PingFederate Audit Alert: multiple failed sso login attempts in a short time period

This rule is part of a beta feature. To learn more, contact Support.
このページは日本語には対応しておりません。随時翻訳に取り組んでいます。翻訳に関してご質問やご意見ございましたら、お気軽にご連絡ください。

Goal

Detect an unusually high number of failed SSO login attempts.

Strategy

Monitor PingFederate logs where a user generates a high number of failed SSO login requests within a short period. This detection rule aims to identify potential threats early, allowing for timely investigation and mitigation to protect server resources and maintain service availability.

Triage and response

  1. Analyze the pattern and volume of requests to distinguish between legitimate traffic and potential attacks.
  2. Investigate the IP {{@network.client.ip}} to determine if the activity is malicious.
  3. Implement immediate measures to block or limit the impact of the suspicious activity if confirmed as a threat.
PREVIEWING: rtrieu/product-analytics-ui-changes