Starling Identity Analytics & Risk Intelligence Hosted - User Guide

Starling Identity Analytics & Risk Intelligence Getting started Settings Collaborators Collector agents Licensing Rules Risk Verification Reports

Verifying high risk entitlement requests

The following procedure explains how verifiers respond to requests.

IMPORTANT: Once a request has been responded to there is no way to undo the decision within Starling Identity Analytics & Risk Intelligence; however, there is no impact on your data source. So a rule marked as requiring mitigation will not remove the user from the rule, and an approved verification will not stop a user from being removed from the rule within the data source.

To verify a high risk entitlement request

  1. Click Verification in the navigation bar to open the Verification page.
  2. Locate the request you want to verify and click Review.
  3. On the Verification Details page, review the request details (click Additional Information for more information regarding the entitlement). Select one of the following options depending on whether or not the request should be approved:
    • Yes, I understand the risk with this level of access and agree that <account name> should possess it: Selecting this option will approve the access level as being appropriate. The rule will now be marked as being verified for that user.
    • No, I do not believe <account name> should have such a high level of access and request it to be reviewed: Selecting this option will flag the access level as being inappropriate for the user. Any rules marked as requiring mitigation should be removed for the user within the data source.

      NOTE: Customers that use ServiceNow can create incident tickets for rejected requests. For more information, see Connecting with ServiceNow.
  4. Once you have selected the appropriate action for the rule, click Submit Response.

Reports

Topics:

Introduction to Reports

Customized reports can be generated and downloaded from Starling Identity Analytics & Risk Intelligence in order to view and preserve data outside of the cloud service as a CSV file.

The following reports are available:

IMPORTANT: Reports only cover data that is currently available within Starling Identity Analytics & Risk Intelligence. If you have a scheduled data collection occurring at the same time you request a report, the report will not include the data that has not yet finished being collected. Use the Data Source Modules page to check that data collection has completed and the time of the last update.

NOTE: Reports that have been generated will be retained within Starling Identity Analytics & Risk Intelligence for 30 days. Reports older than 30 days will be permanently deleted.

  • Weekly Summary: This report covers a high-level view of the previous 7 days from when the report was created. It includes general data regarding accounts, entitlements, rules, and data sources.
  • High Risk Accounts: This report covers information on the current high risk accounts.
  • Rules: This report covers information regarding the currently configured rules.
  • Verification: This report covers information regarding all requested verifications.

Reports page

IMPORTANT: Reports only cover data that is currently available within the Starling Identity Analytics & Risk Intelligence. If you have a scheduled data collection occurring at the same time you request a report, the report will not include the data that has not yet finished being collected. Use the Data Source Modules page page to check that data collection has completed and the time of the last update.

NOTE: Reports that have been generated will be retained within Starling Identity Analytics & Risk Intelligence for 30 days. Reports older than 30 days will be deleted.

The Reports page is displayed when the Reports link is selected from the navigation bar. The Reports page is used for downloading customized reports.

The following buttons appear on this page:

New Report

Click this button to open the New Report dialog, which allows you to generate a new report. The following reports are available:

  • Weekly Summary: This report covers a high level view of the previous 7 days from when the report was created. It includes general data regarding accounts, entitlements, rules, and data sources.
  • High Risk Accounts: This report covers information on the current high risk accounts.
  • Rules: This report covers information regarding the currently configured rules.
  • Verification: This report covers information regarding all requested verifications.

For more information, see Generating a report.

Show

This drop-down menu filters the displayed reports based on type: All Reports (default), Weekly Summary Reports, High Risk Accounts Reports, Rules Reports, Verification Reports.

Once reports have been generated, the following information and options appear for each report:

Category

This column displays the type of report (Weekly Summary, High Risk Accounts, Rules, Verification).

Created by

This column displays the name of the account that requested the report.

Report date

This column displays the date and time the report was created.

Status

This displays the current status for the report. The following information may appear:

  • Queued: This status indicates the report has been created but not yet begun processing.
  • Processing: This status indicates the report is currently being generated.
  • Complete: This status indicates the report has completed processing and is available for downloading.

Click this button to select what to do with the report: Download report (see Downloading a report) or Delete report (see Deleting a report).

Related Documents