heroui logo

Okta New Behaviors Acessing Admin Console

Panther Rules

View Source
Summary
The "Okta New Behaviors Accessing Admin Console" rule is designed to detect unauthorized or suspicious access patterns to the Okta Admin Console, particularly when a user attempts to log in from a new device or IP address. The detection mechanism leverages logs from the Okta System Log to identify instances where access attempts deviate from normal behaviors, such as using a previously unrecognized device or IP geographic location. The rule is triggered if a user engages in such monitored activities, prompting a challenge in the form of additional authentication requirements. Importantly, the rule supports investigations into potential account takeovers or misused credentials by systematically evaluating sign-on policies that gauge the context of user authentications. The recommended response includes configuring Authentication Policies to require re-authentication based on anomalous detections and enabling notifications for end-users to highlight unusual account activity. By doing so, organizations can enhance their security posture against intrusions.
Categories
  • Identity Management
  • Cloud
  • Web
  • Endpoint
Data Sources
  • User Account
  • Application Log
  • Network Traffic
ATT&CK Techniques
  • T1078.004
Created: 2023-10-19