heroui logo

Auth0 Attack Protection Monitoring Disabled

Panther Rules

View Source
Summary
The Auth0 Attack Protection Monitoring Disabled rule is designed to detect when critical security settings related to attack protection monitoring are altered. The monitoring specifically assesses changes in configurations such as Suspicious IP Throttling, Breached Password Detection, and Brute-force protection settings. In the event of changes to these settings, a set of specific log entries is parsed for expected outcomes. If a setting is disabled unexpectedly, this is flagged; if a user attempts to disable protection measures without proper authorization or business justification, this will increase the risk to the security posture of the organization. The rule includes various tests to validate the expected event outcomes and can trigger alerts based on user actions that could suggest malicious activity or mismanagement of security settings. Furthermore, the detection is supported by referencing the MITRE ATT&CK framework.
Categories
  • Identity Management
  • Cloud
  • Web
Data Sources
  • User Account
  • Logon Session
  • Application Log
ATT&CK Techniques
  • T1562
Created: 2025-10-17