EXPLORE

EXPLORE DETECTIONS

🔍
3,252 detections found

Okta Application Modified or Deleted

Detects when an application is modified or deleted.

Sigmamedium

Okta Application Sign-On Policy Modified or Deleted

Detects when an application Sign-on Policy is modified or deleted.

Sigmamedium

Okta Identity Provider Created

Detects when a new identity provider is created for Okta.

T1098.001
Sigmamedium

Okta MFA Reset or Deactivated

Detects when an attempt at deactivating or resetting MFA.

T1556.006
Sigmamedium

Okta Network Zone Deactivated or Deleted

Detects when an Network Zone is Deactivated or Deleted.

Sigmamedium

Okta New Admin Console Behaviours

Detects when Okta identifies new activity in the Admin Console.

T1078.004
Sigmahigh

Okta Password Health Report Query

Detects all activities against the endpoint "/reports/password-health/*" which should only be accessed via OKTA Admin Console UI. Use this rule to hunt for potential suspicious requests. Correlate this event with "admin console" login and alert on requests without any corresponding admin console login

Sigmalow

Okta Policy Modified or Deleted

Detects when an Okta policy is modified or deleted.

Sigmalow

Okta Policy Rule Modified or Deleted

Detects when an Policy Rule is Modified or Deleted.

Sigmamedium

Okta Security Threat Detected

Detects when an security threat is detected in Okta.

Sigmamedium

Okta Suspicious Activity Reported by End-user

Detects when an Okta end-user reports activity by their account as being potentially suspicious.

T1586.003
Sigmahigh

Okta Unauthorized Access to App

Detects when unauthorized access to app occurs.

Sigmamedium

Okta User Account Locked Out

Detects when an user account is locked out.

T1531
Sigmamedium

Okta User Session Start Via An Anonymising Proxy Service

Detects when an Okta user session starts where the user is behind an anonymising proxy service.

T1562.006
Sigmahigh

Old TLS1.0/TLS1.1 Protocol Version Enabled

Detects applications or users re-enabling old TLS versions by setting the "Enabled" value to "1" for the "Protocols" registry key.

Sigmamedium

OMIGOD SCX RunAsProvider ExecuteScript

Rule to detect the use of the SCX RunAsProvider ExecuteScript to execute any UNIX/Linux script using the /bin/sh shell. Script being executed gets created as a temp file in /tmp folder with a scx* prefix. Then it is invoked from the following directory /etc/opt/microsoft/scx/conf/tmpdir/. The file in that directory has the same prefix scx*. SCXcore, started as the Microsoft Operations Manager UNIX/Linux Agent, is now used in a host of products including Microsoft Operations Manager, Microsoft Azure, and Microsoft Operations Management Suite.

T1068T1190T1203
Sigmahigh

OMIGOD SCX RunAsProvider ExecuteShellCommand

Rule to detect the use of the SCX RunAsProvider Invoke_ExecuteShellCommand to execute any UNIX/Linux command using the /bin/sh shell. SCXcore, started as the Microsoft Operations Manager UNIX/Linux Agent, is now used in a host of products including Microsoft Operations Manager, Microsoft Azure, and Microsoft Operations Management Suite.

T1068T1190T1203
Sigmahigh

OneLogin User Account Locked

Detects when an user account is locked or suspended.

Sigmalow

OneLogin User Assumed Another User

Detects when an user assumed another user account.

Sigmalow

OneNote Attachment File Dropped In Suspicious Location

Detects creation of files with the ".one"/".onepkg" extension in suspicious or uncommon locations. This could be a sign of attackers abusing OneNote attachments

Sigmamedium

OneNote.EXE Execution of Malicious Embedded Scripts

Detects the execution of malicious OneNote documents that contain embedded scripts. When a user clicks on a OneNote attachment and then on the malicious link inside the ".one" file, it exports and executes the malicious embedded script from specific directories.

T1218.001
Sigmahigh

OpenCanary - FTP Login Attempt

Detects instances where an FTP service on an OpenCanary node has had a login attempt.

T1190T1021
Sigmahigh

OpenCanary - GIT Clone Request

Detects instances where a GIT service on an OpenCanary node has had Git Clone request.

T1213
Sigmahigh

OpenCanary - Host Port Scan (SYN Scan)

Detects instances where an OpenCanary node has been targeted by a SYN port scan.

T1046
Sigmahigh
PreviousPage 60 of 136Next