Skip to content

Findings & Remediation Guide

Findings are the core unit of intelligence in Thalian. Each finding is a named insight expressed as a plain-language sentence with a subject and a consequence — not a raw data table row.


What Are Findings?

A finding is something Thalian's analysis engine has detected that your IT team should know about. Examples:

  • "Sarah Chen has admin access to Salesforce but hasn't logged into Okta in 45 days."
  • "3 users have MFA disabled across both Google Workspace and Okta."
  • "Slack was discovered via email OAuth grants but is not in your sanctioned app list."

Every finding has: - A subject (who or what is affected) - A condition (what's true) - A consequence (why it matters) - A severity (critical, high, medium, low) - A category (what type of risk it represents)

Analysis Engine

Thalian runs 79 analysis rules across 7 categories every time data is synced:

Category What It Detects
Identity Security MFA gaps, stale accounts, dormant admins, privilege anomalies, suspended users with active entitlements
Shadow IT Unvetted applications discovered via OAuth grants, email analysis, or cross-platform observation
Compound Risk Risks that span multiple platforms — e.g., admin on an unmanaged device, dormant user with active cloud access
Device Posture Non-compliant devices, missing encryption, stale MDM check-ins, end-of-life operating systems
License Waste Assigned licenses with no recent usage, duplicate subscriptions across platforms
Drift Signal Changes in security posture over time — MFA coverage dropping, shadow IT count rising, compliance degrading
Access Hygiene Over-provisioned access, unused entitlements, role mismatches between platforms

The cross-platform join is the key differentiator. Thalian correlates data across disconnected systems to surface insights that no single tool can produce — for example, an identity that's been deactivated in Okta but still has active entitlements in Google Workspace.

Finding Lifecycle

Open → In Progress → Resolved
                   → Dismissed (with reason)
Open → Snoozed (temporary hide, auto-reopens)
  • Open: Newly detected, needs attention
  • In Progress: Someone is actively working on it
  • Resolved: The underlying issue has been fixed (manually or via remediation action)
  • Dismissed: Intentionally accepted or determined to be a false positive
  • Snoozed: Temporarily hidden for a set period, then automatically resurfaces

Severity Levels

Severity Score Weight Description
Critical 10 Immediate security risk requiring urgent action
High 5 Significant risk that should be addressed soon
Medium 2 Moderate risk worth monitoring and planning for
Low 1 Minor issue or informational finding

The Risk Score on the dashboard is the weighted sum: Critical×10 + High×5 + Medium×2 + Low×1.

Browsing Findings

The Findings page (/findings) provides a filterable, searchable list of all findings:

Filters

  • Status tab: Open, Resolved, Dismissed
  • Severity: Critical, High, Medium, Low
  • Category: Identity Security, Shadow IT, Compound Risk, Device Posture, License Waste, Drift Signal, Access Hygiene
  • Entity type: Identity, Application, Device, Signal
  • Platform: Filter by source platform
  • Search: Free-text search across finding titles and affected entities

Finding Detail Panel

Click any finding to expand its detail panel, which shows:

  • Full finding description (the sentence-based insight)
  • Affected entities with details
  • Source platform(s) and cross-platform indicators
  • Available remediation actions
  • Causality insights (related findings across platforms)
  • What-if simulation preview (impact of acting on this finding)
  • Linked policy (if a matching policy template exists)

Remediation

Available Actions

Thalian supports 25 remediation action types:

Identity actions: | Action | Description | |---|---| | Suspend user | Temporarily disable account access | | Unsuspend user | Restore account access | | Force password change | Require new password on next login | | Force MFA enrollment | Require MFA setup on next login | | Revoke OAuth token | Invalidate a specific OAuth grant | | Revoke all tokens | Invalidate all active tokens | | Revoke sessions | End all active sessions | | Deactivate user | Permanently deactivate account | | Offboard user | Composite: suspend + revoke sessions + revoke tokens | | Remove admin role | Demote admin without suspending | | Revoke license | Reclaim license assignment | | Remove from group | Remove user from a specific group | | Rotate credentials | Force credential rotation |

Application actions: | Action | Description | |---|---| | Sanction app | Mark as approved/vetted | | Block app | Block application access | | Flag as unauthorized | Mark as shadow IT | | Revoke shadow IT | Remove OAuth grants for shadow apps |

Device actions: | Action | Description | |---|---| | Sync device | Trigger MDM policy sync | | Remote lock | Lock device remotely | | Retire device | Wipe and remove from management | | Enroll device | Send MDM enrollment invite | | Contain host | Isolate from network (CrowdStrike/SentinelOne) | | Lift containment | Remove network isolation |

Other: | Action | Description | |---|---| | Create ticket | Create an ITSM ticket for the finding | | Email vendor | Compose email to SaaS vendor (renewal, cancellation, etc.) |

Approval Workflow

Not all actions execute immediately. The approval workflow depends on role and action severity:

  1. Agent initiates a remediation action
  2. If the finding is high or critical severity, the action enters a pending approval queue
  3. A Security Analyst, Admin, or Super Admin reviews and approves (or rejects) the action
  4. On approval, the action is executed against the target platform's API

Security Analysts and above can both initiate and approve actions without requiring a second approver.

Agentic Execution

For Pro and Enterprise workspaces, Thalian supports automated remediation with three tiers:

Tier Behavior Actions
auto_execute Executes immediately without human review Enroll device
auto_queue Queued for execution, reviewable before next run Remove admin, revoke license, remove from group, rotate credentials
never Always requires manual initiation Offboard user, email vendor

Agentic policies are configurable in Settings > General.

What-If Simulation

Before taking action, you can preview the impact:

  1. On any finding's detail panel, look for the "What if you act on this?" section
  2. The simulation shows: findings that would close, findings that might open, and the projected risk score change
  3. This helps you prioritize actions by their actual impact on your security posture

Causality Insights

When Thalian detects that findings are related across platforms, it surfaces Causality Insights — connections between findings that share the same affected entity. For example:

  • A user flagged for "dormant Okta account" might also appear in "active Google Workspace admin" — revealing a cross-platform access gap
  • An application flagged as shadow IT in one finding might also appear in a license waste finding

Click the linked finding chips to navigate between related findings.


For information on tracking remediation actions over time, see Reports & Audit.