Skip to content

Commit 2108126

Browse files
committed
2 parents c91a150 + 6f54343 commit 2108126

File tree

198 files changed

+2204
-1895
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

198 files changed

+2204
-1895
lines changed

.openpublishing.redirection.active-directory.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -45,6 +45,11 @@
4545
"redirect_url": "/azure/active-directory/saas-apps/tutorial-list",
4646
"redirect_document_id": false
4747
},
48+
{
49+
"source_path_from_root": "/articles/active-directory/saas-apps/icertisicm-tutorial.md",
50+
"redirect_url": "/azure/active-directory/saas-apps/tutorial-list",
51+
"redirect_document_id": false
52+
},
4853
{
4954
"source_path_from_root": "/articles/active-directory/governance/tutorial-onboard-custom-workflow-graph.md",
5055
"redirect_url": "/graph/tutorial-lifecycle-workflows-onboard-custom-workflow",

.openpublishing.redirection.defender-for-iot.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,10 @@
11
{
22
"redirections": [
3+
{
4+
"source_path_from_root": "/articles/defender-for-iot/organizations/tutorial-getting-started-eiot-sensor.md",
5+
"redirect_url": "/azure/defender-for-iot/organizations/concept-enterprise",
6+
"redirect_document_id": false
7+
},
38
{
49
"source_path_from_root": "/articles/defender-for-iot/organizations/resources-frequently-asked-questions.md",
510
"redirect_url": "/azure/defender-for-iot/organizations/faqs-general",

articles/active-directory/identity-protection/concept-identity-protection-policies.md

Lines changed: 2 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: identity-protection
88
ms.topic: conceptual
9-
ms.date: 10/04/2022
9+
ms.date: 11/11/2022
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -51,13 +51,10 @@ If risks are detected on a sign-in, users can perform the required access contro
5151
Identity Protection analyzes signals about user accounts and calculates a risk score based on the probability that the user has been compromised. If a user has risky sign-in behavior, or their credentials have been leaked, Identity Protection will use these signals to calculate the user risk level. Administrators can configure user risk-based Conditional Access policies to enforce access controls based on user risk, including requirements such as:
5252

5353
- Block access
54-
- Allow access but require a secure password change using [Azure AD self-service password reset](../authentication/howto-sspr-deployment.md).
54+
- Allow access but require a secure password change.
5555

5656
A secure password change will remediate the user risk and close the risky user event to prevent unnecessary noise for administrators.
5757

58-
> [!NOTE]
59-
> Users must have previously registered for self-service password reset before triggering the user risk policy.
60-
6158
## Identity Protection policies
6259

6360
While Identity Protection also offers a user interface for creating user risk policy and sign-in risk policy, we highly recommend that you [use Azure AD Conditional Access to create risk-based policies](howto-identity-protection-configure-risk-policies.md) for the following benefits:

articles/active-directory/identity-protection/concept-identity-protection-risks.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: identity-protection
88
ms.topic: conceptual
9-
ms.date: 08/16/2022
9+
ms.date: 11/10/2022
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -85,7 +85,8 @@ Premium detections are visible only to Azure AD Premium P2 customers. Customers
8585
| Risk detection | Detection type | Description |
8686
| --- | --- | --- |
8787
| Possible attempt to access Primary Refresh Token (PRT) | Offline | This risk detection type is detected by Microsoft Defender for Endpoint (MDE). A Primary Refresh Token (PRT) is a key artifact of Azure AD authentication on Windows 10, Windows Server 2016, and later versions, iOS, and Android devices. A PRT is a JSON Web Token (JWT) that's specially issued to Microsoft first-party token brokers to enable single sign-on (SSO) across the applications used on those devices. Attackers can attempt to access this resource to move laterally into an organization or perform credential theft. This detection will move users to high risk and will only fire in organizations that have deployed MDE. This detection is low-volume and will be seen infrequently by most organizations. However, when it does occur it's high risk and users should be remediated. |
88-
| Anomalous user activity | Offline | This risk detection indicates that suspicious patterns of activity have been identified for an authenticated user. The post-authentication behavior of users is assessed for anomalies. This behavior is based on actions occurring for the account, along with any sign-in risk detected. |
88+
| Anomalous user activity | Offline | This risk detection baselines normal administrative user behavior in Azure AD, and spots anomalous patterns of behavior like suspicious changes to the directory. The detection is triggered against the administrator making the change or the object that was changed. |
89+
8990

9091
#### Nonpremium user risk detections
9192

articles/active-directory/identity-protection/concept-identity-protection-user-experience.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: identity-protection
88
ms.topic: conceptual
9-
ms.date: 01/21/2022
9+
ms.date: 11/11/2022
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -42,7 +42,7 @@ When an administrator has configured a policy for sign-in risks, affected users
4242

