Risk detections

Learn what risk detections mean and how to automate your response to them with the entity risk policy.

Surfacing risks in your org reduces exposure: suspected attackers are quickly blocked from accessing apps, and notifications allow for review and remediation. Then, automate the response to ensure faster initialization of mitigation steps and reduce users' dependence on your help desk.

How to use these resources

Risk detections are the types of tactics, techniques, and procedures used for attacking identities. ITP surfaces risk detections within user.risk.detect events in the System Log, so your security teams have better visibility into malicious patterns and trends. This helps them determine when more security measures are required.

Each resource contains sections for the detection context, risk level, policy configuration, and remediation strategy. Review the context to understand the conditions that lead to each detection. High-risk detections indicate an elevated likelihood of suspicious user activity. Use the policy configuration section to automate the response, and then follow the steps for remediation.

Detections

Detection

Risk level

Summary

Breached credential detected High A username and password combination used to sign in to your Okta org has appeared in a third-party list of publicly available data breaches.
Entity critical action from high threat IP High A user performs a sensitive, critical action from an IP address that Okta ThreatInsight has flagged as being a high threat.
Okta Threat Intelligence High Okta identifies activity from infrastructure used by threat actors.
Suspicious login from an IP flagged by FastPass High A successful sign-in event has originated from an IP address that Okta FastPass previously flagged in a phishing attempt.
Suspicious login from an IP flagged in a credential based attack High An IP address previously involved in a high-volume failed login attack is used for to sign in to your org.
This wasn't me High A user actively reports a security event as fraudulent.
Session influenced user risk Medium A user's session risk level changes to High.
Suspected brute force attack Medium Okta observes a high rate of failed password or MFA-based sign-in attempts.
Suspicious app access Medium Okta detects an attacker's attempts to harvest app (service provider) session cookies.
Admin reported user risk Low, Medium, or High An admin manually changes a user's risk level to Low, Medium, or High.
Security events provider reported risk Low, Medium, or High An integrated security partner sends a signal to Okta through the Shared Signals Framework (SSF).