Azure AD Identity Protection (part 1 of 3)

 




To read part 2, please click here
To read part 3, please click here





Azure AD Identity Protection Explained

Identity protection helps the organizations to achieve following tasks:

  • Automate the detection and remediation of identity-based risk.
  • Investigate the risks using data in the portal.
  • Export risk detection data to third-party utilities for further analysis.

Microsoft analyses 6.5 trillion signals per day generated by and fed to Identity Protection to identify as well as protect customers from the threats. These signals are also fed into tools like Conditional Access to make access decisions, or fed back to a security information and event management (SIEM) tool for further investigation according to your organization's enforced policies.  

Risk Detection & Remediation

Identity Protection can easily determine the risks in the following situations:

Risk Detection Type

Description

Atypical travel

Sign in from an atypical location based on the user’s recent sign ins.

Anonymous IP Address

Sign in from an anonymous IP address (like Tor browser, anonymizer VPNs).

Unfamiliar Sign-in Properties

Sign in with the properties we have not seen recently for the given user.

Malware Linked IP Address

Sign in from a malware linked IP address.

Leaked Credentials

This risk detection indicates that the user’s valid credentials have been leaked.

Azure AD Threat Intelligence

Microsoft’s internal and external threat intelligence sources have identified a known attack pattern.

 

The risk signals will trigger remediation efforts that will require the users to- perform Azure Multi-Factor Authentication, reset their password with the help of self-service password reset, or blocking until an administrator takes an action.

Risk Investigation

Administrators can review detections and take manual actions with the help of the following key reports for investigations in Identity Protection:

  1. Risky users
  2. Risky sign-ins
  3. Risk detections 

Exporting Risk Data

Data can exported to other tools for archive from Identity Protection for further investigation and correlation with the help of the Microsoft Graph based APIs to collect this data for further processing in a tool like SIEM. 

Permissions

Users must have one or more than one of the following roles if they want access: 
  1. Security Reader
  2. Security Operator
  3. Security Administrator
  4. Global Reader
  5. Global Administrator







To read part 2, please click here
To read part 3, please click here


Comments

Popular posts from this blog

Deployment (Part 3)

Deployment (Part 1)

Project Resourcing (Part 2)