Account/Authentication - Azure Active Directory - Enable Azure AD Identity Protection Sign-in Risk Policies

 








Summary

It can easily detect risks in real-time and offline. A risky sign-in may generally means an illegitimate sign-in attempt of a user account.

Reason

Turning on the sign-in risk policy ensures that suspicious sign-ins are challenged for MFA.

What If?

After triggering the policy, users will require MFA to access the account, however, if any user hasn't registered MFA on their account, then, they would be automatically blocked from accessing their account. Hence, it is recommended to configure the MFA registration policy by all users who are a part of the Sign-in Risk policy.

How to?

To configure a Sign-in risk policy, use the following steps:
  1. Login to https://admin.microsoft.com as a Global Administrator.
  2. Go to Admin centers and click on Azure Active Directory.
  3. Select Azure Active Directory and then Security.
  4. Select Conditional Access.
  5. Now, create a new policy by choosing New Policy.
  6. Set the below conditions within the policy-                  
    • Under Users or workload identities select All users.
    • Under Cloud apps or actions pick All cloud apps.  
    • Under Conditions choose Sign-in risk then Yes in the right pane followed by the appropriate level.
    • Under Access controls firstly choose Grant, and then in the right pane click Grant access followed by Require multi-factor authentication. 

  7.  Click Select.
  8. You can also go for a state of Report only as you step through implementation, but, the policy should be set On in order to be in effect. 
  9. Now, click Create.                       

Monitor:

To verify if a Sign-in risk policy is enabled, use the following steps:
  1. Login to https://admin.microsoft.com as a Global Administrator.
  2. Go to Admin centers and click on Azure Active Directory.
  3. Select Azure Active Directory and then Security.
  4. Select Conditional Access.
  5. Now, ensure that a policy exist with the following characteristics and is set to On-            
    • Under Users or workload identities select All users.
    • Under Cloud apps or actions pick All cloud apps.  
    • Under Conditions choose Sign-in risk then Yes in the right pane followed by the appropriate level.
    • Under Access controls firstly choose Grant, and then in the right pane click Grant access followed by Require multi-factor authentication.  



















































Comments

Popular posts from this blog

Query, Visualize, & Monitor Data in Azure Sentinel

Planning for Implementing SAP Solutions on Azure (Part 2 of 5)

Work with String Data Using KQL Statements