Jumpcloud admin login without MFA
이 페이지는 아직 영어로 제공되지 않습니다. 번역 작업 중입니다.
현재 번역 프로젝트에 대한 질문이나 피드백이 있으신 경우
언제든지 연락주시기 바랍니다.Goal
Detect when a JumpCloud administrator authenticates without multi-factor authentication (MFA) enabled. This is not indicative of malicious activity, however as a best practice, administrator accounts should have MFA enabled.
Strategy
This rule monitors JumpCloud audit logs to detect when an admin user successfully authenticates to JumpCloud and the log indicates that @mfa
is false
.
Triage and response
- Reach out to the {{@usr.name}} to determine if the login was legitimate.
- If the login was legitimate, request that the user enables MFA.
- If the login wasn’t legitimate, rotate the credentials, enable MFA and triage an actions uncovered from step 1.
- Review all user accounts to ensure MFA is enabled.