Zoom account sign in requirements changed

This rule is part of a beta feature. To learn more, contact Support.
Cette page n'est pas encore disponible en français, sa traduction est en cours.
Si vous avez des questions ou des retours sur notre projet de traduction actuel, n'hésitez pas à nous contacter.

Goal

This detection identifies when authentication requirements in a Zoom account are weakened or disabled.

Strategy

This detection monitors Zoom operation logs for changes to critical authentication settings. The rule looks for account update events where security controls have been changed from enabled to disabled states, including disabling password requirements, allowing password reuse, turning off two-factor authentication, or disabling one-time passcode authentication. The detection focuses on @evt.category of “Account” with @evt.name values of “Update” or “Batch Update” containing specific message patterns that indicate security controls being turned off. Events are grouped by the email address of the user making the changes (@usr.email).

Weakening authentication settings is concerning as it reduces the security posture of the organization’s Zoom environment, potentially making it easier for unauthorized users to access accounts through credential attacks or account takeovers.

Triage & Response

  • Verify which specific authentication requirement was changed and assess the security impact.
  • Identify which administrator account ({{@usr.email}}) made the change and confirm this was the legitimate account owner.
  • Check for other recent administrative actions by the same user to establish a pattern of behavior.
  • Look for concurrent security changes across the Zoom environment that might indicate a broader attack.
  • Evaluate whether multiple authentication requirements were changed in rapid succession.
  • Restore proper authentication requirements if the change was unauthorized.
  • Consider temporarily restricting permissions of the administrator account pending investigation.