Amplifier Findings by Security Integration Vendor
For each security integration, Amplifier generates findings based on the vendors’ recommended user security related risks, gaps and alerts.
Findings identify what risky user posture or activity is tracked using the data provided by our integrations.
Amplifier offers the following native findings based on integrated vendors’ default policies. These findings are enabled by default and require no further configuration. You can also create custom findings from any external platform (eg. SIEM, DLP, MDR) to detect anomalous user activity using webhook based triggers that you have set up in those platforms.
Okta
MFA Not Enabled
Weak MFA Factor
MFA Factors Deactivated
MFA Bypass Attempt
User Has Privilege Access
User Is An Executive
User Has Production Access
Password Change Failed
User Reset Password
Access Request Granted
Access Request Denied
Account Locked Out
Privilege Access Granted
Security Breached Credential Detected
Application Not Used
Account Locked With Unsuccesful Logon Limit
Impossible Travel
Account logged in from New Device
Account logged into New State
Account logged in from New Country
Account logged in from New IP
App Access Request Approved
App Access Request Granted
Security Threat Detected
Device Local Account Created
Device Temporarily Disabled
Microsoft Entra
MFA Not Enabled
MFA Not Secure
Weak MFA Factor
User Is An Executive
User Has Privilege Access
User Has Production Access
User Compromised
Strong Authentication Disabled
User not Logged into Application
User Account Locked Out
User Reset Password
Password Change Failed
Unlikely Travel
Login from Malicious IP Address
Login from Risky Anonymized IP Address
Device Temporarily Disabled
Account logged into New State
Google IAM
MFA Not Enabled
MFA Not Secure
User Is An Executive
User Has Privilege Access
User Has Production Access
Crowdstrike
Endpoint Protection Missing
Device CheckIn Overdue
Critical Vulnerability Out of SLA
High Vulnerability Out of SLA
Medium Vulnerability Out of SLA
Low Vulnerability Out of SLA
Malicious File Execution
Suspicious Macros (Phishing)
Download from Risky Websites
USB or External Media Malware Execution
SentinelOne
Endpoint Protection Missing
Device CheckIn Overdue
Critical Vulnerability Out of SLA
High Vulnerability Out of SLA
Medium Vulnerability Out of SLA
Low Vulnerability Out of SLA
Tenable
Endpoint Protection Missing
Device CheckIn Overdue
Critical Vulnerability Out of SLA
High Vulnerability Out of SLA
Medium Vulnerability Out of SLA
Low Vulnerability Out of SLA
Rapid7
Endpoint Protection Missing
Device CheckIn Overdue
Critical Vulnerability Out of SLA
High Vulnerability Out of SLA
Medium Vulnerability Out of SLA
Low Vulnerability Out of SLA
Jamf
Endpoint Protection Missing
Device CheckIn Overdue
Firewall Disabled
Screensaver Disabled
Device Not Encrypted
Kandji
Endpoint Protection Missing
Device CheckIn Overdue
OS Update Available
Software Update Available
Automox
Endpoint Protection Missing
Device CheckIn Overdue
Carbon Black
Endpoint Protection Missing
Device CheckIn Overdue
Critical Vulnerability Out of SLA
High Vulnerability Out of SLA
Medium Vulnerability Out of SLA
Low Vulnerability Out of SLA
Workspace One
Endpoint Protection Missing
Device CheckIn Overdue
Microsoft Intune
Endpoint Protection Missing
Device CheckIn Overdue
Microsoft Defender
Endpoint Protection Missing
Device CheckIn Overdue
Critical Vulnerability Out of SLA
High Vulnerability Out of SLA
Medium Vulnerability Out of SLA
Low Vulnerability Out of SLA
KnowBe4
Failed Phishing
Training Overdue
Litmos
Training Overdue
Proof Point
Top Clicker
Very Attacked Person
Qualys
Endpoint Protection Missing
Device CheckIn Overdue
Critical Vulnerability Out of SLA
High Vulnerability Out of SLA
Medium Vulnerability Out of SLA
Low Vulnerability Out of SLA
Rapid7
Endpoint Protection Missing
Device CheckIn Overdue
Critical Vulnerability Out of SLA
High Vulnerability Out of SLA
Medium Vulnerability Out of SLA
Low Vulnerability Out of SLA
Was this article helpful?
That’s Great!
Thank you for your feedback
Sorry! We couldn't be helpful
Thank you for your feedback
Feedback sent
We appreciate your effort and will try to fix the article