Detects attempts to deactivate multi-factor authentication (MFA) for an Okta user. An adversary may deactivate MFA for an Okta user account in order to weaken the authentication requirements for the account.
Rule type: query
Risk score: 21
Runs every: 5 minutes
Maximum alerts per execution: 100
- Continuous Monitoring
- Identity and Access
Version: 4 (version history)
Added (Elastic Stack release): 7.9.0
Last modified (Elastic Stack release): 7.11.2
Rule authors: Elastic
Rule license: Elastic License
If the behavior of deactivating MFA for Okta user accounts is expected, consider adding exceptions to this rule to filter false positives.
The Okta Fleet integration or Filebeat module must be enabled to use this rule.
event.dataset:okta.system and event.action:user.mfa.factor.deactivate
Framework: MITRE ATT&CKTM
- Version 4 (7.11.2 release)
- Formatting only
- Version 3 (7.11.0 release)
- Rule name changed from: Attempt to Deactivate MFA for Okta User Account
- Version 2 (7.10.0 release)
Updated query, changed from:
event.module:okta and event.dataset:okta.system and event.action:user.mfa.factor.deactivate