Intense SSO failures

Cortex XSIAM Analytics Alert Reference by Alert name

Product
Cortex XSIAM
Last date published
2025-12-08
Category
Analytics Alert Reference
Index by
Alert name

Synopsis

Activation Period

14 Days

Training Period

30 Days

Test Period

10 Minutes

Deduplication Period

1 Day

Required Data

  • Requires one of the following data sources:
    • AzureAD
      OR
    • Azure SignIn Log
      OR
    • Duo
      OR
    • Okta
      OR
    • OneLogin
      OR
    • PingOne

Detection Modules

Identity Analytics

Detector Tags

ATT&CK Tactic

ATT&CK Technique

Severity

Informational

Response playbooks

Variations of this detector that create incidents have an OOTB response playbook included in the Cortex Response and Remediation Pack

Description

An abnormally high amount of SSO authentication attempts were seen within a short period of time.
This could be the outcome of a brute-force login attempt.

Attacker's Goals

An attacker is attempting to gain access to an account secured with MFA.

Investigative actions

  • Check the legitimacy of this activity and determine whether it is malicious or not.
  • Check whether a successful login was made after unsuccessful attempts.

Variations

Intense SSO failures with suspicious characteristics

Synopsis

ATT&CK Tactic

ATT&CK Technique

Severity

Low

Response playbooks

Intense SSO failures with suspicious characteristics

Description

An abnormally high amount of SSO authentication attempts were seen within a short period of time.
This could be the outcome of a brute-force login attempt.

Attacker's Goals

An attacker is attempting to gain access to an account secured with MFA.

Investigative actions

  • Check the legitimacy of this activity and determine whether it is malicious or not.
  • Check whether a successful login was made after unsuccessful attempts.