Skip to content

Commit 27737c7

Browse files
authored
Merge pull request #114597 from iainfoulds/azuread-riskysignintutorial
[AzureAD] Risk-based sign-in tutorial refactoring
2 parents 2fd5394 + 6bb5771 commit 27737c7

File tree

6 files changed

+100
-55
lines changed

6 files changed

+100
-55
lines changed

articles/active-directory/authentication/TOC.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@
1515
href: tutorial-enable-sspr-writeback.md
1616
- name: Configure custom banned password lists
1717
href: tutorial-configure-custom-password-protection.md
18-
- name: Integrate Azure Identity Protection
18+
- name: Enable risk-based sign-in protection
1919
href: tutorial-risk-based-sspr-mfa.md
2020
- name: Concepts
2121
expanded: true
71.8 KB
Loading
39.1 KB
Loading
38.6 KB
Loading
Lines changed: 99 additions & 54 deletions
Original file line numberDiff line numberDiff line change
@@ -1,90 +1,135 @@
11
---
2-
title: Risk-based MFA and SSPR with Azure Identity Protection
3-
description: In this tutorial, you will enable Azure Identity Protection integrations, for Multi-Factor Authentication and self-service password reset, to reduce risky behavior.
2+
title: Risk-based user sign-in protection in Azure Active Directory
3+
description: In this tutorial, you learn how to enable Azure Identity Protection to protect users when risky sign-in behavior is detected on their account.
44

5-
services: multi-factor-authentication
5+
services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: tutorial
9-
ms.date: 01/31/2018
9+
ms.date: 05/11/2020
1010

1111
ms.author: iainfou
1212
author: iainfoulds
1313
manager: daveba
14-
ms.reviewer: sahenry
1514

16-
# Customer intent: How, as an Azure AD Administrator, do I utilize Azure AD Identity Protection to better protect the sign-in process.
15+
# Customer intent: As an Azure AD Administrator, I want to learn how to use Azure Identity Protection to protect users by automatically detecting risk sign-in behavior and prompting for additional forms of authentication or request a password change.
1716
ms.collection: M365-identity-device-management
1817
---
19-
# Tutorial: Use risk detections to trigger Multi-Factor Authentication and password changes
18+
# Tutorial: Use risk detections for user sign-ins to trigger Azure Multi-Factor Authentication or password changes
2019

21-
In this tutorial, you will enable features of Azure Active Directory (Azure AD) Identity Protection, an Azure AD Premium P2 feature that is more than just a monitoring and reporting tool. To protect your organization's identities, you can configure risk-based policies that automatically respond to risky behaviors. These policies, can either automatically block or initiate remediation, including requiring password changes and enforcing Multi-Factor Authentication.
20+
To protect your users, you can configure risk-based policies in Azure Active Directory (Azure AD) that automatically respond to risky behaviors. Azure AD Identity Protection policies can automatically block a sign-in attempt or require additional action, such as require a password change or prompt for Azure Multi-Factor Authentication. These policies work with existing Azure AD Conditional Access policies as an extra layer of protection for org organization. Users may never trigger a risky behavior in one of these policies, but your organization is protected if an attempt to compromise your security is made.
2221

23-
Azure AD Identity Protection policies can be used in addition to existing Conditional Access policies as an extra layer of protection. Your users may never trigger a risky behavior requiring one of these policies, but as an administrator you know they are protected.
24-
25-
Some items that may trigger a risk detection include:
26-
27-
* Users with leaked credentials
28-
* Sign-ins from anonymous IP addresses
29-
* Impossible travel to atypical locations
30-
* Sign-ins from infected devices
31-
* Sign-ins from IP addresses with suspicious activity
32-
* Sign-ins from unfamiliar locations
33-
34-
More information about Azure AD Identity Protection can be found in the article [What is Azure AD Identity Protection](../active-directory-identityprotection.md)
22+
In this tutorial, you learn how to:
3523

3624
> [!div class="checklist"]
37-
> * Enable Azure MFA registration
25+
> * Understand the available policies for Azure AD Identity Protection
26+
> * Enable Azure Multi-Factor Authentication registration
3827
> * Enable risk-based password changes
3928
> * Enable risk-based Multi-Factor Authentication
29+
> * Test risk-based policies for user sign-in attempts
4030
4131
## Prerequisites
4232

