access attempts deviate from normal behaviors, such as using a previously unrecognized device or IP geographic location. The rule is triggered if a user engages in such monitored activities, prompting a challenge in the form of additional authentication requirements. Importantly, the rule supports investigations into potential account takeovers or misused credentials by systematically evaluating sign-on policies that gauge the context of user authentications. The recommended response includes configuring Authentication Policies to require re-authentication based on anomalous detections and enabling notifications for end-users to highlight unusual account activity. By doing so, organizations can enhance their security posture against intrusions.
Categories
- Identity Management
- Cloud
- Web
- Endpoint
Data Sources
- User Account
- Application Log
- Network Traffic
ATT&CK Techniques
- T1078.004
Created: 2023-10-19