Salesforce login from unseen application

이 페이지는 아직 영어로 제공되지 않습니다. 번역 작업 중입니다.
현재 번역 프로젝트에 대한 질문이나 피드백이 있으신 경우 언제든지 연락주시기 바랍니다.

Goal

Detects Salesforce login attempts from previously unseen applications.

Strategy

This rule monitors Salesforce login events where @evt.name is Login or LoginEvent with an @application field present. It uses new value detection to identify when any application that has not been previously observed attempts to authenticate to the Salesforce environment. New applications accessing Salesforce may indicate legitimate business expansion, new integrations, or potentially malicious applications attempting unauthorized access.

Triage & Response

  • Examine the application name and details for {{@application}} to determine if it represents a legitimate business application or potentially malicious software.
  • Review recent IT change requests and application deployments to verify if the new application was authorized and expected.
  • Analyze the login patterns and user accounts associated with the new application to identify any suspicious authentication activity.
  • Check if the new application has appropriate security configurations and follows organizational security policies.
  • Verify with IT administrators or application owners whether the new application access was planned and authorized.