Detects attempts to deactivate an Okta policy. An adversary may attempt to deactivate an Okta policy in order to weaken an organization’s security controls. For example, an adversary may attempt to deactivate an Okta multi-factor authentication (MFA) policy in order to weaken the authentication requirements for user accounts.
Rule type: query
Risk score: 21
Runs every: 5 minutes
Maximum alerts per execution: 100
- Continuous Monitoring
Version: 4 (version history)
Added (Elastic Stack release): 7.9.0
Last modified (Elastic Stack release): 7.11.2
Rule authors: Elastic
Rule license: Elastic License
If the behavior of deactivating Okta policies is expected, consider adding exceptions to this rule to filter false positives.
The Okta Fleet integration or Filebeat module must be enabled to use this rule.
event.dataset:okta.system and event.action:policy.lifecycle.deactivate
- Version 4 (7.11.2 release)
- Formatting only
- Version 3 (7.11.0 release)
- Rule name changed from: Attempt to Deactivate Okta Policy
- Version 2 (7.10.0 release)
Updated query, changed from:
event.module:okta and event.dataset:okta.system and event.action:policy.lifecycle.deactivate