Detection settings for entity risk policy

Learn what configuration settings to use when you define conditions and actions in your entity risk policy rules.

In the table below, check what entity risk level goes with each detection type. When you define your rule conditions, select the detection and then select the matching entity risk level.

Detection

Risk levels

Recommended action

This wasn't me

The user reported an incident by responding to an Okta-generated security notification email, or by clicking Report on the Recent Activity page of the Okta End-User Dashboard.

High Universal Logout. See Configure Universal Logout for third-party apps.
Session influenced User Risk

The entity risk level changed because of a change in session context. This detection only occurs when the session risk level is High.

Medium Run a delegated Workflow or don't take any action.
Suspected Brute Force Attack Medium Run a delegated Workflow that notifies the Security Operations Center (SOC) team to start an investigation.
Okta Threat Intelligence High

You can also take the following actions manually:

  • Force a password change
  • Force re-enrollment in authenticators
Admin Reported User Risk

The admin changed the entity risk level to High.

Low

High

Universal Logout. See Configure Universal Logout for third-party apps.
Entity Critical Action From High Threat IP

Okta detected suspicious behavior from a high-threat IP address.

High Universal Logout. See Configure Universal Logout for third-party apps.
Security Events Provider Reported Risk Low

Medium

High

Run a delegated Workflow or don't take any action.
Suspicious App Access Medium Run a delegated Workflow that notifies the SOC team to start an investigation or don't take any action.

Related topics

Risk detections

Add an entity risk policy rule

Enforce Post auth session

Session Violation Report

System Log events for Identity Threat Protection