Skip to content

Commit fd5c7a8

Browse files
committed
testing changed detections
1 parent f23d293 commit fd5c7a8

File tree

3 files changed

+3
-3
lines changed

3 files changed

+3
-3
lines changed

detections/application/okta_multiple_accounts_locked_out.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: Michael Haag, Mauricio Velazco, Splunk
66
data_source: []
77
type: Anomaly
88
status: production
9-
description: The following analytic detects multiple Okta accounts being locked out
9+
description: The following analytic detects multiple Okta accounts being locked out
1010
within a short period. It uses the user.account.lock event from Okta logs, aggregated
1111
over a 5-minute window, to identify this behavior. This activity is significant
1212
as it may indicate a brute force or password spraying attack, where an adversary

detections/application/okta_multiple_failed_mfa_requests_for_user.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: Mauricio Velazco, Splunk
66
data_source: []
77
type: Anomaly
88
status: production
9-
description: The following analytic identifies multiple failed multi-factor authentication
9+
description: The following analytic identifies multiple failed multi-factor authentication
1010
(MFA) requests for a single user within an Okta tenant. It triggers when more than
1111
10 MFA attempts fail within 5 minutes, using Okta event logs to detect this pattern.
1212
This activity is significant as it may indicate an adversary attempting to bypass

detections/application/okta_multiple_failed_requests_to_access_applications.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: John Murphy, Okta, Michael Haag, Splunk
66
type: Hunting
77
status: experimental
88
data_source: []
9-
description: 'The following analytic detects multiple failed attempts to access applications
9+
description: 'The following analytic detects multiple failed attempts to access applications
1010
in Okta, potentially indicating the reuse of a stolen web session cookie. It leverages
1111
Okta logs to evaluate policy and SSO events, aggregating data by user, session,
1212
and IP. The detection triggers when more than half of the app sign-on attempts are

0 commit comments

Comments
 (0)