Oort Knowledge Base
CtrlK
  • Home
  • Glossary
  • 📊Dashboard
  • 👥Understanding your users
  • 🗃️Applications
  • 💻Devices
  • Non-Human Identities (NHI)
  • 🧩Configuring Integrations
  • ☑️Understanding Check failures
    • 🔍Reviewing Check Results
    • 🧹Customizing Checks
    • 📖Cisco Identity Checks
      • Identity Posture Management Checks
      • Identity Threat Detection Insights
        • Non-Human Identity (NHI) Threat Checks
          • Access From Dormant Non-Human Identity
          • Admin Role Assigned to Non-Human Identity
          • Break-Glass Account Successful Sign In
          • Non-Human Identity with Interactive Browser Access
          • Service Account Successful Sign In
          • Service Principal Risk Detected
          • Shared Mailbox Successful Sign In
        • A Bypass Code Was Used To Successfully Sign In
        • Access From Dormant Account
        • Accounts With Unusually High Activity
        • Active Account Under Heavy Attack
        • Activity From Untrustworthy ISP
        • Admin Impersonation in Okta
        • Admin Role Assigned to User
        • Authenticator Registration Anomalies
        • Code Exfiltration By Guest Account
        • Compromised Session
        • Google Drive File with Excessive Sharing Permissions
        • Impossible Travel
        • IP Threat Detected
        • Login to Admin Console
        • MFA Flood
        • Microsoft Entra ID Admin Activity Anomaly
        • New Country for Tenant
        • New IDP Created
        • Okta Admin Activity Anomaly
        • Rare Browser Activity
        • Registered Location Mismatch
        • Risky Parallel Sessions
        • Sign In Threat Detected
        • Sign-in from Recently Created IdP
        • Successful Access from a Previously Only Failing IP
        • Super Admin Login to Google
        • Suspicious Activity Reported by End User
        • Unusual Repo Access
        • User IP in Blocked State
        • User Lock Out Risk Detected
        • User Trust Level Alert
        • Users With Defined Email Forward Rules
        • Users With New Email Forward Rules
        • Weak MFA Manually Activated and Utilized
  • ⚙️Tenant Settings
  • 🏥Identity Posture Score
  • 🚨User Trust Level
  • How-to Guides
  • Public API
  • Troubleshooting & Support
  • Best Practices
  • Blogs
  • Release Notes
Powered by GitBook
On this page
  1. ☑️Understanding Check failures
  2. 📖Cisco Identity Checks
  3. Identity Threat Detection Insights

Non-Human Identity (NHI) Threat Checks

This section contains the threat-related checks for Non-Human Identities (NHI)

PreviousIdentity Threat Detection InsightsNextAccess From Dormant Non-Human Identity

Last updated 30 minutes ago