
Summary
The 'Cisco Duo Admin Login Unusual OS' analytic is designed to detect admin login attempts to the Cisco Duo application from operating systems that are not commonly used within a specific organization. The detection rule filters out logins from expected operating systems like Mac OS X, focusing instead on identifying logins from less familiar OS, which could indicate unauthorized access or compromised credentials. The rule utilizes activity logs from Cisco Duo, analyzing key attributes of the login attempts, including the browser used, version details, source IP, location, and OS specifics. The rule is instrumental in a Security Operations Center (SOC) context, as anomalous login attempts can precede more severe threats, such as privilege escalation or policy changes. Thus, early detection allows for prompt investigation and mitigation, enhancing overall organizational security.
Categories
- Identity Management
- Cloud
- Application
Data Sources
- Drive
- Application Log
- User Account
ATT&CK Techniques
- T1556
Created: 2025-07-10