heroui logo

Unusual Host Name for Okta Privileged Operations Detected

Elastic Detection Rules

View Source
Summary
This rule, named 'Unusual Host Name for Okta Privileged Operations Detected', utilizes machine learning to detect potential unauthorized access attempts within Okta by monitoring for unusual host names associated with privileged operations performed by users. The rule is designed to flag incidents where a user performs actions indicative of privilege escalation from an atypical device, which may suggest compromise of credentials or an insider threat. The detection mechanism involves analyzing logs and events captured from Okta and correlating them against user behavior patterns to identify anomalies. If flagged activities are detected, security personnel can initiate an investigation to assess the legitimacy of the host and user actions. Carefully established prerequisites, including the installation of the Privileged Access Detection integration and the collection of Okta logs, are necessary to deploy the rule effectively. A number of investigation and response steps are provided to ensure that legitimate concerns are approached with caution, and specific mitigation strategies are outlined for false positives that may arise from legitimate use cases. The rule applies a risk score of 21 and is categorized under low severity, which highlights the importance of vigilance in monitoring user operations that could lead to privilege escalation. It operates under the Elastic License v2 and requires a minimum stack version of 8.18.0, emphasizing its deployment in contemporary systems. The rule's setup includes detailed documentation to assist in its configuration and installation.
Categories
  • Identity Management
  • Cloud
  • Web
Data Sources
  • User Account
  • Cloud Service
ATT&CK Techniques
  • T1078
Created: 2025-02-18