- 필수 기능
- 시작하기
- Glossary
- 표준 속성
- Guides
- Agent
- 통합
- 개방형텔레메트리
- 개발자
- Administrator's Guide
- API
- Datadog Mobile App
- CoScreen
- Cloudcraft
- 앱 내
- 서비스 관리
- 인프라스트럭처
- 애플리케이션 성능
- APM
- Continuous Profiler
- 스팬 시각화
- 데이터 스트림 모니터링
- 데이터 작업 모니터링
- 디지털 경험
- 소프트웨어 제공
- 보안
- AI Observability
- 로그 관리
- 관리
",t};e.buildCustomizationMenuUi=t;function n(e){let t='
",t}function s(e){let n=e.filter.currentValue||e.filter.defaultValue,t='${e.filter.label}
`,e.filter.options.forEach(s=>{let o=s.id===n;t+=``}),t+="${e.filter.label}
`,t+=`This detection identifies when authentication requirements in a Zoom account are weakened or disabled.
This detection monitors Zoom operation logs for changes to critical authentication settings. The rule looks for account update events where security controls have been changed from enabled to disabled states, including disabling password requirements, allowing password reuse, turning off two-factor authentication, or disabling one-time passcode authentication. The detection focuses on @evt.category
of “Account” with @evt.name
values of “Update” or “Batch Update” containing specific message patterns that indicate security controls being turned off. Events are grouped by the email address of the user making the changes (@usr.email
).
Weakening authentication settings is concerning as it reduces the security posture of the organization’s Zoom environment, potentially making it easier for unauthorized users to access accounts through credential attacks or account takeovers.
{{@usr.email}}
) made the change and confirm this was the legitimate account owner.