Unusual 1Password device authorization activity
이 페이지는 아직 영어로 제공되지 않습니다. 번역 작업 중입니다.
현재 번역 프로젝트에 대한 질문이나 피드백이 있으신 경우
언제든지 연락주시기 바랍니다.Goal
Detect when a 1Password device authorization action is observed.
Strategy
This rule monitors 1Password audit logs for device authorization action that may allow an attacker to maintain persistence within a 1Password tenant.
Note: This rule uses the New Value
detection method to determine when a previously unseen device authorization action is observed.
Triage & response
Investigate user {{@usr.email}}
attempting an unfamiliar {{@evt.name}}
device authorization action on {{@session.device_uuid}}
from {{@network.client.ip}}
.