Skip to content

Commit 1bc57d5

Browse files
committed
2 parents 33ad3d5 + e5f80bd commit 1bc57d5

18 files changed

+128
-113
lines changed

articles/active-directory/authentication/howto-mfa-getstarted.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -103,8 +103,8 @@ If your organization uses [Azure AD Identity Protection](../identity-protection/
103103
Risk policies include:
104104

105105
- [Require all users to register for Azure AD Multi-Factor Authentication](../identity-protection/howto-identity-protection-configure-mfa-policy.md)
106-
- [Require a password change for users that are high-risk](../identity-protection/howto-identity-protection-configure-risk-policies.md#user-risk-with-conditional-access)
107-
- [Require MFA for users with medium or high sign in risk](../identity-protection/howto-identity-protection-configure-risk-policies.md#sign-in-risk-with-conditional-access)
106+
- [Require a password change for users that are high-risk](../identity-protection/howto-identity-protection-configure-risk-policies.md#user-risk-policy-in-conditional-access)
107+
- [Require MFA for users with medium or high sign in risk](../identity-protection/howto-identity-protection-configure-risk-policies.md#sign-in-risk-policy-in-conditional-access)
108108

109109
### Convert users from per-user MFA to Conditional Access based MFA
110110

articles/active-directory/identity-protection/TOC.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@
1111
href: concept-identity-protection-security-overview.md
1212
- name: What are risks?
1313
href: concept-identity-protection-risks.md
14-
- name: Identity Protection policies
14+
- name: Risk-based access policies
1515
href: concept-identity-protection-policies.md
1616
- name: What is the sign-in experience?
1717
href: concept-identity-protection-user-experience.md
Lines changed: 44 additions & 24 deletions
Original file line numberDiff line numberDiff line change
@@ -1,63 +1,83 @@
11
---
2-
title: Azure AD Identity Protection policies
3-
description: Identifying the three policies that are enabled with Identity Protection
2+
title: Azure AD Identity Protection risk-based access policies
3+
description: Identifying risk-based Conditional Access policies
44

55
services: active-directory
66
ms.service: active-directory
77
ms.subservice: identity-protection
88
ms.topic: conceptual
9-
ms.date: 08/22/2022
9+
ms.date: 10/04/2022
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
1313
manager: amycolannino
14-
ms.reviewer: sahandle
14+
ms.reviewer: chuqiaoshi
1515

1616
ms.collection: M365-identity-device-management
1717
---
18-
# Identity Protection policies
18+
# Risk-based access policies
1919

20-
Azure Active Directory Identity Protection includes three default policies that administrators can choose to enable. These policies include limited customization but are applicable to most organizations. All of the policies allow for excluding users such as your [emergency access or break-glass administrator accounts](../roles/security-emergency-access.md).
20+
Access control policies can be applied to protect organizations when a sign-in or user is detected to be at risk. Such policies are called **risk-based policies**.
2121

22-
![Identity Protection policies](./media/concept-identity-protection-policies/identity-protection-policies.png)
22+
Azure AD Conditional Access offers two risk conditions: **Sign-in risk** and **User risk**. Organizations can create risk-based Conditional Access policies by configuring these two risk conditions and choosing an access control method. During each sign-in, Identity Protection sends the detected risk levels to Conditional Access, and the risk-based policies will apply if the policy conditions are satisfied.
2323

24-
## Azure AD MFA registration policy
24+
![Diagram that shows a conceptual risk-based Conditional Access policy.](./media/concept-identity-protection-policies/risk-based-conditional-access-diagram.png)
25+
26+
For example, as shown in the diagram below, if organizations have a sign-in risk policy that requires multifactor authentication when the sign-in risk level is medium or high, their users must complete multifactor authentication when their sign-in risk is medium or high.
2527

26-
Identity Protection can help organizations roll out Azure AD Multifactor Authentication (MFA) using a Conditional Access policy requiring registration at sign-in. Enabling this policy is a great way to ensure new users in your organization have registered for MFA on their first day. Multifactor authentication is one of the self-remediation methods for risk events within Identity Protection. Self-remediation allows your users to take action on their own to reduce helpdesk call volume.
28+
![Diagram that shows a conceptual risk-based Conditional Access policy with self-remediation.](./media/concept-identity-protection-policies/risk-based-conditional-access-policy-example.png)
2729

28-
More information about Azure AD Multifactor Authentication can be found in the article, [How it works: Azure AD Multifactor Authentication](../authentication/concept-mfa-howitworks.md).
30+
The example above also demonstrates a main benefit of a risk-based policy: **automatic risk remediation**. When a user successfully completes the required access control, like a secure password change, their risk is remediated. That sign-in session and user account won't be at risk, and no action is needed from the administrator.
2931

30-
## Sign-in risk policy
32+
Allowing users to self-remediate using this process will significantly reduce the risk investigation and remediation burden on the administrators while protecting your organizations from security compromises. More information about risk remediation can be found in the article, [Remediate risks and unblock users](howto-identity-protection-remediate-unblock.md).
3133

