Password reset tokens

Detects password reset tokens and recovery URLs in documents, emails, and logs. Reset tokens are high-risk credentials — a leaked token enables account takeover without knowing the current password. No Microsoft built-in SIT exists for this pattern.

Type
regex
Engine
boost_regex
Confidence
medium
Confidence justification
Medium confidence: long random strings are common in URLs and logs. Reset-context keywords are essential to distinguish password recovery tokens from session IDs, API tokens, and other opaque identifiers.
Jurisdictions
global
Regulations
GDPR, CCPA, HIPAA, PCI-DSS
Frameworks
ISO 27001, NIST CSF, SOC 2
Data categories
credentials, security
Scope
wide
Risk rating
9
Platform compatibility
Purview: Compatible, GCP DLP: Compatible, Macie: Compatible, Zscaler: Compatible, Palo Alto: Compatible, Netskope: Unsupported

Pattern

(?:(?:reset|recover|forgot|confirm)[\s\-_]*(?:password|account|identity|email)[\s\S]{0,80}(?:token|code|key|link)[\s=:]\s*[A-Za-z0-9\-_]{20,}|(?:token|code|key)[\s=:]\s*[A-Fa-f0-9]{32,}|[?&](?:token|reset_token|recovery_token|confirmation_token)=[A-Za-z0-9\-_\.]{20,})

Corroborative evidence keywords

password reset, reset token, recovery token, forgot password, reset link, recovery link, confirmation token, reset your password, api key, api_key, apikey, access key, access token, auth token, authorization, bearer, conn str, connection string, connectionstring, cookie (+17 more)

Proximity: 300 characters

Should match

Should not match

Known false positives

References