PingFederate Admin Alert: multiple login attempts by locked account in a short time period

This rule is part of a beta feature. To learn more, contact Support.
Cette page n'est pas encore disponible en français, sa traduction est en cours.
Si vous avez des questions ou des retours sur notre projet de traduction actuel, n'hésitez pas à nous contacter.

Goal

Detect an unusually high number of login attempts by locked account.

Strategy

Monitor PingFederate logs where a user generates a high number of login attempts by a locked account within a short period. This detection rule aims to identify potential threats early, allowing for timely investigation and mitigation to protect server resources and maintain service availability.

Triage and response

  1. Analyze the pattern and volume of requests to distinguish between legitimate traffic and potential attacks.
  2. Investigate the source user {{@usr.name}} to determine if the activity is malicious.
  3. Implement immediate measures to block or limit the impact of the suspicious activity if confirmed as a threat.
PREVIEWING: rtrieu/product-analytics-ui-changes