Detectionhightest
Okta New Admin Console Behaviours
Detects when Okta identifies new activity in the Admin Console.
Convert In Phoenix Studio
Open this Sigma rule in the converter with the YAML preloaded and ready for backend selection.
Launch
Log Source
Oktaokta
ProductOkta← raw: okta
Serviceokta← raw: okta
Detection Logic
Detection Logic2 selectors
detection:
selection_event:
eventtype: 'policy.evaluate_sign_on'
target.displayname: 'Okta Admin Console'
selection_positive:
- debugcontext.debugdata.behaviors|contains: 'POSITIVE'
- debugcontext.debugdata.logonlysecuritydata|contains: 'POSITIVE'
condition: all of selection_*False Positives
When an admin begins using the Admin Console and one of Okta's heuristics incorrectly identifies the behavior as being unusual.
MITRE ATT&CK
Rule Metadata
Rule ID
a0b38b70-3cb5-484b-a4eb-c4d8e7bcc0a9
Status
test
Level
high
Type
Detection
Created
Thu Sep 07
Modified
Wed Jun 26
Author
Path
rules/identity/okta/okta_new_behaviours_admin_console.yml
Raw Tags
attack.privilege-escalationattack.persistenceattack.defense-evasionattack.initial-accessattack.t1078.004