Skip to content

Commit 0d9c4f0

Browse files
WIP
1 parent 6f4db8f commit 0d9c4f0

File tree

4 files changed

+28
-28
lines changed

4 files changed

+28
-28
lines changed

articles/active-directory/conditional-access/plan-conditional-access.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ Planning your Conditional Access deployment is critical to achieving your organi
2323

2424
With this evaluation and enforcement, Conditional Access defines the basis of [Microsoft’s Zero Trust security posture management](https://www.microsoft.com/security/business/zero-trust).
2525

26-
![Conditional Access overview](./media/plan-conditional-access/conditional-access-overview-how-it-works.png)
26+
![Diagram showing a high level Conditional Access overview](./media/plan-conditional-access/conditional-access-overview-how-it-works.png)
2727

2828
Microsoft provides [security defaults](../fundamentals/concept-fundamentals-security-defaults.md) that ensure a basic level of security enabled in tenants that don't have Azure AD Premium. With Conditional Access, you can create policies that provide the same protection as security defaults, but with granularity. Conditional Access and security defaults aren't meant to be combined as creating Conditional Access policies will prevent you from enabling security defaults.
2929

@@ -140,7 +140,7 @@ Access control: Block access <br>
140140

141141
Now when User B attempts to access the **PAYROLL APP** they're blocked.
142142

143-
![Access token issuance diagram](media/plan-conditional-access/CA-policy-token-issuance.png)
143+
![Diagram showing access token issuance](media/plan-conditional-access/CA-policy-token-issuance.png)
144144

145145
## Recommendations
146146

@@ -181,11 +181,11 @@ If you rely on a single access control such as multifactor authentication or a n
181181
* Who it applies to
182182
* When it applies (if applicable)
183183

184-
![Screenshot that shows the naming standards for policies.](media/plan-conditional-access/11.png)
184+
![Diagram showing the example naming standards for policies.](media/plan-conditional-access/11.png)
185185

186186
**Example**: A policy to require MFA for marketing users accessing the Dynamics CRP app from external networks might be:
187187

188-
![Naming standard](media/plan-conditional-access/naming-example.png)
188+
![Diagram showing a naming standard](media/plan-conditional-access/naming-example.png)
189189

190190
A descriptive name helps you to keep an overview of your Conditional Access implementation. The Sequence Number is helpful if you need to reference a policy in a conversation. For example, when you talk to an administrator on the phone, you can ask them to open policy CA01 to solve an issue.
191191

@@ -263,7 +263,7 @@ If a user has an issue with a Conditional Access policy, collect the following i
263263

264264
If the user received a message with a More details link, they can collect most of this information for you.
265265

266-
![Can’t get to app error message](media/plan-conditional-access/cant-get-to-app.png)
266+
![Screenshots of an example error message and more details](media/plan-conditional-access/cant-get-to-app.png)
267267

268268
Once you've collected the information, See the following resources:
269269

articles/active-directory/identity-protection/how-to-deploy-identity-protection.md

Lines changed: 16 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title:
3-
description:
2+
title: Plan an Azure AD Identity Protection deployment
3+
description: Deploy Azure Active Directory Identity Protection
44

55
services: active-directory
66
ms.service: active-directory
@@ -45,15 +45,15 @@ When technology projects fail, they typically do so due to mismatched expectatio
4545

4646
### Communication plan
4747

48-
Communication is critical to the success of any new functionality. You should proactively communicate with your users how their experience will change, when it will change, and how to get support if they experience issues.
48+
Communication is critical to the success of any new functionality. You should proactively communicate with your users how their [experience](concept-identity-protection-user-experience.md) will change, when it will change, and how to get support if they experience issues.
4949

5050
## Step 1: Review existing reports
5151

52-
It's important to understand your current Identity Protection reports before deploying risk based Conditional Access policies. This is to give you an understanding of your environment, investigate suspicious behavior you may have missed and to dismiss or confirm safe user who you have determined aren't at risk. We recommend allowing users to self-remediate through policies that will be discussed in [Step 3](#step-3-configure-your-policies).
52+
It's important to understand your current Identity Protection reports before deploying risk based Conditional Access policies. This review is to give you an understanding of your environment, investigate suspicious behavior you may have missed and to dismiss or confirm safe user who you have determined aren't at risk. We recommend allowing users to self-remediate through policies that will be discussed in [Step 3](#step-3-configure-your-policies).
5353

