LoFP
/
okta tenant
Title
Tags
a source ip failing to authenticate with multiple users in a short period of time is not common legitimate behavior.
T1110.003
T1110.004
t1586.003
okta tenant
o365 tenant
splunk
a user may have accidentally entered the wrong credentials during the mfa challenge. if the user is new to mfa, they may have trouble authenticating. ensure that the user is aware of the mfa process and has the correct credentials.
t1078.004
t1586.003
t1621
okta tenant
splunk
although not recommended, certain users may be exempt from multi-factor authentication. adjust the filter as necessary.
t1078.004
t1586.003
t1621
okta tenant
splunk
false positives may be present based on organization size and configuration of okta. monitor, tune and filter as needed.
t1621
okta tenant
splunk
false positives may be present. tune okta and tune the analytic to ensure proper fidelity. modify risk score as needed.
t1078.001
okta tenant
splunk
false positives may occur, depending on the organization's size and the configuration of okta.
t1539
okta tenant
splunk
false positives should be minimal, given the high fidelity of this detection. marker.
t1078.001
okta tenant
splunk
false positives will be limited to the number of events generated by the analytics tied to the stories. analytics will need to be tested and tuned, and the risk score reduced as needed based on the organization.
t1078
t1110
okta tenant
splunk
it is possible that the user has legitimately added a new device to their account. please verify this activity.
t1098.005
okta tenant
splunk
it is uncommon for a user to log in from multiple cities simultaneously, which may indicate a false positive.
t1586.003
okta tenant
splunk
it's possible for legitimate administrative actions or automated processes to trigger this detection, especially if there are bulk modifications to okta idp lifecycle events. review the context of the modification, such as the user making the change and the specific lifecycle event modified, to determine if it aligns with expected behavior.
t1087.004
okta tenant
splunk
legitimate use case may require for users to disable mfa. filter lightly and monitor for any unusual activity.
t1556.006
okta tenant
splunk
multiple account lockouts may be also triggered by an application malfunction. filter as needed, and monitor for any unusual activity.
t1110
okta tenant
splunk
multiple failed mfa requests may also be a sign of authentication or application issues. filter as needed and monitor for any unusual activity.
t1621
okta tenant
splunk
there is a possibility that a user may accidentally click on the wrong application, which could trigger this event. it is advisable to verify the location from which this activity originates.
t1087.004
okta tenant
splunk