PingOne multiple Kerberos check failed attempts

This rule is part of a beta feature. To learn more, contact Support.
ping-one

Classification:

attack

Technique:

이 페이지는 아직 영어로 제공되지 않습니다. 번역 작업 중입니다.
현재 번역 프로젝트에 대한 질문이나 피드백이 있으신 경우 언제든지 연락주시기 바랍니다.

Goal

Detect when an unusually high number of Kerberos check failed attempts are made from a single user.

Strategy

Monitor PingOne logs where a user generates a high number of requests within a short period. This detection rule aims to identify potential threats early, allowing for timely investigation and mitigation to protect server resources and maintain service availability.

Triage and response

  1. Analyze the pattern and volume of requests to distinguish between legitimate traffic and potential attacks.
  2. Investigate the source user {{@resources.name}} to determine if the activity is malicious.
  3. Implement immediate measures to block or limit the impact of the suspicious activity if confirmed as a threat.
PREVIEWING: brett.blue/embedded-collector-release