Skip to content

Commit 1c63b81

Browse files
[Rule Tuning] Remove Salesforce Client User-Agent Whitelisting in MFA Deactivation with no Re-Activation for Okta User Account (#4145)
* tuning * added note about whitelisting user agent * removed extra new line (cherry picked from commit 61b731c)
1 parent 2565253 commit 1c63b81

File tree

1 file changed

+4
-3
lines changed

1 file changed

+4
-3
lines changed

rules/integrations/okta/persistence_mfa_deactivation_with_no_reactivation.toml

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
creation_date = "2020/05/20"
33
integration = ["okta"]
44
maturity = "production"
5-
updated_date = "2024/09/23"
5+
updated_date = "2024/10/09"
66

77
[rule]
88
author = ["Elastic"]
@@ -52,6 +52,7 @@ This rule fires when an Okta user account has MFA deactivated and no subsequent
5252
- Investigate the source of the attack. If a specific machine or network is compromised, additional steps may need to be taken to address the issue.
5353
- Encourage users to use complex, unique passwords and consider implementing multi-factor authentication.
5454
- Check if the compromised account was used to access or alter any sensitive data, applications or systems.
55+
- Review the client user-agent to determine if it's a known custom application that can be whitelisted.
5556
"""
5657
references = [
5758
"https://developer.okta.com/docs/reference/api/system-log/",
@@ -69,8 +70,8 @@ type = "eql"
6970

7071
query = '''
7172
sequence by okta.actor.id with maxspan=12h
72-
[any where event.dataset == "okta.system" and okta.event_type == "user.mfa.factor.deactivate"
73-
and okta.outcome.result == "SUCCESS" and not okta.client.user_agent.raw_user_agent like "SFDC-Callout*"]
73+
[any where event.dataset == "okta.system" and okta.event_type in ("user.mfa.factor.deactivate", "user.mfa.factor.reset_all")
74+
and okta.outcome.reason != "User reset SECURITY_QUESTION factor" and okta.outcome.result == "SUCCESS"]
7475
![any where event.dataset == "okta.system" and okta.event_type == "user.mfa.factor.activate"]
7576
'''
7677

0 commit comments

Comments
 (0)