5454
### Existing risk detections
5555

56-
If your users haven't been remediating risk, then they may have accumulated risk. Users who reset their password on-premises don't remediate risk. Make sure before you dismiss risks, you've determined they aren't really at risk by [investigating risk detections](howto-identity-protection-investigate-risk.md). After investigating you can remediate user risk by following the steps in the article, [Remediate risks and unblock users](howto-identity-protection-remediate-unblock.md). Make bulk changes to user risk by following the samples in the article, [Azure Active Directory Identity Protection and the Microsoft Graph PowerShell](howto-identity-protection-graph-api.md).
56+
If your users haven't been remediating risk, then they may have accumulated risk. Users who reset their password on-premises don't remediate risk. Make sure before you dismiss risks, you've determined they aren't really at risk by [investigating risk detections](howto-identity-protection-investigate-risk.md). After investigating, you can remediate user risk by following the steps in the article, [Remediate risks and unblock users](howto-identity-protection-remediate-unblock.md). Make bulk changes to user risk by following the samples in the article, [Azure Active Directory Identity Protection and the Microsoft Graph PowerShell](howto-identity-protection-graph-api.md).
5757

5858
## Step 2: Plan for Conditional Access risk policies
5959

@@ -77,11 +77,11 @@ Plan your Azure Active Directory Multi-Factor Authentication deployment with Con
7777

7878
### Known network locations
7979

80-
It's important to configure named locations in Conditional Access and add your VPN ranges to Defender for Cloud Apps. Sign-ins from named locations, marked as trusted or known, improve the accuracy of Azure AD Identity Protection's risk calculation. These sign-ins lower a user's risk when they authenticate from a location marked as trusted or known. This will reduce false positives for some detections in your environment.
80+
It's important to configure named locations in Conditional Access and add your VPN ranges to Defender for Cloud Apps. Sign-ins from named locations, marked as trusted or known, improve the accuracy of Azure AD Identity Protection's risk calculation. These sign-ins lower a user's risk when they authenticate from a location marked as trusted or known. This practice will reduce false positives for some detections in your environment.
8181

8282
### Report only mode
8383

84-
Report-only mode is a Conditional Access policy state that allows administrators to evaluate the impact of Conditional Access policies before enforcing them in their environment.
84+
Report-only mode is a Conditional Access policy state that allows administrators to evaluate the effect of Conditional Access policies before enforcing them in their environment.
8585

8686
## Step 3: Configure your policies
8787

@@ -93,13 +93,13 @@ Use the Identity Protection multifactor authentication registration policy to he
9393

9494
Most users have a normal behavior that can be tracked, when they fall outside of this norm it could be risky to allow them to just sign in. You may want to block that user or maybe just ask them to perform multi-factor authentication to prove that they're really who they say they are. You may want to start by scoping these policies to admins only.
9595

96-
The guidance in the article [Common Conditional Access policy: Sign-in risk-based multifactor authentication](../conditional-access/howto-conditional-access-policy-risk.md) provides guidance to create a sign-in risk policy.
96+
The article [Common Conditional Access policy: Sign-in risk-based multifactor authentication](../conditional-access/howto-conditional-access-policy-risk.md) provides guidance to create a sign-in risk policy.
9797

9898
### Conditional Access user risk
9999

100100
Microsoft works with researchers, law enforcement, various security teams at Microsoft, and other trusted sources to find leaked username and password pairs. When these vulnerable users are detected, we recommend requiring users perform multifactor authentication then reset their password.
101101

102-
The guidance in the article [Common Conditional Access policy: User risk-based password change](../conditional-access/howto-conditional-access-policy-risk-user.md) provides guidance to create a user risk policy that requires password change.
102+
The article [Common Conditional Access policy: User risk-based password change](../conditional-access/howto-conditional-access-policy-risk-user.md) provides guidance to create a user risk policy that requires password change.
103103

104104
### Migrating from older Identity Protection policies
105105

@@ -116,22 +116,22 @@ For more information, see the section [Migrate risk policies from Identity Prote
116116

