Monitor threat insight settings
Report unrecognized account email activity, create an evolving list of suspicious IP addresses, and activate suspicious activity reporting.
×
×
Secure connected apps
Reduce reliance on password-based authentication:
- Implement role-based access control
- Enforce modern authentication protocols
Detect active users to deprovision
Identify users who have been deprovisioned in Okta but retained local access to the different SaaS applications.
×