Skip to content

Commit 0b2edc1

Browse files
authored
Merge pull request #105483 from FrankHu-MSFT/patch-103
(AzureCXP) Adding Note
2 parents db2e225 + dd9be4d commit 0b2edc1

File tree

1 file changed

+3
-0
lines changed

1 file changed

+3
-0
lines changed

articles/active-directory/reports-monitoring/concept-risk-events.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -88,6 +88,9 @@ This risk detection type considers past sign-in locations (IP, Latitude / Longit
8888

8989
Identity Protection detects sign-ins from unfamiliar locations also for basic authentication / legacy protocols. Because these protocols do not have modern familiar features such as client id, there is not enough telemetry to reduce false positives. To reduce the number of detected risk detections, you should move to modern authentication.
9090

91+
> [!NOTE]
92+
> If the login username and password do not match, the sign-in will fail and the risk detection does not occur. Sign-in from unfamiliar location risk detections only are triggered on succesful logins.
93+
9194
### Sign-ins from infected devices
9295

9396
This risk detection type identifies sign-ins from devices infected with malware, that are known to actively communicate with a bot server. This is determined by correlating IP addresses of the user’s device against IP addresses that were in contact with a bot server.

0 commit comments

Comments
 (0)