DETECTION OVERVIEW
Risk Factors
An attacker or employee who wants to evade detection might conduct malicious activity outside of normal business hours. An unusual login time might be legitimate, but suspicious activity could be part of a critical and costly attack.
The system might change the risk score for this detection.
Kill Chain
Risk Score
65
Review authentication methods and enforce policies for secure credential creation and multi-factor authentication
Implement the principle of least privilege to minimize the damage done from a compromised account