Cisco Duo bypass code created by administrator

This rule is part of a beta feature. To learn more, contact Support.
This page is not yet available in Spanish. We are working on its translation.
If you have any questions or feedback about our current translation project, feel free to reach out to us!

Goal

Detect when a Duo bypass code is created by an administrator.

Strategy

This rule monitors Cisco Duo activity logs for the creation of bypass codes by administrators. A bypass code is a temporary passcode created by an administrator for a specific user. These are generally used as “backup codes” to grant enrolled users access to their Duo-protected systems when they have problems with their mobile device, or when they’re temporarily unable to access their enrolled device.

Triage and Response

  1. Investigate the nature of the bypass code creation:
    • Verify if the bypass code creation generated by user {{@usr.email}} from device IP {{@access_device.ip.address}} was authorized and legitimate.
    • Identify the administrator responsible for the action.
  2. If unauthorized or suspicious activity is detected:
    • Disable or review the administrator’s account.
    • Reset any affected user accounts associated with the bypass codes.
    • Initiate an investigation into potential security breaches.