Skip navigation
Duo Trust Monitor Is Here to Make Risk Detection Easy
Product & Engineering

Duo Trust Monitor Is Here to Make Risk Detection Easy

Duo is excited to announce that our machine learning powered Trust Monitor feature is now available for all Duo Access and Beyond customers at no additional charge. 

We are thrilled to provide a simple, easy to enable, high signal source of risky access behavior to our customers. Our hope is that by surfacing risky logins, we’ll give them new visibility into their environments but, more importantly, a mechanism to remediate suspicious situations and harden their defenses.

Trust monitor circle image

Duo Trust Monitor’s Core Capabilities Include:

  • Intuitive display highlighting risky access events for policy hardening and proactive credential remediation

  • Clear contextual and reasoning information (no black box here)

  • Single click enabled, no costly integration project

  • API support for integration with Security Operations Center, workflow and SIEM tools

How Is Trust Monitor Different From Other UEBA Tools?

Duo Trust Monitor builds machine learning models to learn about common authentication patterns within the environment of each customer. By processing past Duo activity, it automatically builds a mathematical understanding of expected user behaviors. 

Such patterns include typical geolocation, access device and factor usage, application access, and time of authentication activity for a user and across the company, in addition to other indicators of trust and risk.

Trust Monitor Highlights Suspect Authentications

Duo Trust Monitor does the heavy lifting of highlighting recent authentications that deviate from the normal patterns. To maintain a current understanding of those patterns, models are updated on a frequent basis and adapt quickly to new emergent behaviors. 

An example might be a workforce transitioning to work from home. While the transition may take some time to account for, the Trust Monitor model would quickly adapt to see that a user’s new baseline is a home office IP and perhaps a personal laptop.

Context Provides Data Points to Assess

In order to further improve signal, the Duo Data Science team focused on modeling the context in which an authentication takes place. Context includes properties of the authentication that should happen in tandem, actions taken by other users in similar situations, or actions taken by the user recently. 

“It was important to us to minimize the number of false positives surfaced by less thoughtful machine learning approaches,” said Brian Lindauer, Head of Data Science at Duo.

“The models we developed make better detections by learning about the relationships between authentication properties, combining that with customers’ specialized knowledge of risks in their own environment, and surfacing authentication patterns only when something is amiss,” said Lindauer. 

This information can be used to mark an authentication as normal, even when it might look suspicious in isolation. For instance, access to a restricted production environment might look markedly different from baseline behavior, but is not necessarily risky when done through approved devices and 2FA factors.

Easy To Read, Actionable Alerts

Despite the complexity of behaviors taken into account by models, one of our core development principles was not to create a security black box. We wanted to provide an algorithmic approach that provided context and explainability. 

Duo Trust Monitor provides easy to parse explanations for why a given event was flagged, what happened around that authentication, and a transparent feedback mechanism to improve future events. 

To validate value and usability, certain customers were given early access to the feature throughout a public preview period. The feedback has been very positive, with a variety of customers catching credential compromise based on Duo Trust Monitor events and improving their access policy.

Duo Trust Monitor is a detection benefit many MFA providers don't provide out of the box. For us, the highlighted risky events have been spot on - with very few false positives. — Jason Waits, Director of Cybersecurity at Inductive Automation

What Is Next?

This is just the beginning of how we can continue to use the latest technologies to simplify security for our customers. 

With our algorithmic understanding of what is normal for a customer, user and device we are heavily investing in Risk Adaptive Authentication. By dynamically adapting to a changing threat context, Duo Trust Monitor can help us get out of the way of end users in low risk settings, while adding more friction when risk increases

Duo Trust Monitor is available now for all Access & Beyond customers. 

To learn more read over our documentation or just navigate to the Trust Monitor section of Admin Panel

For those considering Duo who’d like to learn more about Trust Monitor—feel reach out to our sales team here or start a free trial.

Try Duo For Free

With our free 30-day trial and see how easy it is to get started with Duo and secure your workforce, from anywhere and on any device.