LoFP LoFP / infrastructure

infrastructure rule

TitleTags
false positives may be present. tune okta and tune the analytic to ensure proper fidelity. modify risk score as needed. drop to anomaly until tuning is complete.
false positives may occur. it is recommended to fine-tune okta settings and the analytic to ensure high fidelity. adjust the risk score as necessary.
fidelity of this is high as it is okta threatinsight. filter and modify as needed.
fidelity of this is high as okta is specifying malicious infrastructure. filter and modify as needed.
none currently known
none. account lockouts should be followed up on to determine if the actual user was the one who caused the lockout, or if it was an unauthorized actor.
there may be a faulty config preventing legitmate users from accessing apps they should have access to.
this search might be prone to high false positives if dhcp snooping has been incorrectly configured or in the unlikely event that the dhcp server has been moved to another network interface.
this search might be prone to high false positives if dhcp snooping or arp inspection has been incorrectly configured, or if a device normally sends many arp packets (unlikely).
this search might be prone to high false positives if you have malfunctioning devices connected to your ethernet ports or if end users periodically connect physical devices to the network.
this search might be prone to high false positives. please consider this when conducting analysis or investigations. authorized devices may be detected as unauthorized. if this is the case, verify the mac address of the system responsible for the false positive and add it to the assets and identity framework with the proper information.
this search will also report any legitimate attempts of software downloads to network devices as well as outbound ssh sessions from network devices.
this search will return false positives for any legitimate traffic captures by network administrators.