Duo's Risk-Based Authentication

Duo's Risk-Based Authentication

This course will explain what risk-based authentication is and its benefits. You will also learn where and how to deploy risk-based authentication features by applying Duo policies to specific applications or groups of users.

rate limit

Code not recognized.

About this course

Risk-based authentication provides organizations with the highest level of security and user convenience. Risk-based authentication follows the zero trust philosophy of continuous trust by assessing the risk-level of each login attempt to evaluate the necessary steps for authentication. Based on contextual risk, risk-based authentication dynamically reduces friction for low-risk devices and increases friction for high-risk devices, all while protecting user privacy.  

This course will explain what risk-based authentication is and its benefits. You will also learn where and how to deploy risk-based authentication features by applying Duo policies to specific applications or groups of users.  

Duo Security offers risk-based authentication policies such as risk-based factor selection and risk-based remembered devices. We’ll cover how to monitor these policies within the Duo Admin Panel, as well as common use cases and signals used to mitigate risk.  

By the end of this course, you should be able to:  

  • Identify known attack patterns or anomalies considered high risk.  
  • Utilize the Duo Admin Panel in order to enable risk-based factor selection and risk-based remembered devices policies for an application. 
  • Locate logging and monitoring of risk-based authentication policies in the Duo Admin Panel.   

Curriculum

  • Introduction to Risk-Based Authentication
  • Course Introduction
  • Risk-Based Authentication Overview
  • Module Overview
  • What is Risk-Based Authentication and Why is it Important?
  • Benefits of Risk-Based Authentication
  • Risk-Based Authentication Flow
  • Known Attack Patterns and Anomalies
  • Demo: Duo’s Risk-Based Authentication Solutions
  • Risk-Based Authentication Overview Knowledge Check
  • Risk-Based Authentication Policies
  • Module Overview
  • Risk-Based Factor Selection
  • Risk-Based Factor Selection: Verified Duo Push
  • Risk-Based Remembered Devices
  • Risk-Based Remembered Devices: Wi-Fi Fingerprint
  • Risk-Based Authentication Policies Knowledge Check
  • Monitoring and Logging
  • Module Overview
  • Authentication Logs with Trust Assessment
  • Demo: Authentication Logs with Trust Assessment
  • Risk-Based Authentication: Monitoring and Logging Knowledge Check
  • Course Conclusion
  • Course Overview
  • Final Assessment
  • Share Feedback
  • Take the Next Step

About this course

Risk-based authentication provides organizations with the highest level of security and user convenience. Risk-based authentication follows the zero trust philosophy of continuous trust by assessing the risk-level of each login attempt to evaluate the necessary steps for authentication. Based on contextual risk, risk-based authentication dynamically reduces friction for low-risk devices and increases friction for high-risk devices, all while protecting user privacy.  

This course will explain what risk-based authentication is and its benefits. You will also learn where and how to deploy risk-based authentication features by applying Duo policies to specific applications or groups of users.  

Duo Security offers risk-based authentication policies such as risk-based factor selection and risk-based remembered devices. We’ll cover how to monitor these policies within the Duo Admin Panel, as well as common use cases and signals used to mitigate risk.  

By the end of this course, you should be able to:  

  • Identify known attack patterns or anomalies considered high risk.  
  • Utilize the Duo Admin Panel in order to enable risk-based factor selection and risk-based remembered devices policies for an application. 
  • Locate logging and monitoring of risk-based authentication policies in the Duo Admin Panel.   

Curriculum

  • Introduction to Risk-Based Authentication
  • Course Introduction
  • Risk-Based Authentication Overview
  • Module Overview
  • What is Risk-Based Authentication and Why is it Important?
  • Benefits of Risk-Based Authentication
  • Risk-Based Authentication Flow
  • Known Attack Patterns and Anomalies
  • Demo: Duo’s Risk-Based Authentication Solutions
  • Risk-Based Authentication Overview Knowledge Check
  • Risk-Based Authentication Policies
  • Module Overview
  • Risk-Based Factor Selection
  • Risk-Based Factor Selection: Verified Duo Push
  • Risk-Based Remembered Devices
  • Risk-Based Remembered Devices: Wi-Fi Fingerprint
  • Risk-Based Authentication Policies Knowledge Check
  • Monitoring and Logging
  • Module Overview
  • Authentication Logs with Trust Assessment
  • Demo: Authentication Logs with Trust Assessment
  • Risk-Based Authentication: Monitoring and Logging Knowledge Check
  • Course Conclusion
  • Course Overview
  • Final Assessment
  • Share Feedback
  • Take the Next Step