43-
* Access to a working Azure AD tenant with at least a trial Azure AD Premium P2 license assigned.
44-
* An account with Global Administrator privileges in your Azure AD tenant.
45-
* Have completed the previous self-service password reset (SSPR) and Multi-Factor Authentication (MFA) tutorials.
33+
To complete this tutorial, you need the following resources and privileges:
34+
35+
* A working Azure AD tenant with at least an Azure AD Premium P2 trial license enabled.
36+
* If needed, [create one for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
37+
* An account with *Global Administrator* privileges.
38+
* Azure AD configured for self-service password reset and Azure Multi-Factor Authentication
39+
* If needed, [complete the tutorial to enable Azure AD SSPR](tutorial-enable-sspr.md).
40+
* If needed, [complete the tutorial to enable Azure Multi-Factor Authentication](tutorial-enable-azure-mfa.md).
41+
42+
## Overview of Azure AD Identity Protection
43+
44+
Each day, Microsoft collects and analyses trillions of anonymized signals as part of user sign-in attempts. These signals help build patterns of good user sign-in behavior, and identify potential risky sign-in attempts. Azure AD Identity Protection can review user sign-in attempts and take additional action if there's suspicious behavior:
45+
46+
Some of the following actions may trigger Azure AD Identity Protection risk detection:
47+
48+
* Users with leaked credentials.
49+
* Sign-ins from anonymous IP addresses.
50+
* Impossible travel to atypical locations.
51+
* Sign-ins from infected devices.
52+
* Sign-ins from IP addresses with suspicious activity.
53+
* Sign-ins from unfamiliar locations.
54+
55+
The following three policies are available in Azure AD Identity Protection to protect users and respond to suspicious activity. You can choose to turn the policy enforcement on or off, select users or groups for the policy to apply to, and decide if you want to block access at sign-in or prompt for additional action.
56+
57+
* User risk policy
58+
* Identifies and responds to user accounts that may have compromised credentials. Can prompt the user to create a new password.
59+
* Sign in risk policy
60+
* Identifies and responds to suspicious sign-in attempts. Can prompt the user to provide additional forms of verification using Azure Multi-Factor Authentication.
61+
* MFA registration policy
62+
* Makes sure users are registered for Azure Multi-Factor Authentication. If a sign-in risk policy prompts for MFA, the user must already be registered for Azure Multi-Factor Authentication.
63+
64+
When you enable a policy user or sign in risk policy, you can also choose the threshold for risk level - *low and above*, *medium and above*, or *high*. This flexibility lets you decide how aggressive you want to be in enforcing any controls for suspicious sign-in events.
65+
66+
For more information about Azure AD Identity Protection, see [What is Azure AD Identity Protection?](../identity-protection/overview-identity-protection.md)
67+
68+
## Enable MFA registration policy
4669

47-
## Enable risk-based policies for SSPR and MFA
70+
Azure AD Identity Protection includes a default policy that can help get users registered for Azure Multi-Factor Authentication. If you use additional policies to protect sign-in events, you would need users to have already registered for MFA. When you enable this policy, it doesn't require users to perform MFA at each sign-in event. The policy only checks the registration status for a user and asks them to pre-register if needed.
4871

49-
Enabling the risk-based policies is a straightforward process. The steps below will guide you through a sample configuration.
72+
It's recommended to enable the MFA registration policy for users that are to be enabled for additional Azure AD Identity Protection policies. To enable this policy, complete the following steps:
5073

51-
### Enable users to register for Multi-Factor Authentication
74+
1. Sign in to the [Azure portal](https://portal.azure.com) using a global administrator account.
75+
1. Search for and select **Azure Active Directory**, select **Security**, then under the *Protect* menu heading choose **Identity Protection**.
76+
1. Select the **MFA registration policy** from the menu on the left-hand side.
77+
1. By default, the policy applies to *All users*. If desired, select **Assignments**, then choose the users or groups to apply the policy on.
78+
1. Under *Controls*, select **Access**. Make sure the option for *Require Azure MFA registration* is checked, then choose **Select**.
79+
1. Set **Enforce Policy** to *On*, then select **Save**.
5280

53-
Azure AD Identity Protection includes a default policy that can help you to get your users registered for Multi-Factor Authentication and easily identify the current registration status. Enabling this policy does not start requiring users to perform Multi-Factor Authentication, but will ask them to pre-register.
81+
![Screenshot of how to require users to register for MFA in the Azure portal](./media/tutorial-risk-based-sspr-mfa/enable-mfa-registration.png)
5482

55-
1. Sign in to the [Azure portal](https://portal.azure.com).
56-
1. Click on **All services**, then browse to **Azure AD Identity Protection**.
57-
1. Click on **MFA registration**.
58-
1. Set Enforce Policy to **On**.
59-
1. Setting this policy will require all of your users to register methods to prepare to use by Multi-Factor Authentication.
60-
1. Click **Save**.
83+
## Enable user risk policy for password change
6184

62-
![Require users to register for MFA at sign-in](./media/tutorial-risk-based-sspr-mfa/risk-based-require-mfa-registration.png)
85+
Microsoft works with researchers, law enforcement, various security teams at Microsoft, and other trusted sources to find username and password pairs. When one of these pairs matches an account in your environment, a risk-based password change can be requested. This policy and action requires the user update their password before they can sign in to make sure any previously exposed credentials no longer work.
6386

