Skip to content

Commit 116abf0

Browse files
authored
Merge pull request #190917 from MarkusVi/wbrisk01
wbrisk01
2 parents 00bc7f4 + e5cda6d commit 116abf0

File tree

4 files changed

+109
-0
lines changed

4 files changed

+109
-0
lines changed
20.3 KB
Loading
3.49 KB
Loading

articles/active-directory/reports-monitoring/toc.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -130,6 +130,8 @@
130130
href: workbook-conditional-access-gap-analyzer.md
131131
- name: Cross-tenant access activity
132132
href: workbook-cross-tenant-access-activity.md
133+
- name: Risk analysis
134+
href: workbook-risk-analysis.md
133135
- name: Sensitive Operations Report
134136
href: workbook-sensitive-operations-report.md
135137
- name: Recommendations
Lines changed: 107 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,107 @@
1+
---
2+
3+
title: Identity protection risk analysis workbook in Azure AD | Microsoft Docs
4+
description: Learn how to use the identity protection risk analysis workbook.
5+
services: active-directory
6+
documentationcenter: ''
7+
author: MarkusVi
8+
manager: karenho
9+
editor: ''
10+
11+
ms.service: active-directory
12+
ms.topic: reference
13+
ms.workload: identity
14+
ms.subservice: report-monitor
15+
ms.date: 03/08/2022
16+
ms.author: markvi
17+
ms.reviewer: sahandle
18+
19+
ms.collection: M365-identity-device-management
20+
---
21+
22+
# Identity protection risk analysis workbook
23+
24+
Azure AD Identity Protection detects, remediates, and prevents compromised identities. As an IT administrator, you want to understand risk trends in your organizations and opportunities for better policy configuration. With the Identity Protection Risky Analysis Workbook, you can answer common questions about your Identity Protection implementation.
25+
26+
This article provides you with an overview of this workbook.
27+
28+
29+
## Description
30+
31+
![Workbook category](./media/workbook-risk-analysis/workbook-category.png)
32+
33+
34+
As an IT administrator, you need to understand trends in identity risks and gaps in your policy implementations to ensure you are best protecting your organizations from identity compromise. The identity protection risk analysis workbook helps you analyze the state of risk in your organization.
35+
36+
**This workbook:**
37+
38+
- Provides visualizations of where in the world risk is being detected.
39+
40+
- Allows you to understand the trends in real time vs. Offline risk detections.
41+
42+
- Provides insight into how effective you are at responding to risky users.
43+
44+
45+
46+
47+
48+
## Sections
49+
50+
This workbook has five sections:
51+
52+
- Heatmap of risk detections
53+
54+
- Offline vs real-time risk detections
55+
56+
- Risk detection trends
57+
58+
- Risky users
59+
60+
- Summary
61+
62+
63+
64+
65+
66+
67+
68+
## Filters
69+
70+
71+
This workbook supports setting a time range filter.
72+
73+
74+
![Set time range filter](./media/workbook-risk-analysis/time-range-filter.png)
75+
76+
There are more filters in the risk detection trends and risky users sections.
77+
78+
Risk Detection Trends:
79+
80+
- Detection timing type (real-time or offline)
81+
82+
- Risk level (low, medium, high, or none)
83+
84+
Risky Users:
85+
86+
- Risk detail (which indicates what changed a user’s risk level)
87+
88+
- Risk level (low, medium, high, or none)
89+
90+
91+
## Best practices
92+
93+
94+
- **[Enable risky sign-in policies](../identity-protection/concept-identity-protection-policies.md)** - To prompt for multi-factor authentication (MFA) on medium risk or above. Enabling the policy reduces the proportion of active real-time risk detections by allowing legitimate users to self-remediate the risk detections with MFA.
95+
96+
- **[Enable a risky user policy](../identity-protection/howto-identity-protection-configure-risk-policies.md#user-risk-with-conditional-access)** - To enable users to securely remediate their accounts when they are high risk. Enabling the policy reduces the number of active at-risk users in your organization by returning the user’s credentials to a safe state.
97+
98+
99+
100+
101+
102+
## Next steps
103+
104+
- To learn more about identity protection, see [What is identity protection](../identity-protection/overview-identity-protection.md).
105+
106+
- For more information about Azure AD workbooks, see [How to use Azure AD workbooks](howto-use-azure-monitor-workbooks.md).
107+

0 commit comments

Comments
 (0)