Identity Protection Quick Reference
Identity Protection Quick Reference
Identity Protection Quick Reference
PROTECTION Q U IC K
REFERENCE
Use case examples for IT, security, the end user
and Identity Access Management (IAM)
IT END-USER
Identify unused servers or most accessed Actively get notified on the endpoint when
servers by analyzing authentication footprint action is needed
Detect use of weak authentication protocols Empowered to continue with their business,
such as NTLM V1, unencrypted LDAP and reducing the friction level that security may
misconfigurations of the domain introduce
Build user behavioral profiles that can help Analysis of the domain security posture with
understand the access patterns for human dynamic objectives such as prep for pen
and programmatic accounts testing audit or reduction of attack surface
Detect anomalous user behavior Active threat hunting interface with quick
access to authorization and authentication
events
Identify users segments such as how many
are human, how many are programmatic, how
many are privileged or have stealthy Real time automatic detection of deviation
privileges, and from baseline for authenticated users that
may indicate compromised account activity
or take over
Apply a policy to prevent some of the issues
continuously
Reduction of noise because users can
approve their access when there are
deviations from normal behavior