Play Now with BOTS Partner Experiences: Okta

Splunk is committed to using inclusive and unbiased language. This blog post might contain terminology that we no longer use. For more information on our updated terminology and our stance on biased language, please visit our blog post. We appreciate your understanding as we work towards making our community more inclusive for everyone.

A little less than a year ago, a small team of us at Splunk released the first of our Boss of the SOC (BOTS) Partner Experiences, covering integration between Splunk and one of our network/wire data partners, Corelight. The idea that anyone in the world could access BOTS experiences at any time of day which showcase data from Splunk’s many partners proved a popular one. Since inception, more than 500 individuals have played at least one of these partner experiences. We followed up the Corelight scenario with one from OT Cybersecurity partner Dragos in July.

Well, good things come in threes, right? Splunk is proud to announce the debut of our third BOTS Partner Experience, this time with Identity and Access Management partner Okta. With identity-based attacks on the rise and high-profile breaches making headlines, identity and access management logs are a critical component of any Blue Team’s toolset. Anyone with a splunk.com account can access this experience, linked from the main BOTS portal page at https://bots.splunk.com. The whole point of these no-cost, no-obligation experiences is to expose you, our readers, to more data sets — especially ones similar to what you might find in your real-world environments. And as such, Okta should be a popular choice - there are thousands of organizations that are customers of both Splunk and Okta. As you’ll experience, Okta’s Identity Engine and Advanced Server Access solutions provide detailed data to Splunk Enterprise that is significant for cybersecurity monitoring, detection, and threat hunting as well as general identity management operations and reporting.

Okta provides the world's leading, enterprise-grade, cloud-native Identity as a Service solution to more than 14,000 customers worldwide. These customers use Okta for both workforce-facing identity requirements as well as customer-facing ones. Through the Okta Identity Cloud, organizations can securely manage any employee or customer’s access to any application, from any device. Okta provides significant capabilities surrounding Single Sign On, Multi-Factor Authentication, Identity Lifecycle Provisioning, Privileged Access Management, and many others, and integrates with over 7,000 applications through the Okta Integration Network.

The BOTS Okta Partner Experience plunges you into a day managing the SOC at Coffeecase, a Bay-area startup that markets curated coffee subscription boxes to under-caffeinated consumers worldwide. Similar to our past Frothly scenarios in BOTS, Coffeecase has a “bad day” on July 28th, 2022, where they come under attack by various interesting adversaries. These adversaries are leveraging modern identity-based attacks. You’ll investigate failed logins, MFA factors, automatic identity lifecycle provisioning functions, Okta sign-on policies at the global and application level, session cookie re-use attacks, and many other realistic pieces of data.

Not familiar with Okta data or identity and access management? Don’t worry! There are plenty of hints available as you go through the 20 questions. We’ve allocated two hours, but you can always come back later and play again.

We’re excited for you to check out the Okta Partner Experience on bots.splunk.com. And we’d be remiss not to mention: the scenario, questions, and dataset were masterminded by a team of summer interns at Okta, led by Cornell University CS student Michelle Prior. The experience and related questions will give you a very complete picture of how Okta data can augment detection and hunting against this data in Splunk Enterprise (and could be used in the same way in Splunk Cloud Platform!) This data can be augmented and refreshed to represent additional scenarios in the future.

And by the way, if you’re looking for some out-of-the-box detection content for Okta data that you can use in Splunk Enterprise Security, please check out the October 4, 2022 release of Enterprise Security Content Update, brought to you by the Splunk Threat Research Team. They’ve added eight new and three updated Okta detections, all of which will work against the very same data from Okta’s system log that you will experience in the Partner Experience!

Related Articles

Predicting Cyber Fraud Through Real-World Events: Insights from Domain Registration Trends
Security
12 Minute Read

Predicting Cyber Fraud Through Real-World Events: Insights from Domain Registration Trends

By analyzing new domain registrations around major real-world events, researchers show how fraud campaigns take shape early, helping defenders spot threats before scams surface.
When Your Fraud Detection Tool Doubles as a Wellness Check: The Unexpected Intersection of Security and HR
Security
4 Minute Read

When Your Fraud Detection Tool Doubles as a Wellness Check: The Unexpected Intersection of Security and HR

Behavioral analytics can spot fraud and burnout. With UEBA built into Splunk ES Premier, one data set helps security and HR reduce risk, retain talent, faster.
Splunk Security Content for Threat Detection & Response: November Recap
Security
1 Minute Read

Splunk Security Content for Threat Detection & Response: November Recap

Discover Splunk's November security content updates, featuring enhanced Castle RAT threat detection, UAC bypass analytics, and deeper insights for validating detections on research.splunk.com.
Security Staff Picks To Read This Month, Handpicked by Splunk Experts
Security
2 Minute Read

Security Staff Picks To Read This Month, Handpicked by Splunk Experts

Our Splunk security experts share their favorite reads of the month so you can follow the most interesting, news-worthy, and innovative stories coming from the wide world of cybersecurity.
Behind the Walls: Techniques and Tactics in Castle RAT Client Malware
Security
10 Minute Read

Behind the Walls: Techniques and Tactics in Castle RAT Client Malware

Uncover CastleRAT malware's techniques (TTPs) and learn how to build Splunk detections using MITRE ATT&CK. Protect your network from this advanced RAT.
AI for Humans: A Beginner’s Field Guide
Security
12 Minute Read

AI for Humans: A Beginner’s Field Guide

Unlock AI with the our beginner's field guide. Demystify LLMs, Generative AI, and Agentic AI, exploring their evolution and critical cybersecurity applications.
Splunk Security Content for Threat Detection & Response: November 2025 Update
Security
5 Minute Read

Splunk Security Content for Threat Detection & Response: November 2025 Update

Learn about the latest security content from Splunk.
Operation Defend the North: What High-Pressure Cyber Exercises Teach Us About Resilience and How OneCisco Elevates It
Security
3 Minute Read

Operation Defend the North: What High-Pressure Cyber Exercises Teach Us About Resilience and How OneCisco Elevates It

The OneCisco approach is not about any single platform or toolset; it's about fusing visibility, analytics, and automation into a shared source of operational truth so that teams can act decisively, even in the fog of crisis.
Data Fit for a Sovereign: How to Consider Sovereignty in Your Digital Resilience Strategy
Security
5 Minute Read

Data Fit for a Sovereign: How to Consider Sovereignty in Your Digital Resilience Strategy

Explore how digital sovereignty shapes resilient strategies for European organisations. Learn how to balance control, compliance, and agility in your data infrastructure with Cisco and Splunk’s flexible, secure solutions for the AI era.