Detects attempts to deactivate a rule within an Okta policy. An adversary may attempt to deactivate a rule within an Okta policy in order to remove or weaken an organization’s security controls.
Rule type: query
Risk score: 47
Runs every: 5 minutes
Maximum alerts per execution: 100
- Continuous Monitoring
- Identity and Access
Version: 4 (version history)
Added (Elastic Stack release): 7.9.0
Last modified (Elastic Stack release): 7.11.2
Rule authors: Elastic
Rule license: Elastic License
Consider adding exceptions to this rule to filter false positives if Okta MFA rules are regularly deactivated in your organization.
The Okta Fleet integration or Filebeat module must be enabled to use this rule.
event.dataset:okta.system and event.action:policy.rule.deactivate
- Version 4 (7.11.2 release)
- Formatting only
- Version 3 (7.11.0 release)
- Rule name changed from: Attempt to Deactivate Okta MFA Rule
- Version 2 (7.10.0 release)
Updated query, changed from:
event.module:okta and event.dataset:okta.system and event.action:policy.rule.deactivate