Physical Security
Egnyte Issues & Remediation
Incident Response – Triage & Containment
AD, Entra, and Authentication
Threat Indicators & Behavior Analysis
100

Allowing someone to enter a secure area because you held the door open for them can be considered?

What is piggybacking

100

This issue occurs when a user shares a folder using a link that is open to the internet and not protected by a password.

What is a Public Link Issue

100

The first step when a user admits they clicked a phishing link and entered credentials.

What is disables the account

100

In Active Directory, this action immediately blocks authentication attempts but keeps the account intact.

What is Disable Account

100

This indicator appears when a user logs in successfully, but from a location they’ve never used before, such as another state or country.

What is geolocation anomaly

200

An unauthorized person slips in by following closely behind someone with valid credentials, usually without their knowledge.

What is tailgating

200

A link shared with someone outside NoxGroup but still requires the user to be authenticated.

What is an External Link

200

Resetting this alone is not enough because it does not revoke stolen tokens.

What is the password

200

The Microsoft portal where you perform account revocation, sign-in logs review, and device checks.

What is Microsoft Entra Admin Center

200

Egnyte may flag a user deleting or modifying large volumes of files in a short period, especially outside their normal work pattern.

What is abnormal file activity
(or What is a mass deletion IOC)

300

Searching through office trash to extract sensitive documents or credentials.

What is dumpster diving

300

An Egnyte issue triggered when a user deletes or accesses large volumes of files in a short period.

What is Unusual Access

300

After disabling the account, this action removes active refresh tokens and logins across all devices.

What is Revoke All Sessions

300

These two places must be checked for suspicious MFA failures, unusual IPs, or device hijack indicators.

What are Sign-In Logs and Devices

300

When a user suddenly receives multiple MFA prompts they did not initiate, it often indicates this type of ongoing attack.

What is an MFA Fatigue Attack

400

Leaving your workstation unlocked when stepping away gives attackers an opportunity for this type of physical compromise.

What is an unattended workstation attack

400

When two or more login attempts occur from different regions, different IPs, or different countries at the same time.

What is a Suspicious Login

400

Removing recognized and unrecognized devices in Entra is only required if this is detected.

What is an IOC (Indicator of Compromise)

400

This type of hijack occurs when stolen refresh tokens allow an attacker to stay logged in even after a password reset.

What is session hijacking

400

This IOC appears when login attempts occur from two distant locations within a timeframe that makes legitimate travel impossible. 

What is impossible travel?

500

An attacker follows someone through a secure door by pretending they forgot their badge or acting like they’re part of the crew.

What is social engineering for access or badge-tailgating

500

Secure & Govern reports that an external user has direct access to an internal folder.

What do you do in accordance with the Access Hygiene policy? 

What is remove the permission and validate whether sharing is still required

500

The final step of account recovery, only done after the account is contained and sessions are revoked.

What is password reset

500

The next action after disabling an account if MFA prompts are failing repeatedly or coming from unfamiliar locations.

What is remove devices or re-register MFA

500

A sign of potential session hijack: the password is changed, but the attacker’s device remains logged in and continues performing actions.

What is token persistence?
(or What is a persistent refresh token hijack?)

M
e
n
u