
Summary
The detection rule identifies changes made to the sign-in requirements for Zoom user accounts within an organization. It captures notable updates to security settings such as password complexity and two-factor authentication requirements. The rule is triggered by various types of updates, such as disabling password complexity parameters (e.g., requiring at least one letter, one number, and the use of both uppercase and lowercase characters) or the disabling of two-factor authentication (2FA). These actions can pose security risks and potentially lead to unauthorized access if not validated against legitimate business purposes. The rule includes several test cases that check whether the changes are anticipated (expected result true) or unexpected (expected result false) with the timestamps and details logged for further review. The aim is to safeguard the organization's security posture by ensuring that such changes are not made without valid authorization and intent, which is critical for preventing potential breaches.
Categories
- Cloud
- Application
- Identity Management
Data Sources
- User Account
- Application Log
Created: 2023-03-13