You are on page 1of 1

FALCON IDENTITY

PROTECTION Q U IC K
REFERENCE
Use case examples for IT, security, the end user
and Identity Access Management (IAM)

IT END-USER

Know how many accounts are active or stale,


how many unmanaged endpoints exist in the Take active part of the enterprise security
domain, and in general gain better fabric by being able to approve their own
understanding of the domain attack surface access and help reduce noise levels

Identify unused servers or most accessed Actively get notified on the endpoint when
servers by analyzing authentication footprint action is needed

Detect use of weak authentication protocols Empowered to continue with their business,
such as NTLM V1, unencrypted LDAP and reducing the friction level that security may
misconfigurations of the domain introduce

IDENTITY ACCESS MANAGEMENT SECURITY


(IAM)

Build user behavioral profiles that can help Analysis of the domain security posture with
understand the access patterns for human dynamic objectives such as prep for pen
and programmatic accounts testing audit or reduction of attack surface

Detect anomalous user behavior Active threat hunting interface with quick
access to authorization and authentication
events
Identify users segments such as how many
are human, how many are programmatic, how
many are privileged or have stealthy Real time automatic detection of deviation
privileges, and from baseline for authenticated users that
may indicate compromised account activity
or take over
Apply a policy to prevent some of the issues
continuously
Reduction of noise because users can
approve their access when there are
deviations from normal behavior

Orchestrate detection with SOAR via API


QUICK TIP
Automate enforcement with
simple policies based on
behavioral and deterministic
attributes

You might also like