Weak authentication allows threat actors to use legitimate accounts to access systems and possibly steal sensitive information.
Authentication issues can result from unintentional misconfiguration of account settings
or
malicious behaviors involving Active Directory and Microsoft Entra ID.
The following table outlines the actions you can perform on the widget:
Action
|
Description
|
View authentication-related statistics and recommendations
|
|
View information about accounts with weak authentication
|
|
Create dismissed rules
|
If you are unable to implement the best practices to remediate a related risk event,
you can create a dismissed rule to prevent future instances of the risk event from
being reported and affecting your organization's Cyber Risk Index. However, creating
a dismissed rule might limit the information provided by Cyber Risk Exposure Management.
To view and manage dismissed rules, go to Event Rule Management.
|