32-
Identity Protection analyzes signals from each sign-in, both real-time and offline, and calculates a risk score based on the probability that the sign-in wasn't really the user. Administrators can make a decision based on this risk score signal to enforce organizational requirements like:
34+
## Sign-in risk-based Conditional Access policy
35+
36+
During each sign-in, Identity Protection analyzes hundreds of signals in real-time and calculates a sign-in risk level that represents the probability that the given authentication request isn't authorized. This risk level then gets sent to Conditional Access, where the organization's configured policies are evaluated. Administrators can configure sign-in risk-based Conditional Access policies to enforce access controls based on sign-in risk, including requirements such as:
3337

3438
- Block access
3539
- Allow access
3640
- Require multifactor authentication
3741

38-
If risk is detected, users can perform multifactor authentication to self-remediate and close the risky sign-in event to prevent unnecessary noise for administrators.
39-
40-
> [!NOTE]
41-
> Users must have previously registered for Azure AD Multifactor Authentication before triggering the sign-in risk policy.
42+
If risks are detected on a sign-in, users can perform the required access control such as multifactor authentication to self-remediate and close the risky sign-in event to prevent unnecessary noise for administrators.
4243

43-
### Custom Conditional Access policy
44+
![Screenshot of a sign-in risk-based Conditional Access policy.](./media/concept-identity-protection-policies/sign-in-risk-policy.png)
4445

45-
Administrators can also choose to create a custom Conditional Access policy including sign-in risk as an assignment condition. More information about risk as a condition in a Conditional Access policy can be found in the article, [Conditional Access: Conditions](../conditional-access/concept-conditional-access-conditions.md#sign-in-risk)
46+
> [!NOTE]
47+
> Users must have previously registered for Azure AD multifactor authentication before triggering the sign-in risk policy.
4648
47-
![Custom Conditional Access sign-in risk policy](./media/concept-identity-protection-policies/identity-protection-custom-sign-in-policy.png)
49+
## User risk-based Conditional Access policy
4850

49-
## User risk policy
51+
Identity Protection analyzes signals about user accounts and calculates a risk score based on the probability that the user has been compromised. If a user has risky sign-in behavior, or their credentials have been leaked, Identity Protection will use these signals to calculate the user risk level. Administrators can configure user risk-based Conditional Access policies to enforce access controls based on user risk, including requirements such as:
5052

51-
Identity Protection can calculate what it believes is normal for a user's behavior and use that to base decisions for their risk. User risk is a calculation of probability that an identity has been compromised. Administrators can make a decision based on this risk score signal to enforce organizational requirements. Administrators can choose to block access, allow access, or allow access but require a password change using [Azure AD self-service password reset](../authentication/howto-sspr-deployment.md).
53+
- Block access
54+
- Allow access but require a secure password change using [Azure AD self-service password reset](../authentication/howto-sspr-deployment.md).
5255

53-
If risk is detected, users can perform self-service password reset to self-remediate and close the user risk event to prevent unnecessary noise for administrators.
56+
A secure password change will remediate the user risk and close the risky user event to prevent unnecessary noise for administrators.
5457

5558
> [!NOTE]
5659
> Users must have previously registered for self-service password reset before triggering the user risk policy.
5760
61+
## Identity Protection policies
62+
63+
While Identity Protection also offers a user interface for creating user risk policy and sign-in risk policy, we highly recommend that you [use Azure AD Conditional Access to create risk-based policies](howto-identity-protection-configure-risk-policies.md) for the following benefits:
64+
65+
- Rich set of conditions to control access: Conditional Access offers a rich set of conditions such as applications and locations for configuration. The risk conditions can be used in combination with other conditions to create policies that best enforce your organizational requirements.
66+
- Multiple risk-based policies can be put in place to target different user groups or apply different access control for different risk levels.
67+
- Conditional Access policies can be created through Microsoft Graph API and can be tested first in report-only mode.
68+
- Manage all access policies in one place in Conditional Access.
69+
70+
If you already have Identity Protection risk policies set up, we encourage you to [migrate them to Conditional Access](howto-identity-protection-configure-risk-policies.md#migrate-risk-policies-from-identity-protection-to-conditional-access).
71+
72+
## Azure AD MFA registration policy
73+
74+
Identity Protection can help organizations roll out Azure AD multifactor authentication (MFA) using a policy requiring registration at sign-in. Enabling this policy is a great way to ensure new users in your organization have registered for MFA on their first day. Multifactor authentication is one of the self-remediation methods for risk events within Identity Protection. Self-remediation allows your users to take action on their own to reduce helpdesk call volume.
75+
76+
More information about Azure AD multifactor authentication can be found in the article, [How it works: Azure AD multifactor authentication](../authentication/concept-mfa-howitworks.md).
77+
5878
## Next steps
5979

6080
- [Enable Azure AD self-service password reset](../authentication/howto-sspr-deployment.md)
61-
- [Enable Azure AD Multifactor Authentication](../authentication/howto-mfa-getstarted.md)
62-
- [Enable Azure AD Multifactor Authentication registration policy](howto-identity-protection-configure-mfa-policy.md)
81+
- [Enable Azure AD multifactor authentication](../authentication/howto-mfa-getstarted.md)
82+
- [Enable Azure AD multifactor authentication registration policy](howto-identity-protection-configure-mfa-policy.md)
6383
- [Enable sign-in and user risk policies](howto-identity-protection-configure-risk-policies.md)

articles/active-directory/identity-protection/concept-identity-protection-risks.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ ms.date: 08/16/2022
1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
1313
manager: amycolannino
14-
ms.reviewer: sahandle, chuqiaoshi
14+
ms.reviewer: chuqiaoshi
1515

