Types of Alerts
The following table explains the types of alerts.
Alert Name | Description | Logic |
---|---|---|
Login on weekend |
User login during a weekend |
Trigger an alert if a user logs in on Sunday or Saturday. Filter out users who are active on two or more consecutive weekends. |
User performed an activity from an abnormal location |
User performed an activity from a location where they are not normally found |
Based on the session IP, compare the session location to the user's previous locations (at least 10 days of baseline required) and alert if the location is new. Ignores IPs with unknown locations. |
Irregular session |
The user sessions started before or after the user's usual activity time, determined by the user timeline |
Baseline data is collected for at least 14 days of activities. Based on this baseline, determine the user's usual start time and end time, as one standard deviation from start and end time. Each session occurring outside of those thresholds triggers an alert. |
Abnormal spike in users activity |
The user performed more than five times their normal activities |
Determine whether the baseline of at least 14 days of platform usage exists for the user. If the baseline exists, calculate a baseline of activities, excluding some like login/MFA and secret view.
Trigger an alert if the user's non-excluded platform actions exceed five times the number of average activities. |
Brute force |
Attempt was made to brute force an account |
Detect any of these events:
|
Account under MFA bombing attack |
Detects MFA bombing events and repeated attempts to access an account that requires MFA authentication |
Detect MFA bombing by performing the following:
|
Inactive user performed an action | Triggered if a dormant account for at least 90 days performed an activity | Per each non enabled account, we search for actions that occurred after a period of 90 days or more of inactivity, meaning in this time period, the system did not record any activity for the user. |