Security Findings

Created by Shreyas Sadalgi, Modified on Wed, 7 Jan at 1:54 AM by Shreyas Sadalgi

Amplifier Findings by Security Integration Vendor


For each security integration, Amplifier generates findings based on the vendors’ recommended user security related risks, gaps and alerts.


Findings identify what risky user posture or activity is tracked using the data provided by our integrations. 

Amplifier offers the following native findings based on integrated vendors’ default policies. These findings are enabled by default and require no further configuration. You can also create custom findings from any external platform (eg. SIEM, DLP, MDR) to detect anomalous user activity using webhook based triggers that you have set up in those platforms.



Okta


MFA Not Enabled


Weak MFA Factor


MFA Factors Deactivated


MFA Bypass Attempt


User Has Privilege Access


User Is An Executive


User Has Production Access


Password Change Failed


User Reset Password


Access Request Granted


Access Request Denied


Account Locked Out


Privilege Access Granted


Security Breached Credential Detected


Application Not Used


Account Locked With Unsuccesful Logon Limit


Impossible Travel


Account logged in from New Device


Account logged into New State


Account logged in from New Country


Account logged in from New IP


App Access Request Approved


App Access Request Granted


Security Threat Detected


Device Local Account Created


Device Temporarily Disabled


Microsoft Entra


MFA Not Enabled


MFA Not Secure


Weak MFA Factor


User Is An Executive


User Has Privilege Access


User Has Production Access


User Compromised


Strong Authentication Disabled


User not Logged into Application


User Account Locked Out


User Reset Password


Password Change Failed


Unlikely Travel


Login from Malicious IP Address


Login from Risky Anonymized IP Address


Device Temporarily Disabled 


Account logged into New State


Google IAM


MFA Not Enabled


MFA Not Secure


User Is An Executive


User Has Privilege Access


User Has Production Access


Crowdstrike


Endpoint Protection Missing


Device CheckIn Overdue


Critical Vulnerability Out of SLA


High Vulnerability Out of SLA


Medium Vulnerability Out of SLA


Low Vulnerability Out of SLA 


Malicious File Execution


Suspicious Macros (Phishing)


Download from Risky Websites


USB or External Media Malware Execution 


SentinelOne


Endpoint Protection Missing


Device CheckIn Overdue


Critical Vulnerability Out of SLA


High Vulnerability Out of SLA


Medium Vulnerability Out of SLA


Low Vulnerability Out of SLA


Tenable


Endpoint Protection Missing


Device CheckIn Overdue


Critical Vulnerability Out of SLA


High Vulnerability Out of SLA


Medium Vulnerability Out of SLA


Low Vulnerability Out of SLA


Rapid7


Endpoint Protection Missing


Device CheckIn Overdue


Critical Vulnerability Out of SLA


High Vulnerability Out of SLA


Medium Vulnerability Out of SLA


Low Vulnerability Out of SLA


Jamf


Any Smart Group


Endpoint Protection Missing


Device CheckIn Overdue


Firewall Disabled


Screensaver Disabled


Device Not Encrypted


Kandji


Endpoint Protection Missing


Device CheckIn Overdue


OS Update Available


Software Update Available


Automox


Endpoint Protection Missing


Device CheckIn Overdue


Carbon Black


Endpoint Protection Missing


Device CheckIn Overdue


Critical Vulnerability Out of SLA


High Vulnerability Out of SLA


Medium Vulnerability Out of SLA


Low Vulnerability Out of SLA


Workspace One


Endpoint Protection Missing


Device CheckIn Overdue


Microsoft Intune


Endpoint Protection Missing


Device CheckIn Overdue


Microsoft Defender


Endpoint Protection Missing


Device CheckIn Overdue


Critical Vulnerability Out of SLA


High Vulnerability Out of SLA


Medium Vulnerability Out of SLA


Low Vulnerability Out of SLA


KnowBe4


Failed Phishing


Training Overdue


Litmos


Training Overdue


Proof Point


Top Clicker


Very Attacked Person


Qualys


Endpoint Protection Missing


Device CheckIn Overdue


Critical Vulnerability Out of SLA


High Vulnerability Out of SLA


Medium Vulnerability Out of SLA


Low Vulnerability Out of SLA


Rapid7


Endpoint Protection Missing


Device CheckIn Overdue


Critical Vulnerability Out of SLA


High Vulnerability Out of SLA


Medium Vulnerability Out of SLA


Low Vulnerability Out of SLA





Was this article helpful?

That’s Great!

Thank you for your feedback

Sorry! We couldn't be helpful

Thank you for your feedback

Let us know how can we improve this article!

Select at least one of the reasons
CAPTCHA verification is required.

Feedback sent

We appreciate your effort and will try to fix the article