Impossible travel event observed from 1Password user
(Redirected from Detect an Impossible Travel event from a 1Password user)
Jump to navigation
Jump to search
- https://docs.datadoghq.com/security/default_rules/1password-impossible-travel-observed/
- Classification: attack
The Impossible Travel detection type’s algorithm compares the GeoIP data of the last log and the current log to determine if the user (@user.email) traveled more than 500km at over 1,000km/h
Related[edit]
See also[edit]
- 1password,
op
, Privnote, Kolide, 1password connect, 1password Kubernetes Injector,1password-cli, kind: OnePasswordItem
, 1Password Browser extension,uses: 1password/load-secrets-action@v2
, 1Password Watchtower, 1Password Secrets Automation, 1password secret key, 1password Kubernetes operator, operator logs - Datadog, Datadog agent, Forwarder, Spans, DBM, standard attribute list, facets, log explorer, Terraform datadog, Airflow,
dog, agent, DogStatsD
, Airflow integration, Datadog pipelines,app.datadoghq.eu
, Datadog Cloud SIEM, Cloud Security Management, Datadog AWS Integration, Datadog Monitors,dd-trace-go
, DataDog Continuous Profiler, CoScreen, Kubernetes APM, flex logs, Datadog notifications
Advertising: