This rule is part of a beta feature. To learn more, contact Support.

Set up the slack integration.

Cette page n'est pas encore disponible en français, sa traduction est en cours.
Si vous avez des questions ou des retours sur notre projet de traduction actuel, n'hésitez pas à nous contacter.

Goal

Detect when a change to Single Sign On (SSO) restrictions has occurred.

Strategy

This rule monitors Slack audit logs for when a change to SSO restrictions has occurred. Attackers may try to modify authentication processes to access user credentials or gain unauthorized access to other accounts.

Triage and response

  1. Determine if the change taken by {{@usr.email}} is authorized.
  2. If the change was not authorized or was unexpected, begin your organization’s incident response process and investigate.