
Summary
The rule titled 'Multiple Host logons' is designed to detect users who have authenticated from multiple hosts within a specified timeframe. Leveraging Splunk's capabilities, this rule collects endpoint authentication and login data, evaluating both successful and login attempts while filtering out any failures. The essence of this detection is to identify users that demonstrate a geographical or operational pattern inconsistency, indicative of potential compromise or malicious activity. Specifically, the logic extracts and aggregates login attempts while counting the distinct hosts per user within a daily timeframe (86400 seconds). A user is flagged if their login attempts are spread across more than one unique host. This rule correlates strongly with the tactic of 'valid accounts' within the MITRE ATT&CK framework (T1078), highlighting the risk of adversaries leveraging legitimate credentials to operate across environments covertly. By monitoring such behaviors, organizations can better detect unauthorized access and respond to potential threats.
Categories
- Endpoint
- Linux
Data Sources
- User Account
- Network Traffic
ATT&CK Techniques
- T1078
Created: 2024-02-09