64-
### Enable risk-based password changes
87+
To enable this policy, complete the following steps:
6588

66-
Microsoft works with researchers, law enforcement, various security teams at Microsoft, and other trusted sources to find username and password pairs. When one of these pairs matches an account in your environment, a risk-based password change can be triggered using the following policy.
89+
1. Select the **User risk policy** from the menu on the left-hand side.
90+
1. By default, the policy applies to *All users*. If desired, select **Assignments**, then choose the users or groups to apply the policy on.
91+
1. Under *Conditions*, choose **Select conditions > Select a risk level**, then choose *Medium and above*.
92+
1. Choose **Select**, then **Done**.
93+
1. Under *Access*, select **Access**. Make sure the option for **Allow access** and *Require password change* is checked, then choose **Select**.
94+
1. Set **Enforce Policy** to *On*, then select **Save**.
6795

68-
1. Click on User risk policy.
69-
1. Under **Conditions**, select **User risk**, then choose **Medium and above**.
70-
1. Click "Select" then "Done"
71-
1. Under **Access**, choose **Allow access**, and then select **Require password change**.
72-
1. Click "Select"
73-
1. Set Enforce Policy to **On**.
74-
1. Click **Save**
96+
![Screenshot of how to enable the user risk policy in the Azure portal](./media/tutorial-risk-based-sspr-mfa/enable-user-risk-policy.png)
7597

76-
### Enable risk-based Multi-Factor Authentication
98+
## Enable sign-in risk policy for MFA
7799

78-
Most users have a normal behavior that can be tracked, when they fall outside of this norm it could be risky to allow them to just sign in. You may want to block that user or maybe just ask them to perform a Multi-Factor Authentication to prove that they are really who they say they are. To enable a policy requiring MFA when a risky sign-in is detected, enable the following policy.
100+
Most users have a normal behavior that can be tracked. When they fall outside of this norm, it could be risky to allow them to successfully sign in. Instead, you may want to block that user, or ask them to perform a multi-factor authentication. If the user successfully completes the MFA challenge, you can consider it a valid sign-in attempt and grant access to the application or service.
79101

80-
1. Click on Sign-in risk policy
81-
1. Under **Conditions**, select **User risk**, then choose **Medium and above**.
82-
1. Click "Select" then "Done"
83-
1. Under **Access**, choose **Allow access**, and then select **Require multi-factor authentication**.
84-
1. Click "Select"
85-
1. Set Enforce Policy to **On**.
86-
1. Click **Save**
102+
To enable this policy, complete the following steps:
103+
104+
1. Select the **Sign-in risk policy** from the menu on the left-hand side.
105+
1. By default, the policy applies to *All users*. If desired, select **Assignments**, then choose the users or groups to apply the policy on.
106+
1. Under *Conditions*, choose **Select conditions > Select a risk level**, then choose *Medium and above*.
107+
1. Choose **Select**, then **Done**.
108+
1. Under *Access*, choose **Select a control**. Make sure the option for **Allow access** and *Require multi-factor authentication* is checked, then choose **Select**.
109+
1. Set **Enforce Policy** to *On*, then select **Save**.
110+
111+
![Screenshot of how to enable the sign-in risk policy in the Azure portal](./media/tutorial-risk-based-sspr-mfa/enable-sign-in-risk-policy.png)
112+
113+
## Test risky sign events
114+
115+
Most user sign-in events won't trigger the risk-based policies configured in the previous steps. A user may never see a prompt for additional MFA or to reset their password. If their credentials remain secure and their behavior consistent, their sign-in events would be successful.
116+
117+
To test the Azure AD Identity Protection policies created in the previous steps, you need a way to simulate risky behavior or potential attacks. The steps to do these tests vary based on the Azure AD Identity Protection policy you want to validate. For more information on scenarios and steps, see [Simulate risk detections in Azure AD Identity Protection](../identity-protection/howto-identity-protection-simulate-risk.md).
87118

88119
## Clean up resources
89120

90-
If you have completed testing and no longer want to have the risk-based policies enabled, return to each policy you want to disable, and set **Enforce Policy** to **Off**.
121+
If you have completed tests and no longer want to have the risk-based policies enabled, return to each policy you want to disable and set **Enforce Policy** to *Off*.
122+
123+
## Next steps
124+
125+
In this tutorial, you enabled risk-based user policies for Azure AD Identity Protection. You learned how to:
126+
127+
> [!div class="checklist"]
128+
> * Understand the available policies for Azure AD Identity Protection
129+
> * Enable Azure Multi-Factor Authentication registration
130+
> * Enable risk-based password changes
131+
> * Enable risk-based Multi-Factor Authentication
132+
> * Test risk-based policies for user sign-in attempts
133+
134+
> [!div class="nextstepaction"]
135+
> [Learn more about Azure AD Identity Protection](../identity-protection/overview-identity-protection.md)

0 commit comments

Comments
 (0)