Okta admin console activity from new device
Goal
Detects Okta Admin Console sign-in from a new device and geolocation. Using Okta’s new device and location enrichment, alerts are triggered from allowed sign-ons to the Okta’s administrator console.
Strategy
This rule monitors Okta sign-on evaluation, policy.evaluate_sign_on, events for admin console access where @debugContext.debugData.behaviors includes a positive flag for new device and geolocation. After a sign-on evaluation action, the user.session.access_admin_app event will be logged for the user.
Accessing administrative views and privileges from a new device and location can indicate an account takeover.
Triage & Response
- Review the sign-on details for
{{@usr.email}} and confirm the user recognizes the new device. - Check whether the geolocation and source IP
{{@network.client.ip}} match expected locations, travel, or corporate VPN patterns. - Identify preceding authentication events for
{{@usr.email}} (failed logins, MFA challenges, password resets) near the alert time. - Determine if strong MFA and device posture controls were required for this account and whether they were satisfied within the policy evaluation log.
- Examine subsequent Okta actions from the same user after accessing the admin portal, such as admin role changes, policy updates, application assignments, or reading of OAuth secrets.
- If the access event is unexpected or resulted in suspicious activities, initiate your incident response plan.