Account/Authentication - Azure Active Directory - Enable Azure AD Identity Protection User Risk Policies

 





Summary

It can easily detect the probability that a user account has been compromised.

Reason

If the user risk policy is turned on, then, Azure AD will be able to detect the probability of a compromised user account, allowing an administrator to configure a user risk conditional access policy to automatically respond to a specific user risk level. For example, an access to your resources or a password change required can be blocked to get a user account into a clean slate.

What If?

After triggering the policy, access to the account will either be blocked or the user will be required to use MFA to access the account to change their password. However, the users without MFA will be blocked from accessing the account and after that the admin will have to recover the account. Hence, it is recommended to configure the MFA registration policy for all users who are a part of the User Risk policy.

How to?

To configure a User risk policy, use the following steps:
  1. Login to https://admin.microsoft.com as a Global Administrator.
  2. Go to Admin centers and click on Azure Active Directory.
  3. Select Azure Active Directory and then Security.
  4. Select Conditional Access.
  5. Now, create a new policy by choosing New Policy.
  6. Set the below conditions within the policy-                  
    • Under Users or workload identities select All users.
    • Under Cloud apps or actions pick All cloud apps.  
    • Under Conditions choose User risk then Yes in the right pane followed by the appropriate level.
    • Under Access controls firstly choose Grant, and then in the right pane click Grant access followed by Require password change.

  7.  Click Select.
  8. You can also go for a state of Report only as you step through implementation, but, the policy should be set On in order to be in effect. 
  9. Now, click Create.                       

Monitor:

To verify if a Sign-in risk policy is enabled, use the following steps:
  1. Login to https://admin.microsoft.com as a Global Administrator.
  2. Go to Admin centers and click on Azure Active Directory.
  3. Select Azure Active Directory and then Security.
  4. Select Conditional Access.
  5. Now, ensure that a policy exist with the following characteristics and is set to On-            
    • Under Users or workload identities select All users.
    • Under Cloud apps or actions pick All cloud apps.  
    • Under Conditions choose User risk then Yes in the right pane followed by the appropriate level.
    • Under Access controls firstly choose Grant, and then in the right pane click Grant access followed by Require password change.













































Comments

Popular posts from this blog

Query, Visualize, & Monitor Data in Azure Sentinel

Planning for Implementing SAP Solutions on Azure (Part 2 of 5)

Work with String Data Using KQL Statements