1616
ms.collection: M365-identity-device-management
1717
---
@@ -99,7 +99,7 @@ Premium detections are visible only to Azure AD Premium P2 customers. Customers
9999

100100
### Risk levels
101101

102-
Identity Protection categorizes risk into three tiers: low, medium, and high. When configuring [custom Identity protection policies](./concept-identity-protection-policies.md#custom-conditional-access-policy), you can also configure it to trigger upon **No risk** level. No Risk means there's no active indication that the user's identity has been compromised.
102+
Identity Protection categorizes risk into three tiers: low, medium, and high. When configuring [Identity protection policies](./concept-identity-protection-policies.md), you can also configure it to trigger upon **No risk** level. No Risk means there's no active indication that the user's identity has been compromised.
103103

104104
Microsoft doesn't provide specific details about how risk is calculated. Each level of risk brings higher confidence that the user or sign-in is compromised. For example, something like one instance of unfamiliar sign-in properties for a user might not be as threatening as leaked credentials for another user.
105105

articles/active-directory/identity-protection/concept-identity-protection-user-experience.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ ms.collection: M365-identity-device-management
1919

2020
With Azure Active Directory Identity Protection, you can:
2121

22-
* Require users to register for Azure AD Multi-Factor Authentication (MFA)
22+
* Require users to register for Azure AD multifactor authentication (MFA)
2323
* Automate remediation of risky sign-ins and compromised users
2424

2525
All of the Identity Protection policies have an impact on the sign in experience for users. Allowing users to register for and use tools like Azure AD MFA and self-service password reset can lessen the impact. These tools along with the appropriate policy choices gives users a self-remediation option when they need it.
@@ -34,7 +34,7 @@ Enabling the Identity Protection policy requiring multi-factor authentication re
3434

3535
![More information required](./media/concept-identity-protection-user-experience/identity-protection-experience-more-info-mfa.png)
3636

37-
1. Complete the guided steps to register for Azure AD Multi-Factor Authentication and complete your sign-in.
37+
1. Complete the guided steps to register for Azure AD multifactor authentication and complete your sign-in.
3838

3939
## Risky sign-in remediation
4040

articles/active-directory/identity-protection/howto-identity-protection-configure-mfa-policy.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -15,20 +15,20 @@ ms.reviewer: sahandle
1515

1616
ms.collection: M365-identity-device-management
1717
---
18-
# How To: Configure the Azure AD Multifactor Authentication registration policy
18+
# How To: Configure the Azure AD multifactor authentication registration policy
1919

20-
Azure Active Directory (Azure AD) Identity Protection helps you manage the roll-out of Azure AD Multifactor Authentication (MFA) registration by configuring a Conditional Access policy to require MFA registration no matter what modern authentication app you're signing in to.
20+
Azure Active Directory (Azure AD) Identity Protection helps you manage the roll-out of Azure AD multifactor authentication (MFA) registration by configuring a Conditional Access policy to require MFA registration no matter what modern authentication app you're signing in to.
2121

22-
## What is the Azure AD Multifactor Authentication registration policy?
22+
## What is the Azure AD multifactor authentication registration policy?
2323

24-
Azure AD Multifactor Authentication provides a means to verify who you are using more than just a username and password. It provides a second layer of security to user sign-ins. In order for users to be able to respond to MFA prompts, they must first register for Azure AD Multifactor Authentication.
24+
Azure AD multifactor authentication provides a means to verify who you are using more than just a username and password. It provides a second layer of security to user sign-ins. In order for users to be able to respond to MFA prompts, they must first register for Azure AD multifactor authentication.
2525

26-
We recommend that you require Azure AD Multifactor Authentication for user sign-ins because it:
26+
We recommend that you require Azure AD multifactor authentication for user sign-ins because it:
2727

2828
- Delivers strong authentication through a range of verification options.
2929
- Plays a key role in preparing your organization to self-remediate from risk detections in Identity Protection.
3030

31-
For more information on Azure AD Multifactor Authentication, see [What is Azure AD Multifactor Authentication?](../authentication/howto-mfa-getstarted.md)
31+
For more information on Azure AD multifactor authentication, see [What is Azure AD multifactor authentication?](../authentication/howto-mfa-getstarted.md)
3232

3333
## Policy configuration
3434

@@ -54,4 +54,4 @@ For an overview of the related user experience, see:
5454

5555
- [Enable Azure AD self-service password reset](../authentication/howto-sspr-deployment.md)
5656

57-
- [Enable Azure AD Multifactor Authentication](../authentication/howto-mfa-getstarted.md)
57+
- [Enable Azure AD multifactor authentication](../authentication/howto-mfa-getstarted.md)

0 commit comments

Comments
 (0)