Introduction to Duo Trust Monitor

Introduction to Duo Trust Monitor

Use insights from Duo Trust Monitor to investigate suspicious user and device behavior, diagnose weaknesses in access policies, and improve security posture.

rate limit

Code not recognized.

About this course

Account takeover is one of the most common methods attackers use to gain unauthorized access, yet the events that lead to account compromise can be difficult to identify. Duo Trust Monitor is a risk detection feature available in Duo Access and Beyond editions that uses machine learning to identify risky and abnormal behavior. 

By analyzing patterns of normal user and device access, Trust Monitor is able to identify suspicious events that differ from the typical actions taken by your end-users. Trust Monitor gives administrators deeper insight to detect and remediate access risk and apply these findings to improve policies and access requirements.

By the end of this course, you should be able to:

  • Enable Trust Monitor in the Duo Admin Panel
  • Configure a Risk Profile
  • Describe and interpret anomalous events surfaced by Trust Monitor
  • Use events detected by Trust Monitor to improve security posture, including:
    • Exporting Trust Monitor data to another security application, such as a SIEM
    • Strengthening access policy settings

Curriculum

  • Trust Monitor Overview
  • Video: How Does Anomaly Detection Work? (4:01)
  • Establishing a Baseline
  • Configuring Trust Monitor
  • Video: How to Create a Risk Profile (1:58)
  • Video: Types of Anomalies (4:35)
  • Types of Anomalous Behavior
  • Video: How to Process Security Events (3:29)
  • Processing Security Events
  • Improving Security Posture with Trust Monitor
  • Tips for Investigating and Responding to Events
  • Strengthening Access Policy Settings
  • Reviewing & Exporting Data
  • Taking the Next Step
  • Knowledge Check
  • Share Feedback: Optional
  • Course Complete

About this course

Account takeover is one of the most common methods attackers use to gain unauthorized access, yet the events that lead to account compromise can be difficult to identify. Duo Trust Monitor is a risk detection feature available in Duo Access and Beyond editions that uses machine learning to identify risky and abnormal behavior. 

By analyzing patterns of normal user and device access, Trust Monitor is able to identify suspicious events that differ from the typical actions taken by your end-users. Trust Monitor gives administrators deeper insight to detect and remediate access risk and apply these findings to improve policies and access requirements.

By the end of this course, you should be able to:

  • Enable Trust Monitor in the Duo Admin Panel
  • Configure a Risk Profile
  • Describe and interpret anomalous events surfaced by Trust Monitor
  • Use events detected by Trust Monitor to improve security posture, including:
    • Exporting Trust Monitor data to another security application, such as a SIEM
    • Strengthening access policy settings

Curriculum

  • Trust Monitor Overview
  • Video: How Does Anomaly Detection Work? (4:01)
  • Establishing a Baseline
  • Configuring Trust Monitor
  • Video: How to Create a Risk Profile (1:58)
  • Video: Types of Anomalies (4:35)
  • Types of Anomalous Behavior
  • Video: How to Process Security Events (3:29)
  • Processing Security Events
  • Improving Security Posture with Trust Monitor
  • Tips for Investigating and Responding to Events
  • Strengthening Access Policy Settings
  • Reviewing & Exporting Data
  • Taking the Next Step
  • Knowledge Check
  • Share Feedback: Optional
  • Course Complete