Identify
Hydden's Identify module allows customers to manage their Identity Mapping, Threat Rules, and Account Classification configurations. Hydden comes with a default setup, customization is available for all tenants.
Why Configure Identity Mapping and Threat Detection
Identity mapping and threat detection configuration transforms raw account data into actionable security intelligence. By customizing identity mapping rules, account classifications, and threat detection policies, organizations can:
- Establish Accurate Account Ownership: Define how discovered accounts map to business identities, enabling accurate ownership assignment and reducing accountability gaps.
- Enable Risk-Based Security: Create custom threat rules that identify suspicious account behaviors specific to your organization's risk profile and security policies, allowing faster response to threats.
- Support Compliance and Attestation: Classify accounts according to your organization's governance model, enabling easier reporting on privileged accounts, service accounts, and their business owners.
- Reduce False Positives: Tailor classification and threat detection rules to your environment, improving the signal-to-noise ratio and enabling security teams to focus on genuine risks.
- Enable Automated Responses: Classify high-risk accounts and configure threat-based triggers for automated remediation, enforcement, and notification workflows.
The Identify Menu
Tabs on this page:
- Ownership
- Owner Creation
- Account Mapping
- Classification Rules
- Threat Rules
All rules pages open up with the default rules checkbox set.
Topics in this section:
- Ownership
- Owner Creation
- Account Mapping
- Classification Rules
- Threat Detection and Rules: General information on threat detection and rules.
- Default Rules: Hydden's out-of-box provided default threat rules.
- How to create a threat rule
- Account Z-Score
