This rule is part of a beta feature. To learn more, contact Support.
Cette page n'est pas encore disponible en français, sa traduction est en cours.
Si vous avez des questions ou des retours sur notre projet de traduction actuel, n'hésitez pas à nous contacter.

Goal

Detect when a user fails to log in to Abnormal Security an unusually high number of times.

Strategy

This rule monitors for failed user logins, which may indicate that an attacker has gained access to the user credentials and accessed the account.

Triage and response

  1. Investigate the other actions performed by the user {{@user.email}}.
  2. If confirmed as a threat, implement measures to block or limit the impact of the suspicious activity.
  3. Follow company procedures for handling malicious files, including isolating the endpoint, running antivirus/antimalware scans, analyzing logs, and updating security policies.