Skip to content

Commit 0fe16e1

Browse files
fixed verbiage
1 parent 3e5ea32 commit 0fe16e1

File tree

1 file changed

+6
-6
lines changed

1 file changed

+6
-6
lines changed

rules/integrations/okta/credential_access_multiple_user_agent_os_authentication.toml

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -6,9 +6,9 @@ updated_date = "2025/10/22"
66
[rule]
77
author = ["Elastic"]
88
description = """
9-
Identifies when a single Okta device trust hash (dt_hash) is associated with multiple operating system types. This is
10-
highly anomalous because a device trust token is tied to a specific device and its operating system. This alert strongly
11-
indicates that an attacker has stolen a device trust token and is using it to impersonate a legitimate user from a
9+
Identifies when a single Okta device token hash (dt_hash) is associated with multiple operating system types. This is
10+
highly anomalous because a device token token is tied to a specific device and its operating system. This alert strongly
11+
indicates that an attacker has stolen a device token token and is using it to impersonate a legitimate user from a
1212
different machine.
1313
"""
1414
false_positives = [
@@ -25,7 +25,7 @@ note = """## Triage and analysis
2525
2626
### Investigating Okta Multiple OS Names Detected for a Single DT Hash
2727
28-
This rule detects when a single Okta device trust hash (dt_hash) is associated with multiple operating system types. This is highly anomalous because a device trust token is tied to a specific device and its operating system. This alert strongly indicates that an attacker has stolen a device trust token and is using it to impersonate a legitimate user from a different machine.
28+
This rule detects when a single Okta device token hash (dt_hash) is associated with multiple operating system types. This is highly anomalous because a device token token is tied to a specific device and its operating system. This alert strongly indicates that an attacker has stolen a device token token and is using it to impersonate a legitimate user from a different machine.
2929
3030
### Possible investigation steps
3131
- Review the `okta.debug_context.debug_data.dt_hash` field to identify the specific device
@@ -47,8 +47,8 @@ same dt_hash. This will help identify the nature of the anomaly.
4747
- If compromise is confirmed, reset the user's credentials and enforce multi-factor authentication (MFA)
4848
- Revoke any active sessions associated with the compromised account to prevent further unauthorized access.
4949
- Review and monitor the affected dt_hash for any further suspicious activity.
50-
- Educate users about the importance of device security and the risks associated with device trust tokens.
51-
- Implement additional monitoring for device trust tokens and consider using conditional access policies to restrict access based on device compliance status.
50+
- Educate users about the importance of device security and the risks associated with device token tokens.
51+
- Implement additional monitoring for device token tokens and consider using conditional access policies to restrict access based on device compliance status.
5252
"""
5353
risk_score = 73
5454
rule_id = "fb3ca230-af4e-11f0-900d-f661ea17fbcc"

0 commit comments

Comments
 (0)