FortiSOAR Discussions
Anonymous
Not applicable

FortiSOAR™'s Rapid Response to Concurrent Logins

 FortiSOAR™ excels in addressing Concurrent Logins, a scenario where attackers attempt simultaneous access from different locations. Imagine a scenario where a user's credentials are compromised, leading to Concurrent Logins detected from multiple global locations. This situation demands immediate action to prevent unauthorized access, data breaches, and potential damage. Here, is how FortiSOAR's automated playbooks now come in action:

  1. Geographic Location Identification:

    • FortiSOAR™ automatically pinpoints the geographic origin of the concurrent logins, flagging potential threats from unexpected regions.
  2. Blocking Malicious Source IP Addresses:

    • Integration with Fortinet FortiGate firewalls allows instant blocking of malicious source IP addresses, preventing further unauthorized access attempts.
  3. User Profiling from Active Directory:

    • Leveraging Microsoft's Active Directory, the playbook extracts user details, aiding in swift identification and response to potential insider threats.
  4. Behavior Analysis - Last 4 Hours:

    • Examining the user's login history over the last four hours provides context, helping security teams distinguish normal activity from suspicious behavior.
  5. Temporary User Disablement:

    • With IT team approval, the playbook temporarily disables the compromised user account, containing the threat and allowing for a thorough investigation.
  6. Password Reset on Subsequent Attempts:

    • If the user attempts to log in again, FortiSOAR™ automatically resets their password, thwarting further unauthorized access attempts.

FortiSOAR™ proves its mettle by providing a rapid and automated response.
Reference: https://fortisoar.contenthub.fortinet.com//detail.html?entity=impossibleTravellerThreatResponse&vers...

1 REPLY 1
tylerkelley1980
New Contributor II

Detecting concurrent logins is a critical part of modern SOC workflows. I’ve seen FortiSOAR shine in situations where timing and correlation are key—especially when tied to risk scoring and adaptive response. In a similar way, I use Phonexa to flag unusual lead activity in real time. Whether it’s users or data, proactive response always beats reactive cleanup.