|
| 1 | +--- |
| 2 | + |
| 3 | +title: Identity protection risk analysis workbook in Azure AD | Microsoft Docs |
| 4 | +description: Learn how to use the identity protection risk analysis workbook. |
| 5 | +services: active-directory |
| 6 | +documentationcenter: '' |
| 7 | +author: MarkusVi |
| 8 | +manager: karenho |
| 9 | +editor: '' |
| 10 | + |
| 11 | +ms.service: active-directory |
| 12 | +ms.topic: reference |
| 13 | +ms.workload: identity |
| 14 | +ms.subservice: report-monitor |
| 15 | +ms.date: 03/08/2022 |
| 16 | +ms.author: markvi |
| 17 | +ms.reviewer: sahandle |
| 18 | + |
| 19 | +ms.collection: M365-identity-device-management |
| 20 | +--- |
| 21 | + |
| 22 | +# Identity protection risk analysis workbook |
| 23 | + |
| 24 | +Azure AD Identity Protection detects, remediates, and prevents compromised identities. As an IT administrator, you want to understand risk trends in your organizations and opportunities for better policy configuration. With the Identity Protection Risky Analysis Workbook, you can answer common questions about your Identity Protection implementation. |
| 25 | + |
| 26 | +This article provides you with an overview of this workbook. |
| 27 | + |
| 28 | + |
| 29 | +## Description |
| 30 | + |
| 31 | + |
| 32 | + |
| 33 | + |
| 34 | +As an IT administrator, you need to understand trends in identity risks and gaps in your policy implementations to ensure you are best protecting your organizations from identity compromise. The identity protection risk analysis workbook helps you analyze the state of risk in your organization. |
| 35 | + |
| 36 | +**This workbook:** |
| 37 | + |
| 38 | +- Provides visualizations of where in the world risk is being detected. |
| 39 | + |
| 40 | +- Allows you to understand the trends in real time vs. Offline risk detections. |
| 41 | + |
| 42 | +- Provides insight into how effective you are at responding to risky users. |
| 43 | + |
| 44 | + |
| 45 | + |
| 46 | + |
| 47 | + |
| 48 | +## Sections |
| 49 | + |
| 50 | +This workbook has five sections: |
| 51 | + |
| 52 | +- Heatmap of risk detections |
| 53 | + |
| 54 | +- Offline vs real-time risk detections |
| 55 | + |
| 56 | +- Risk detection trends |
| 57 | + |
| 58 | +- Risky users |
| 59 | + |
| 60 | +- Summary |
| 61 | + |
| 62 | + |
| 63 | + |
| 64 | + |
| 65 | + |
| 66 | + |
| 67 | + |
| 68 | +## Filters |
| 69 | + |
| 70 | + |
| 71 | +This workbook supports setting a time range filter. |
| 72 | + |
| 73 | + |
| 74 | + |
| 75 | + |
| 76 | +There are more filters in the risk detection trends and risky users sections. |
| 77 | + |
| 78 | +Risk Detection Trends: |
| 79 | + |
| 80 | +- Detection timing type (real-time or offline) |
| 81 | + |
| 82 | +- Risk level (low, medium, high, or none) |
| 83 | + |
| 84 | +Risky Users: |
| 85 | + |
| 86 | +- Risk detail (which indicates what changed a user’s risk level) |
| 87 | + |
| 88 | +- Risk level (low, medium, high, or none) |
| 89 | + |
| 90 | + |
| 91 | +## Best practices |
| 92 | + |
| 93 | + |
| 94 | +- **[Enable risky sign-in policies](../identity-protection/concept-identity-protection-policies.md)** - To prompt for multi-factor authentication (MFA) on medium risk or above. Enabling the policy reduces the proportion of active real-time risk detections by allowing legitimate users to self-remediate the risk detections with MFA. |
| 95 | + |
| 96 | +- **[Enable a risky user policy](../identity-protection/howto-identity-protection-configure-risk-policies.md#user-risk-with-conditional-access)** - To enable users to securely remediate their accounts when they are high risk. Enabling the policy reduces the number of active at-risk users in your organization by returning the user’s credentials to a safe state. |
| 97 | + |
| 98 | + |
| 99 | + |
| 100 | + |
| 101 | + |
| 102 | +## Next steps |
| 103 | + |
| 104 | +- To learn more about identity protection, see [What is identity protection](../identity-protection/overview-identity-protection.md). |
| 105 | + |
| 106 | +- For more information about Azure AD workbooks, see [How to use Azure AD workbooks](howto-use-azure-monitor-workbooks.md). |
| 107 | + |
0 commit comments