Detections

Early Access release

Detections are the security risks that Okta can watch for as part of protecting your org. They include reports of suspicious activity submitted by admins, users, or security events providers. Others are generated by Okta when it detects suspicious patterns while monitoring your org.

You can select a detection when you configure an entity risk policy rule. If Okta finds the detection you selected, you can remediate it by following the actions in the Recommended action column in the table. These are actions that Okta recommends for each situation. Ensure that these actions are appropriate for your org before implementing them.

You can also select a risk level. You can only select a risk level that's usable by the detection you selected. Refer to the table to find your detection, and then select the usable risk level for it when you configure your entity risk policy rule.

See Add an entity risk policy rule.

Name Description

Usable risk levels

Recommended action

User reported suspicious activity The user reported an incident by responding to an Okta-generated security notification email, or by clicking Report on the Recent Activity page of the Okta End-User Dashboard. High Universal Logout. See Configure Universal Logout for third-party apps.
Session influenced User Risk The entity risk level was changed because of a change in session context. This detection only occurs when the session risk level is High. Medium
  • No response
  • Run a delegated Workflow
Suspected Brute Force Attack Okta detected signs of a potential brute-force attack. Medium Run a delegated Workflow that notifies the Security Operations Center (SOC) team to start an investigation
Okta Threat Intelligence Okta Threat Intelligence detected potentially suspicious behavior. High
Admin Reported User Risk The Admin changed the entity risk level to High. Low

High

Universal Logout. See Configure Universal Logout for third-party apps.
Entity Critical Action From High Threat IP Okta detected suspicious behavior from a high-threat IP address. High Universal Logout. See Configure Universal Logout for third-party apps.
Security Events Provider Reported Risk A security events provider reported a risk-level event. Low

Medium

High

  • No response
  • Run a delegated Workflow
Suspicious App Access Okta detected suspicious attempts to access an app. Medium
  • No response
  • Run a delegated Workflow that notifies the SOC team to start an investigation

Types of detections

With Identity Threat Protection, the data-driven Okta risk engine calculates three types of risk and assigns a level of low, medium, or high.

Login risk

Before a user can sign in to your org, Okta evaluates the sign-in attempt against the rules in your org's global session policy to identify login risk. The evaluation determines if the user's behavior or device information has changed since they last signed in, and it determines if the request comes from a malicious IP address. Then Okta calculates the login risk level. Each time Okta calculates login risk, user.session.start and policy.evaluate_sign_on events appear in the System Log.

Session risk

Your org’s authentication policies and risk indicators are continuously evaluated throughout a user’s session to calculate a session risk level. This level determines if the user’s session is possibly compromised. A session risk level of medium or high might indicate a brute-force attack or suspicious app access. A session risk level is also calculated when one of your security events providers reports a risk. Each time Okta calculates a session risk level, a user.session.context.change event appears in PeopleRisk and in the System Log.

Entity risk

Your entity risk policy continuously evaluates signals from all of your org’s threat surfaces, including your Shared Signals Framework integrations, and calculates an entity risk level. This level represents the probability of identity compromise for a user. An entity risk level is also calculated when one of your security events providers reports a user-related risk. Each time Okta calculates an entity risk level, a user.risk.change event appears in PeopleRisk and in the System Log.

Related topics

Enforce Continuous Access

Continuous Access violation report

System Log events for Identity Threat Protection with Okta AI