Skip to content

Commit 14bf634

Browse files
authored
Merge branch 'public' into patch-2
2 parents e539cdf + 9b781d0 commit 14bf634

File tree

2 files changed

+9
-1
lines changed

2 files changed

+9
-1
lines changed

ATPDocs/assign-multi-factor-authentication-okta-privileged-user-accounts.md

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -12,6 +12,11 @@ ms.reviewer: Himanch
1212

1313
This report lists any Okta privileged accounts that don't have any multifactor authentication (MFA) methods assigned. 
1414

15+
## Prerequisites
16+
17+
To use this security assessment, you must first connect your Okta instance in the Microsoft Defender portal.
18+
For setup instructions, see [Connect your Okta instance](/defender-for-identity/okta-integration#connect-okta-to-defender-for-identity).
19+
1520
## Why is a privileged account without MFA a security risk?
1621

1722
All privileged accounts should have multifactor authentication (MFA) enabled to strengthen security. By ensuring that privileged accounts such as Super Admin or Org Admin roles are secured with MFA, organizations can significantly reduce the risk of unauthorized access from compromised credentials. This strategy helps prevent attackers from gaining elevated access, safeguarding sensitive resources and protecting critical administrative functions from abuse.

CloudAppSecurityDocs/discovered-apps.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -67,10 +67,13 @@ You also might want to identify specific app instances that are in use by invest
6767
:::image type="content" source="media/discovered-apps/subdomains-image.png" alt-text="Subdomain filter.":::
6868

6969
> [!NOTE]
70-
> Deep dives into discovered apps are supported only in firewalls and proxies that contain target URL data. For more information, see [Supported firewalls and proxies](set-up-cloud-discovery.md#supported-firewalls-and-proxies).
70+
> The feature of discovered subdomains will be deprecated by Sep 31st, 2025. Post this, no support for discovery subdomains will be provided.
71+
>
72+
> Deep dives into discovered apps are supported only in firewalls and proxies that contain target URL data. For more information, see [Supported firewalls and proxies](set-up-cloud-discovery.md#supported-firewalls-and-proxies).
7173
>
7274
> If Defender for Cloud Apps can't match the subdomain detected in the traffic logs with the data stored in the app catalog, the subdomain is tagged as **Other**.
7375
76+
7477
## Discover resources and custom apps
7578

7679
Cloud discovery also enables you to dive into your IaaS and PaaS resources. Discover activity across your resource-hosting platforms, viewing access to data across your self-hosted apps and resources including storage accounts, infrastructure and custom apps hosted on Azure, Google Cloud Platform, and AWS. Not only can you see overall usage in your IaaS solutions, but you can get visibility into the specific resources that are hosted on each, and the overall usage of the resources, to help mitigate risk per resource.

0 commit comments

Comments
 (0)