Ordr integrates with multiple Microsoft solutions to enhance device context and improve risk insights to keep your organization secure.
Microsoft Active Directory
Ordr integration with Active Directory (AD) improves vulnerability detection and benefits your risk mitigation strategy with a central view of user credentials, user data, and details on devices, operating systems, users, logins, and applications.
Ordr integration with Microsoft DHCP increases data accuracy to improve core analytics. Ordr collects IP address assignment details from Microsoft DHCP to enable accurate MAC-to-IP binding and ensure security alerts and flow data are always mapped to the correct device.
Order integration with WinRM simplifies Windows device profiling with device, software, and application details such as antivirus information, to help teams identify vulnerabilities and address security and compliancerequirements.
Ordr integration enables organizations to leverage rich context from all Intune managed remote endpoints, including Android, iOS/iPadOS, Linux, macOS, and Windows devices. Ordr collects device, user, and installed application details from Intune to Enrich the Ordr Data Lake and extend the ability to see and know more about all devices, connections, and vulnerabilities. Read more about Ordr integrations with Mobile Device Management (MDM) tools.
Ordr also offers the flexibility of seamlessly leveraging your preferred identity management and user authentication methods for secure access to the Ordr dashboard.
Active Directory Federation Services
Ordr supports Single Sign-On (SSO) with Active Directory Federation Services (AD FS) to centralize management and secure access to the Ordr dashboard.
Ordr supports Single Sign-On (SSO) with Azure AD to centralize management and secure access to the Ordrdashboard.
Microsoft 2FA Authenticator
Ordr supports two factor authentication (2FA)to provide an extra layer of protection for Ordr dashboard access. With a simple user setup via QR code, 2FA enables you to protect against security threats such as phishing, brute-force attacks, and credential manipulation that target your administrative credentials.