4343
### Risky sign-in self-remediation
4444

45-
1. The user is informed that something unusual was detected about their sign-in. This could be something like, such as signing in from a new location, device, or app.
45+
1. The user is informed that something unusual was detected about their sign-in. This behavior could be something like, such as signing in from a new location, device, or app.
4646

4747
![Something unusual prompt](./media/concept-identity-protection-user-experience/120.png)
4848

@@ -84,7 +84,7 @@ If your organization has users who are delegated access to another tenant and th
8484
1. An organization has a managed service provider (MSP) or cloud solution provider (CSP) who takes care of configuring their cloud environment.
8585
1. One of the MSPs technicians credentials are leaked and triggers high risk. That technician is blocked from signing in to other tenants.
8686
1. The technician can self-remediate and sign in if the home tenant has enabled the appropriate policies [requiring password change for high risk users](../conditional-access/howto-conditional-access-policy-risk-user.md) or [MFA for risky users](../conditional-access/howto-conditional-access-policy-risk.md).
87-
1. If the home tenant hasn't enabled self-remediation policies, an administrator in the technician's home tenant will have to [remediate the risk](howto-identity-protection-remediate-unblock.md#remediation).
87+
1. If the home tenant hasn't enabled self-remediation policies, an administrator in the technician's home tenant will have to [remediate the risk](howto-identity-protection-remediate-unblock.md#risk-remediation).
8888

8989
## See also
9090

articles/active-directory/identity-protection/concept-workload-identity-risk.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: identity-protection
88
ms.topic: conceptual
9-
ms.date: 02/07/2022
9+
ms.date: 11/10/2022
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -54,8 +54,8 @@ We detect risk on workload identities across sign-in behavior and offline indica
5454
| Admin confirmed account compromised | Offline | This detection indicates an admin has selected 'Confirm compromised' in the Risky Workload Identities UI or using riskyServicePrincipals API. To see which admin has confirmed this account compromised, check the account’s risk history (via UI or API). |
5555
| Leaked Credentials | Offline | This risk detection indicates that the account's valid credentials have been leaked. This leak can occur when someone checks in the credentials in public code artifact on GitHub, or when the credentials are leaked through a data breach. <br><br> When the Microsoft leaked credentials service acquires credentials from GitHub, the dark web, paste sites, or other sources, they're checked against current valid credentials in Azure AD to find valid matches. |
5656
| Malicious application | Offline | This detection indicates that Microsoft has disabled an application for violating our terms of service. We recommend [conducting an investigation](https://go.microsoft.com/fwlink/?linkid=2208429) of the application.|
57-
| Suspicious application | Offline | This detection indicates that Microsoft has identified an application that may be violating our terms of service, but has not disabled it. We recommend [conducting an investigation](https://go.microsoft.com/fwlink/?linkid=2208429) of the application.|
58-
| Anomalous service principal activity | Offline | This risk detection indicates that suspicious patterns of activity have been identified for an authenticated service principal. The post-authentication behavior of service principals is assessed for anomalies. This behavior is based on actions occurring for the account, along with any sign-in risk detected. |
57+
| Suspicious application | Offline | This detection indicates that Microsoft has identified an application that may be violating our terms of service, but hasn't disabled it. We recommend [conducting an investigation](https://go.microsoft.com/fwlink/?linkid=2208429) of the application.|
58+
| Anomalous service principal activity | Offline | This risk detection baselines normal administrative service principal behavior in Azure AD, and spots anomalous patterns of behavior like suspicious changes to the directory. The detection is triggered against the administrative service principal making the change or the object that was changed. |
5959

6060
## Identify risky workload identities
6161

articles/active-directory/identity-protection/howto-identity-protection-investigate-risk.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: identity-protection
88
ms.topic: how-to
9-
ms.date: 01/24/2022
9+
ms.date: 11/11/2022
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -100,7 +100,7 @@ Administrators can then choose to return to the user's risk or sign-ins report t
100100
Organizations may use the following frameworks to begin their investigation into any suspicious activity. Investigations may require having a conversation with the user in question, review of the [sign-in logs](../reports-monitoring/concept-sign-ins.md), or review of the [audit logs](../reports-monitoring/concept-audit-logs.md) to name a few.
101101

102102
1. Check the logs and validate whether the suspicious activity is normal for the given user.
103-
1. Look at the user’s past activities including at least the following properties to see if they are normal for the given user.
103+
1. Look at the user’s past activities including at least the following properties to see if they're normal for the given user.
104104
1. Application
105105
1. Device - Is the device registered or compliant?
106106
1. Location - Is the user traveling to a different location or accessing devices from multiple locations?

0 commit comments

Comments
 (0)