- 필수 기능
- 시작하기
- Glossary
- 표준 속성
- Guides
- Agent
- 통합
- 개방형텔레메트리
- 개발자
- Administrator's Guide
- API
- Datadog Mobile App
- CoScreen
- Cloudcraft
- 앱 내
- 서비스 관리
- 인프라스트럭처
- 애플리케이션 성능
- APM
- Continuous Profiler
- 스팬 시각화
- 데이터 스트림 모니터링
- 데이터 작업 모니터링
- 디지털 경험
- 소프트웨어 제공
- 보안
- AI Observability
- 로그 관리
- 관리
",t};e.buildCustomizationMenuUi=t;function n(e){let t='
",t}function s(e){let n=e.filter.currentValue||e.filter.defaultValue,t='${e.filter.label}
`,e.filter.options.forEach(s=>{let o=s.id===n;t+=``}),t+="${e.filter.label}
`,t+=`Detects successful brute force attacks against user accounts.
This rule monitors authentication logs across multiple platforms including Okta, AWS CloudTrail, Auth0, Microsoft 365. The detection logic identifies patterns where a user account has 10 or more failed login attempts within a 15-minute window, followed by at least one successful login for the same user account.
This pattern typically indicates an attacker successfully compromising credentials after multiple failed attempts, suggesting credential stuffing, password spraying, or traditional brute force attacks that eventually succeeded.
{{@ocsf.actor.user.name}}
to understand the attack pattern and duration.{{@ocsf.src_endpoint.ip}}
) and geographic locations of both failed and successful login attempts to identify suspicious access patterns.{{@ocsf.actor.user.name}}
has reported any suspicious activity or if the account shows signs of compromise.