Quick Memo on Integrating Okta and Defender for Identity

Microsoft Defender for Identity (MDI), Microsoft's ID threat detection solution, has extended its protection capabilities to Okta, as announced in the Microsoft Tech Community. While MDI is known as a protection solution for Active Directory, it has now expanded its coverage to include Okta.

I gave it a quick try and here are my notes.

This blog post is based on information available as of June 26, 2025. I've done some simple verification with an Okta Developer license, but I believe this kind of feature is best tested in a production environment. If anyone has tried this in a live environment, I'd love to hear about your positive experiences.

Configuration

It's extremely simple, so much so that I felt it wasn't necessary to write down the steps. For details, including licensing requirements, please see the Microsoft Learn page.

What Does This Integration Enable?

Display of Okta's Security Score

Okta has been added to the security score items. It detects vulnerable configurations, such as overly permissive API token scopes, and provides opportunities for improvement.

A screenshot showing Okta added to the security score recommendations in the Defender portal.

Incident Detection, Investigation, and Response (ITDR)

By ingesting Okta logs into MDI, you can now write detection rules for Okta compromises.

Furthermore, regarding investigations during a compromise, it was previously necessary to manually correlate information by individually checking the Okta admin console, AD logs, and various SaaS logs. While you can perform correlation analysis in a SIEM if you have one with integrated logs, this can now be done directly in the Defender portal's Advanced Hunting.

Since suspicious activities from Okta are displayed alongside AD's unusual behaviors on the Defender for Identity timeline, you can intuitively understand how an attacker is attempting to move laterally across on-premises and cloud environments.

A screenshot of the Defender for Identity timeline showing both Active Directory and Okta events, illustrating a potential cross-platform attack.

When a compromise is detected, you can take immediate actions, such as disabling the compromised account, directly from the Defender portal.

A screenshot showing the response actions available in the Defender portal for a detected threat, such as 'Disable user in Okta'.

What Was My Experience Using It?

SOC Members Might Not Need Okta Accounts Anymore

Members of the SOC (Security Operations Center) responsible for incident response can now investigate and act centrally from the Defender portal without needing individual Okta admin accounts. This is expected to reduce the burden of account management and speed up incident response.

This is particularly beneficial for a 24/7 SOC, which typically has a considerable number of members. Assigning Okta admin accounts to each of these members would be a hassle and, more importantly, a security risk. The ability to complete all tasks within the Defender portal is a very positive development.

The Integration Needs a Bit More Work

At present, it's hard to say that Okta and MDI are seamlessly integrated. For example, in the Advanced Hunting search results, there is an AccountObjectId column. However, clicking on it does not navigate to the user's entity page. The expected behavior would be to seamlessly go to the user page for any entity detected in Advanced Hunting, so I really hope this will be improved.

(It seems that Okta IDs are assigned a Cloud ID rather than an AccountObjectId.)

A screenshot of the Advanced Hunting query results, with an arrow pointing to the non-clickable AccountObjectId column.

Organizations That Should Consider This Integration

We recommend that organizations meeting the following criteria consider testing this integration:

  • Hold an Okta Enterprise license.
  • Are using Microsoft Defender for Identity (e.g., via an E5 license).
  • Require integrated security monitoring for on-premises AD and cloud identities.
  • Are looking for centralized incident response within their SOC.

Conclusion

The Okta integration for Microsoft Defender for Identity is a major step forward for ID threat detection in hybrid environments. While there is still room for improvement in some features, it is an important step towards achieving truly integrated security monitoring.

For those fortunate organizations that have licenses for both products, I highly recommend giving it a try. I look forward to seeing future updates.

Comments