<  Back to rules search

OneLogin user locked out

onelogin

Classification:

attack

Tactic:

Technique:

このページは日本語には対応しておりません。随時翻訳に取り組んでいます。翻訳に関してご質問やご意見ございましたら、お気軽にご連絡ください。

Goal

Detect when a OneLogin user is locked out. This may be common if the user is repeatedly failing to log in. This rule is most useful when correlated with other anomalous activity for the user.

Strategy

This rule lets you monitor the following OneLogin events to when a user is locked out:

  • @evt.name:USER_LOCKED

Triage and response

  1. Determine whether the user ({{@usr.name}}) was legitimately trying to authenticate and was locked out.
  2. If the activity was not legitimate, review all activity from the IP ({{@network.client.ip}}) associated with this signal.