
Summary
This rule detects unusual privileged operations being performed by a user in Okta from a geographical location that is not typical for the user's activity. The machine learning job 'pad_okta_rare_region_name_by_user' identifies these anomalies by analyzing user behavior patterns over time. High anomaly scores (at or above 75) indicate potential security issues such as compromised accounts or unauthorized access attempts exploiting stolen credentials. The setup requires specific integrations, including the Privileged Access Detection integration and Okta logs, to ensure effective anomaly detection in user activity across both Windows and Linux environments, alongside Okta events. A thorough investigation process is detailed, including steps for validation with users, record checking, analyzing recent changes to the user's account, and remediation strategies in case unauthorized access is confirmed. This highlights the need for ongoing vigilance and frameworks for incident response, especially when encountering alerts from users operating from atypical locations.
Categories
- Identity Management
- Cloud
- Web
- Application
Data Sources
- User Account
- Cloud Service
- Application Log
ATT&CK Techniques
- T1078
Created: 2025-02-18