117117
### Enable notifications
118118

119-
Enable notifications so you can respond when a user is flagged as at risk so you can start investigating immediately. You can also set up weekly digest emails giving you an overview of risk for that week in your tenant.
119+
[Enable notifications](howto-identity-protection-configure-notifications.md) so you can respond when a user is flagged as at risk so you can start investigating immediately. You can also set up weekly digest emails giving you an overview of risk for that week.
120120

121121
### Monitor and investigate
122122

123-
Investigate risk with Identity Protection Alerts (in DRAFT)
124-
Identity Protection workbook to help monitor and look for patterns in your tenant. Monitor this workbook for trends and also Conditional Access Report Only mode results to see if there are any tweaks that need to be made, for example, additions to named locations.
123+
The [Identity Protection workbook](../reports-monitoring/workbook-risk-analysis.md) can help monitor and look for patterns in your tenant. Monitor this workbook for trends and also Conditional Access Report Only mode results to see if there are any changes that need to be made, for example, additions to named locations.
125124

126-
How to investigate anomaly detection with Defender for Cloud App Security Alerts
127-
You can also use the Identity Protection APIs to export the risk to your SIEM tool so your security team can monitor and alert on risk events.
125+
Microsoft Defender for Cloud Apps provides an investigation framework organizations can use as a starting point. For more information, see the article [How to investigate anomaly detection alerts] (/defender-cloud-apps/investigate-anomaly-alerts).
128126

129-
During this testing time, you might want to simulate some threats Identity Protection protects against so you can see some of these risks.
127+
You can also use the Identity Protection APIs to [export risk information](howto-export-risk-data.md) to other tools, so your security team can monitor and alert on risk events.
128+
129+
During testing, you might want to [simulate some threats](howto-identity-protection-simulate-risk.md) to test your investigation processes.
130130

131131
## Step 5: Enable Conditional Access policies
132132

133133
After you've completed all your analysis, evaluated policies in report only mode, and you have your stakeholders on board it's time to turn on your Conditional Access risk policies.
134134

135135
## Next steps
136136

137-
137+
[What is risk?](concept-identity-protection-risks.md)
236 KB
Loading

articles/active-directory/identity-protection/overview-identity-protection.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: identity-protection
88
ms.topic: overview
9-
ms.date: 08/15/2022
9+
ms.date: 01/03/2023
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -17,12 +17,16 @@ ms.collection: M365-identity-device-management
1717
---
1818
# What is Identity Protection?
1919

20-
Identity Protection uses the learnings Microsoft has acquired from their position in organizations with Azure Active Directory, the consumer space with Microsoft Accounts, and in gaming with Xbox to protect your users. Microsoft analyses trillions of signals per day to identify and protect customers from threats. Identity Protection allows organizations to accomplish three key tasks:
20+
Identity Protection allows organizations to accomplish three key tasks:
2121

2222
- [Automate the detection and remediation of identity-based risks](howto-identity-protection-configure-risk-policies.md).
2323
- [Investigate risks](howto-identity-protection-investigate-risk.md) using data in the portal.
2424
- [Export risk detection data to other tools](howto-export-risk-data.md).
2525

26+
:::image type="content" source="media/overview-identity-protection/identiy-protection-overview.png" alt-text="Diagram showing how Identity Protection conceptually works." lightbox="media/overview-identity-protection/identiy-protection-overview.png":::
27+
28+
Identity Protection uses the learnings Microsoft has acquired from their position in organizations with Azure Active Directory, the consumer space with Microsoft Accounts, and in gaming with Xbox to protect your users. Microsoft analyses trillions of signals per day to identify and protect customers from threats.
29+
2630
The signals generated by and fed to Identity Protection, can be further fed into tools like Conditional Access to make access decisions, or fed back to a security information and event management (SIEM) tool for further investigation.
2731

2832
## Why is automation important?
@@ -110,8 +114,4 @@ More information on these rich reports can be found in the article, [How To: Inv
110114

111115
## Next steps
112116

113-
- [Security overview](concept-identity-protection-security-overview.md)
114-
115-
- [What is risk](concept-identity-protection-risks.md)
116-
117-
- [Policies available to mitigate risks](concept-identity-protection-policies.md)
117+
- [Plan an Identity Protection deployment](how-to-deploy-identity-protection.md)

0 commit comments

Comments
 (0)