heroui logo

Okta New Device Enrolled on Account

Splunk Security Content

View Source
Summary
This detection rule identifies instances where a new device is enrolled on an Okta account, utilizing OktaIm2 logs that are processed through the Splunk Add-on for Okta Identity Cloud. Such events are crucial to monitor because they can signify legitimate administrative activity or a potential security breach where an attacker adds a device to maintain unauthorized access to an account. This behavior could lead to serious consequences like account takeover and ongoing unauthorized control over the Okta account. The rule incorporates a specific search query to pinpoint newly created device enrollments and emphasizes the importance of validating these events to distinguish between legitimate user actions and possible malicious activity.
Categories
  • Identity Management
  • Cloud
  • Application
Data Sources
  • Pod
  • User Account
  • Cloud Service
  • Logon Session
ATT&CK Techniques
  • T1098
  • T1098.005
Created: 2025-01-21