LoFP
/
t1110
t1110
Title
Tags
a misconfigured service account can trigger this alert. a password change on an account used by an email client can trigger this alert. security test cycles that include brute force or password spraying activities may trigger this alert.
t1110
ml
elastic
account fallback reasons (after failed login with specific account)
t1110
t1110.001
windows
sigma
an okta admnistrator may be logged into multiple accounts from the same host for legitimate reasons.
t1110
okta
elastic
automated processes that attempt to authenticate using expired credentials or have misconfigured authentication settings may lead to false positives.
t1110
azure
elastic
based on the high-frequency threshold, it would be unlikely for a legitimate user to exceed the threshold for failed totp code attempts in a short time-span.
t1110
azure
elastic
build servers and ci systems can sometimes trigger this alert. security test cycles that include brute force or password spraying activities may trigger this alert.
t1078
t1110
ml
elastic
false positives may be generated by normal provisioning workflows for user device registration.
t1078
t1098.005
t1110
t1556.006
t1621
identity
splunk
false positives may be present. tune okta and tune the analytic to ensure proper fidelity. modify risk score as needed. drop to anomaly until tuning is complete.
t1110
infrastructure
okta tenant
splunk
false positives will be limited to the number of events generated by the analytics tied to the stories. analytics will need to be tested and tuned, and the risk score reduced as needed based on the organization.
t1078
t1110
okta tenant
splunk
if this was approved by system administrator.
t1078
t1078.004
t1110
t1556
t1556.006
azure
sigma
ip or users where the usage of multiple operating systems is expected, filter accordingly.
t1110
o365 tenant
splunk
known legacy accounts
t1078
t1078.004
t1110
azure
sigma
legitimate or intentional inbound connections from public ip addresses on the smb port.
t1078
t1110
t1133
windows
sigma
legitimate user wrong password attempts.
t1021
t1021.004
t1078
t1078.004
t1110
bitbucket
sigma
misconfigured systems
t1078
t1078.004
t1110
azure
sigma
multiple account lockouts may be also triggered by an application malfunction. filter as needed, and monitor for any unusual activity.
t1110
okta tenant
splunk
security audits may trigger this alert. conditions that generate bursts of failed logins, such as misconfigured applications or account lockouts could trigger this alert.
t1110
ml
elastic
service account misconfigured
t1078
t1078.004
t1110
azure
sigma
shared systems such as kiosks and conference room computers may be used by multiple users.
t1110
okta
elastic
software that uses the caret encased keywords pass and user in its command line
t1110
t1110.001
windows
sigma
systems with names equal to the spoofed ones used by the brute force tools
t1110
windows
sigma
the threshold for alert is above 10 attempts and this should reduce the number of false positives.
t1110
o365 tenant
splunk
this detection will require tuning to provide high fidelity detection capabilties. tune based on src addresses (corporate offices, vpn terminations) or by groups of users.
t1110
t1580
aws account
splunk
this event could stem from users changing an account's password that's used to authenticate via a job or an automated process. investigate the source of such events and mitigate them
t1110
windows
sigma
tools that use similar command line flags and values
t1110
t1110.002
windows
sigma
unlikely. except due to misconfigurations
t1078
t1110
t1557
cisco
huawei
juniper
sigma
user has been put in acception group so they can use legacy authentication
t1078
t1078.004
t1110
azure
sigma
users actually login but miss-click into the deny button when mfa prompt.
t1078
t1078.004
t1110
t1621
azure
sigma
users may genuinely reset the rds password.
t1110
t1586.003
aws account
splunk
users may share an endpoint related to work or personal use in which separate okta accounts are used.
t1110
okta
elastic
vulnerability scanners
t1078
t1078.004
t1110
t1190
t1505
t1505.001
azure
sigma
we recommend investigating the sessions flagged by this detection in the context of other sign-ins from the user.
t1078
t1090
t1098
t1110
t1528
t1606
azure
sigma