You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/hybrid/how-to-connect-health-adfs-risky-ip-workbook.md
+1-4Lines changed: 1 addition & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -46,7 +46,7 @@ The Risky IP report workbook is powered from data in the ADFSSignInLogs stream a
46
46
47
47
The risky IP workbook analyzes data from ADFSSignInLogs to help you detect password spray or password brute force attacks. The workbook has two parts. The first part "Risky IP Analysis" identifies risky IP addresses based on designated error thresholds and detection window length. The second part provides the sign-in details and error counts for selected IPs.
48
48
49
-
[](./media/how-to-connect-health-adfs-risky-ip-workbook/workbook-template-overview.png#lightbox)
49
+
[](./media/how-to-connect-health-adfs-risky-ip-workbook/workbook-template-overview-1.png#lightbox)
50
50
51
51
- The workook displays a map visualization and region breakdown for a quick analysis of risky IP location.
52
52
- Risky IP details table parallels the functionality of the past Risky IP report. For details on the fields in the table, view the below section.
@@ -65,7 +65,6 @@ Each item in the Risky IP report table shows aggregated information about failed
65
65
| Extranet Lock Out Error Count (30030) | The count of Extranet Lockout error occurred from the IP address during the detection time window. The Extranet Lockout errors can happen multiple times to certain users. This will only be seen if Extranet Lockout is configured in AD FS (versions 2012R2 or higher). <b>Note</b> We strongly recommend turning this feature on if you allow extranet logins using passwords. |
66
66
| Unique Users Attempted | The count of unique user accounts attempted from the IP address during the detection time window. This provides a mechanism to differentiate a single user attack pattern versus multi-user attack pattern. |
67
67
68
-
[](./media/how-to-connect-health-adfs-risky-ip-workbook/sign-in-details.png#lightbox).
69
68
Filter the report by IP address or user name to see an expanded view of sign-ins details for each risky IP event.
70
69
71
70
## Load balancer IP addresses in the list
@@ -86,8 +85,6 @@ Alerting threshold can be updated through Threshold Settings. To start with, sys
86
85
## Configure notification alerts using Azure Monitor Alerts through the Azure Portal:
1. In the Azure Portal, search for “Monitor” in the search bar to navigate to the Azure “Monitor” service. Select “Alerts” from the left menu, then “+ New alert rule”.
0 commit comments