You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: ATPDocs/okta-defender-for-identity-overview.md
+7-44Lines changed: 7 additions & 44 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -17,52 +17,15 @@ When you connect Okta to Microsoft Defender for Identity, you can extend your id
17
17
18
18
With Okta connected, Defender for Identity provides the following capabilities:
19
19
20
-
### View Okta accounts in the Identity Inventory
21
20
22
-
Defender for Identity adds Okta users to the identity inventory in the Microsoft Defender portal. These accounts correlate with matching identities from Active Directory or Microsoft Entra ID, which allows unified tracking across platforms.
21
+
|Capability |Description |
22
+
|---------|---------|
23
+
|View Okta accounts in the Identity Inventory | Defender for Identity adds Okta users to the identity inventory in the Microsoft Defender portal. These accounts correlate with matching identities from Active Directory or Microsoft Entra ID, which allows unified tracking across platforms. |
24
+
|Improve Okta security posture | Defender for Identity evaluates identity configuration in Okta and surfaces posture recommendations in Microsoft Secure Score. Example recommendations include: <br> - [Assign multifactor authentication to Okta privileged user accounts](assign-multi-factor-authentication-okta-privileged-user-accounts.md) <br> - [Change password for Okta privileged user accounts](change-okta-password-privileged-user-accounts.md) <br> - [High number of Okta accounts with privileged role assigned](high-number-of-okta-accounts-with-privileged-role-assigned.md) <br> - [Highly privileged Okta API token](highly-privileged-okta-api-token.md) <br> - [Limit the number of Okta Super Admin accounts](limit-number-okta-super-admin-accounts.md) <br> - [Remove dormant Okta privileged accounts](remove-dormant-okta-privileged-accounts.md)|
25
+
|Get alerts on suspicious Okta activity | Defender for Identity alerts you when it detects high-risk behavior in Okta, including anonymous sign-ins, privileged role assignments, and token abuse. These alerts are available in Microsoft Defender XDR. When connected, Defender for Identity raises the following alerts based on Okta activity: <br> - Okta anonymous user access <br> - Privileged API token created <br> - Privileged API token updated <br> - Privileged Role assignment to Application <br> - Suspicious privileged role assignment <br> For a full list of supported alerts, see: [Defender for Identity XDR alerts](/defender-for-identity/alerts-xdr#initial-access-alerts)|
26
+
|Use advanced hunting to investigate Okta activity | Advanced hunting lets you investigate identity activity across different services including Okta, Active Directory, and Microsoft Entra ID. <br> The **IdentityInfo** table includes account metadata such as privilege level, group membership, and identity source. The **IdentityEvents** table includes events related to those identities, such as sign-ins, authentication attempts, and identity-related alerts across supported identity providers. <br> To explore the full schema and build your own queries, see: <br> - [IdentityInfo ](/defender-xdr/advanced-hunting-identityinfo-table) <br> - [IdentityEvents(Preview)](/defender-xdr/advanced-hunting-identityevents-table). |
27
+
|Take remediation actions | When Microsoft Defender for Identity identifies an identity as at risk, you can take the following remediation actions directly from the Defender portal to update the user's status in Okta. <br> - Revoke all user's sessions <br> - Deactivate user in Okta <br> - Set user risk in Okta <br> For more information, see: [Remediation actions in Microsoft Defender for Identity](remediation-actions.md#roles-and-permissions)|
23
28
24
-
### Improve Okta security posture
25
-
26
-
Defender for Identity evaluates identity configuration in Okta and surfaces posture recommendations in Microsoft Secure Score. Example recommendations include:
27
-
28
-
-[Assign multifactor authentication to Okta privileged user accounts](assign-multi-factor-authentication-okta-privileged-user-accounts.md)
29
-
-[Change password for Okta privileged user accounts](change-okta-password-privileged-user-accounts.md)
30
-
-[High number of Okta accounts with privileged role assigned](high-number-of-okta-accounts-with-privileged-role-assigned.md)
31
-
-[Highly privileged Okta API token](highly-privileged-okta-api-token.md)
32
-
-[Limit the number of Okta Super Admin accounts](limit-number-okta-super-admin-accounts.md)
Defender for Identity alerts you when it detects high-risk behavior in Okta, including anonymous sign-ins, privileged role assignments, and token abuse. These alerts are available in Microsoft Defender XDR. When connected, Defender for Identity raises the following alerts based on Okta activity:
38
-
39
-
- Okta anonymous user access
40
-
- Privileged API token created
41
-
- Privileged API token updated
42
-
- Privileged Role assignment to Application
43
-
- Suspicious privileged role assignment
44
-
45
-
For a full list of supported alerts, see: [Defender for Identity XDR alerts](/defender-for-identity/alerts-xdr#initial-access-alerts)
46
-
47
-
### Use advanced hunting to investigate Okta activity
48
-
49
-
Advanced hunting lets you investigate identity activity across different services including Okta, Active Directory, and Microsoft Entra ID. The **IdentityInfo** table includes account metadata such as privilege level, group membership, and identity source. The **IdentityEvents** table includes events related to those identities, such as sign-ins, authentication attempts, and identity-related alerts across supported identity providers.
50
-
51
-
To explore the full schema and build your own queries, see:
When Microsoft Defender for Identity identifies an identity as at risk, you can take the following remediation actions directly from the Defender portal to update the user's status in Okta.
58
-
59
-
- Revoke all user's sessions
60
-
61
-
- Deactivate user in Okta
62
-
63
-
- Set user risk in Okta
64
-
65
-
For more information, see: [Remediation actions in Microsoft Defender for Identity](remediation-actions.md#roles-and-permissions)
0 commit comments