Skip to content

Commit 3904448

Browse files
committed
Add a prerequisite to the Okta ISPM report
1 parent 7240c5c commit 3904448

File tree

1 file changed

+5
-0
lines changed

1 file changed

+5
-0
lines changed

ATPDocs/assign-multi-factor-authentication-okta-privileged-user-accounts.md

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -12,6 +12,11 @@ ms.reviewer: Himanch
1212

1313
This report lists any Okta privileged accounts that don't have any multifactor authentication (MFA) methods assigned. 
1414

15+
## Prerequisites
16+
17+
To use this security assessment, you must first connect your Okta instance in the Microsoft Defender portal.
18+
For setup instructions, see [Connect your Okta instance](/defender-for-identity/okta-integration#connect-okta-to-defender-for-identity).
19+
1520
## Why is a privileged account without MFA a security risk?
1621

1722
All privileged accounts should have multifactor authentication (MFA) enabled to strengthen security. By ensuring that privileged accounts such as Super Admin or Org Admin roles are secured with MFA, organizations can significantly reduce the risk of unauthorized access from compromised credentials. This strategy helps prevent attackers from gaining elevated access, safeguarding sensitive resources and protecting critical administrative functions from abuse.

0 commit comments

Comments
 (0)