Monitor Identity Threats and Risk Profiles in ITP

Use this guide to analyze Identity Threat Protection (ITP) data using reports, widgets, and system logs to monitor risk profiles and session violations.

rate limit

Code not recognized.

About this course

Understanding the risk profile of users and identifying the source and pattern of detected threats is critical for security posture management. This guide outlines how to utilize the various components of Identity Threat Protection (ITP), including dashboard widgets, dedicated reports, and System Log Events, to gain a comprehensive view of system detection and event logs. ITP Observability allows administrators to review risk profiles, track session violations, and identify high-risk users. 
This resource is designed for Security Analysts, Okta Administrators, and Compliance Officers who need to review and analyze ITP data to observe violation numbers and risk patterns over time.

About this course

Understanding the risk profile of users and identifying the source and pattern of detected threats is critical for security posture management. This guide outlines how to utilize the various components of Identity Threat Protection (ITP), including dashboard widgets, dedicated reports, and System Log Events, to gain a comprehensive view of system detection and event logs. ITP Observability allows administrators to review risk profiles, track session violations, and identify high-risk users. 
This resource is designed for Security Analysts, Okta Administrators, and Compliance Officers who need to review and analyze ITP data to observe violation numbers and risk patterns over time.