Explore features of Atlassian Guard
By the end of this lesson, you'll be able to:
- Differentiate standard and premium features
- Leverage different methods of controlling user access
- Identify features to monitor activity within your organization
- Explain data classification and security policies
- Describe the purpose of Guard detect
Which Atlassian Guard plan meets your needs?
Atlassian Guard Standard is included in Enterprise plans at no extra cost.
Control user access
Atlassian Guard supports Microsoft Azure Active Directory (AD), Okta, OneLogin, Google Workspace, and others.
Configure authentication policies
- Single sign-on (SSO)
- Enforced two-step verification (2SV)
- Password policies such as password strength and expiry
- Session duration
Org admins can set up a non-billable authentication policy grouping users where none of Atlassian Guard features apply. Users under this policy will not count toward the Atlassian Guard subscription.
Org admins can create up to twenty policies for their organization.
- Go to admin.atlassian.com and select your organization.
- Under the Security tab, select Authentication policies.
- Select Add policy.
- From the drop-down menu, select the User directory.
- Enter a policy name that describes the type of users it applies to (e.g. All users).
- Configure your new policy by enabling or disabling the different authentication settings (e.g. Two-step verification).
- Select Update.
To be able to set up authentication policies, you need to verify a domain and claim user accounts for that domain. Since authentication policies can have an impact on the ways users authenticate, it’s recommended to let users know of the changes.
Configure SAML single sign-on
- When a customer logs in to your help center, they are redirected to the identity provider to log in. They will not have to sign up from the portal.
- If a customer authenticates with the identity provider (👉 For example: following a link from within an authenticated environment), the help center recognizes them so they can bypass the login experience.
- To add an identity provider directory.
- To link verified domains to the identity provider directory.
- To check that the Atlassian product and the identity provider use the HTTPS protocol to communicate.
- Go to admin.atlassian.com and select your organization.
- Select the Security tab then select Identity providers.
- Select the identity provider you set up in your organization.
- Select Set up SAML single sign-on.
- Enter the SAML details, such as the Identity provider entity URL.
- Save SAML configuration.
- Copy the provided URLs, such as the service provider entity URL, to your identity provider.
- Go to admin.atlassian.com. Select your organization if you have more than one.
- Select Security, then select Authentication policies.
- Select Edit for the policy you want to enforce.
- Select Enforce single sign-on.
Enforce two-step verification
- Go to admin.atlassian.com and select your organization.
- Under the Security tab, select Authentication policies.
- Select Edit for authentication policy you want to enforce the two-step verification.
- In the Settings page, select the option to Require two-step verification.
When you have already enforced single sign-on in your authentication policy, you can configure two-step verification in your identity provider, through which users authenticate.
Mobile app management
- Disable sharing, saving or backing up content from the mobile app
- Disable screenshots and screen recording of the mobile app
- Require data encryption
- Require a minimum OS version
Data security policies
- Selected spaces and projects: Cover pages and work items in selected Confluence spaces and Jira projects.
- Products: Cover pages and work items in entire products.
Monitor your organization’s activity
- Unexpected costs: Admins can face unexpected costs when users create their own instances.
- Security risks: Admins have no visibility or control over what users do in their own instances, which may include putting sensitive data into products when users are logged in with their work accounts.
- Time-consuming: Admins have to spend a considerable amount of time chasing down users who created product instances outside of IT and finding out how they used those instances.
You can monitor shadow IT by going to Discovered products page, under the Security tab.
Revoke API tokens
- Go to admin.atlassian.com and select your organization.
- Under the Security tab, select API Tokens.
- Locate the API token you want to revoke.
- Select Revoke next to the token.
Use the audit log
- Access logs: The audit log records actions affecting user access, such as granting users or groups product access.
- Product logs: The audit log tracks product changes such as project creation in Jira or space permissions changes in Confluence.
- User-created activities: The audit log records user-created activities such as creating a Confluence page or viewing a Jira work item.
User-created activities are only available in the audit log with enterprise cloud plans.
Use organization insights
- Active users: This chart shows managed accounts who have used a product at least once a month.
- Active users by product: This chart shows users that are active versus those who aren’t currently active, categorized by product.
- Active Trello users: This chart shows managed accounts who are active in Trello at least once a month, broken down by pricing plan.
Data classification and security policies
You can create up to 10 different classification levels.
Enforce data security policies by data classification
What is Guard detect?
You can integrate alerts raised by Guard detect into Slack for faster response.
How was this lesson?
next lesson
Enable Atlassian Guard
- Implement Atlassian Guard in your organization
- Sync users with Atlassian Guard