
Summary
The detection rule 'Okta Two or More Rejected Okta Pushes' identifies instances where a user has rejected more than two Okta Push notifications within a ten-minute period. This could be an indicator of suspicious activity or attempts to bypass multi-factor authentication (MFA) protections. This rule utilizes specific criteria based on Okta logs, filtering for events where a user has actively rejected MFA requests. It applies statistical analysis to codify events by user and time window, triggering alerts on repeated rejections. The rule has been deprecated and replaced by the 'Okta Multiple Failed MFA Requests For User' rule, which can be further adjusted based on organizational needs. False positives may occur, therefore it's essential to tune the rule for accuracy, especially in unique environments. Appropriate documentation and reference to Okta's API provide additional context to the events triggered by this rule, enhancing understanding of MFA-related event types.
Categories
- Identity Management
- Cloud
- Web
Data Sources
- User Account
- Application Log
ATT&CK Techniques
- T1110
Created: 2024-11-14