Azure AD Identity Protection (part 1 of 3)
Azure AD Identity Protection Explained
Identity protection helps the organizations to achieve following tasks:
- Automate the detection and remediation of identity-based risk.
- Investigate the risks using data in the portal.
- Export risk detection data to third-party utilities for further analysis.
Microsoft analyses 6.5 trillion signals per day generated by and fed to Identity Protection to identify as well as protect customers from the threats. These signals are also fed into tools like Conditional Access to make access decisions, or fed back to a security information and event management (SIEM) tool for further investigation according to your organization's enforced policies.
Risk Detection & Remediation
Identity Protection can easily determine the risks in the following situations:
Risk
Detection Type |
Description |
Atypical travel |
Sign
in from an atypical location based on the user’s recent sign ins. |
Anonymous IP
Address |
Sign
in from an anonymous IP address (like Tor browser, anonymizer VPNs). |
Unfamiliar Sign-in
Properties |
Sign
in with the properties we have not seen recently for the given user. |
Malware Linked
IP Address |
Sign
in from a malware linked IP address. |
Leaked Credentials |
This
risk detection indicates that the user’s valid credentials have been leaked. |
Azure AD Threat
Intelligence |
Microsoft’s
internal and external threat intelligence sources have identified a known
attack pattern. |
The risk signals will trigger remediation efforts that will require the users to- perform Azure Multi-Factor Authentication, reset their password with the help of self-service password reset, or blocking until an administrator takes an action.
Risk Investigation
Administrators can review detections and take manual actions with the help of the following key reports for investigations in Identity Protection:
- Risky users
- Risky sign-ins
- Risk detections
Exporting Risk Data
Data can exported to other tools for archive from Identity Protection for further investigation and correlation with the help of the Microsoft Graph based APIs to collect this data for further processing in a tool like SIEM.
Permissions
- Security Reader
- Security Operator
- Security Administrator
- Global Reader
- Global Administrator
Comments
Post a Comment