
Summary
This detection rule is designed to identify suspicious login attempts for GSuite users by analyzing GSuite Activity Events. The rule triggers an alert when a login is flagged as suspicious, and it's crucial to investigate such incidents to determine if the account has been compromised. The reference link provides additional context on how Google categorizes these events. The log types monitored are specifically from GSuite activity, particularly focusing on the 'account_warning' type of logs. The rule indicates medium severity, meaning while it is not the highest level of concern, it still requires timely investigation. A recommended course of action is to verify the suspicious login directly with the user involved to rule out any unauthorized access. The tests defined within the rule ensure that only legitimate suspicious login events trigger alerts, thereby reducing false positives.
Categories
- Cloud
- Identity Management
Data Sources
- User Account
- Application Log
Created: 2022-09-02