Palo Alto Networks, Inc.
DETECTION OF COMPROMISED CREDENTIALS AS A NETWORK SERVICE
Last updated:
Abstract:
Techniques for detection of compromised credentials as a network service are disclosed. In some embodiments, a system, process, and/or computer program product for detection of compromised credentials as a network service includes monitoring a plurality of sessions at a firewall, logging a plurality of failed or timed out attempts to authenticate at the firewall in a log, analyzing the log for a pattern of failed or timed out attempts to authenticate at the firewall to identify potentially compromised credentials for authentication, and determining that a set of credentials for authentication have been compromised based on the analysis of the log.
Status:
Application
Type:
Utility
Filling date:
30 May 2019
Issue date:
14 Nov 2019