Skip to content

Commit e154c68

Browse files
punctuation fix
1 parent 310ff15 commit e154c68

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

ATPDocs/okta-defender-for-identity-overview.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -26,9 +26,9 @@ With Okta connected, Defender for Identity provides the following capabilities:
2626
|---------|---------|
2727
|View Okta accounts in the Identity Inventory | Defender for Identity adds Okta users to the identity inventory in the Microsoft Defender portal. These accounts correlate with matching identities from Active Directory or Microsoft Entra ID, to allow unified tracking across platforms. |
2828
|Improve Okta security posture | Defender for Identity evaluates identity configuration in Okta and surfaces posture recommendations in Microsoft Secure Score. Example recommendations include: <br> - [Assign multifactor authentication to Okta privileged user accounts](assign-multi-factor-authentication-okta-privileged-user-accounts.md) <br> - [Change password for Okta privileged user accounts](change-okta-password-privileged-user-accounts.md) <br> - [High number of Okta accounts with privileged role assigned](high-number-of-okta-accounts-with-privileged-role-assigned.md) <br> - [Highly privileged Okta API token](highly-privileged-okta-api-token.md) <br> - [Limit the number of Okta Super Admin accounts](limit-number-okta-super-admin-accounts.md) <br> - [Remove dormant Okta privileged accounts](remove-dormant-okta-privileged-accounts.md) |
29-
|Get alerts on suspicious Okta activity | Defender for Identity alerts you when it detects high-risk behavior in Okta, including anonymous sign-ins, privileged role assignments, and token abuse. These alerts are available in Microsoft Defender XDR. When connected, Defender for Identity raises the following alerts based on Okta activity: <br> - Okta anonymous user access <br> - Privileged API token created <br> - Privileged API token updated <br> - Privileged Role assignment to Application <br> - Suspicious privileged role assignment <br> For a full list of supported alerts, see: [Defender for Identity XDR alerts](/defender-for-identity/alerts-xdr#initial-access-alerts) |
29+
|Get alerts on suspicious Okta activity | Defender for Identity alerts you when it detects high-risk behavior in Okta, including anonymous sign-ins, privileged role assignments, and token abuse. These alerts are available in Microsoft Defender XDR. When connected, Defender for Identity raises the following alerts based on Okta activity: <br> - Okta anonymous user access <br> - Privileged API token created <br> - Privileged API token updated <br> - Privileged Role assignment to Application <br> - Suspicious privileged role assignment <br> For a full list of supported alerts, see: [Defender for Identity XDR alerts](/defender-for-identity/alerts-xdr#initial-access-alerts). |
3030
|Use advanced hunting to investigate Okta activity | Advanced hunting lets you investigate identity activity across different services including Okta, Active Directory, and Microsoft Entra ID. <br> The **IdentityInfo** table includes account metadata such as privilege level, group membership, and identity source. <br> The **IdentityEvents** table includes events related to those identities, such as sign-ins, authentication attempts, and identity-related alerts across supported identity providers. <br> To explore the full schema and build your own queries, see: <br> - [IdentityInfo ](/defender-xdr/advanced-hunting-identityinfo-table) <br> - [IdentityEvents(Preview)](/defender-xdr/advanced-hunting-identityevents-table). |
31-
|Take remediation actions | When Microsoft Defender for Identity identifies an identity as at risk, you can take the following remediation actions directly from the Defender portal to update the user's status in Okta. <br> - Revoke all user's sessions <br> - Deactivate user in Okta <br> - Set user risk in Okta <br> For more information, see: [Remediation actions in Microsoft Defender for Identity](remediation-actions.md#roles-and-permissions) |
31+
|Take remediation actions | When Microsoft Defender for Identity identifies an identity as at risk, you can take the following remediation actions directly from the Defender portal to update the user's status in Okta. <br> - Revoke all user's sessions <br> - Deactivate user in Okta <br> - Set user risk in Okta <br> For more information, see: [Remediation actions in Microsoft Defender for Identity](remediation-actions.md#roles-and-permissions). |
3232

3333

3434
## Next steps

0 commit comments

Comments
 (0)