Unusual 1Password device authorization activity
このページは日本語には対応しておりません。随時翻訳に取り組んでいます。
翻訳に関してご質問やご意見ございましたら、
お気軽にご連絡ください。
Goal
Detect when a 1Password device authorization action is observed.
Strategy
This rule monitors 1Password audit logs for device authorization action that may allow an attacker to maintain persistence within a 1Password tenant.
Note: This rule uses the New Value detection method to determine when a previously unseen device authorization action is observed.
Triage & response
Investigate user {{@usr.email}} attempting an unfamiliar {{@evt.name}} device authorization action on {{@session.device_uuid}} from {{@network.client.ip}}.