This knowledge base article provides a step-by-step guide to monitoring Okta System Logs for threat detection. Learn how to collect logs via API, enrich them using Substation, and analyze them with Scanner for real-time detections. With MITRE ATT&CK mappings, sample queries, and open-source rule packs, this article helps teams build a scalable, high-fidelity identity monitoring pipeline rooted in Okta telemetry.