Skip to content

Commit 4242e47

Browse files
authored
Merge pull request #271231 from JnHs/jh-mobile-entrarisk
add Identity Protection section
2 parents 56f7e4b + c645a16 commit 4242e47

File tree

1 file changed

+34
-8
lines changed

1 file changed

+34
-8
lines changed

articles/azure-portal/mobile-app/microsoft-entra-id.md

Lines changed: 34 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Use Microsoft Entra ID with the Azure mobile app
33
description: Use the Azure mobile app to manage users and groups with Microsoft Entra ID.
4-
ms.date: 03/08/2024
4+
ms.date: 04/04/2024
55
ms.topic: conceptual
66
---
77

@@ -12,7 +12,7 @@ The Azure mobile app provides access to Microsoft Entra ID. You can perform task
1212
To access Microsoft Entra ID, open the Azure mobile app and sign in with your Azure account. From **Home**, scroll down to select the **Microsoft Entra ID** card.
1313

1414
> [!NOTE]
15-
> Your account must have the appropriate permissions in order to perform these tasks. For example, to invite a user to your tenant, you must have a role that includes this permission, such as [Guest Inviter](/entra/identity/role-based-access-control/permissions-reference) role or [User Administrator](/entra/identity/role-based-access-control/permissions-reference).
15+
> Your account must have the appropriate permissions in order to perform these tasks. For example, to invite a user to your tenant, you must have a role that includes this permission, such as [Guest Inviter](/entra/identity/role-based-access-control/permissions-reference) or [User Administrator](/entra/identity/role-based-access-control/permissions-reference).
1616
1717
## Invite a user to the tenant
1818

@@ -30,8 +30,8 @@ To add one or more users to a group from the Azure mobile app:
3030
1. Search or scroll to find the desired group, then tap to select it.
3131
1. On the **Members** card, select **See All**. The current list of members is displayed.
3232
1. Select the **+** icon in the top right corner.
33-
1. Search or scroll to find users you want to add to the group, then select the user(s) by tapping the circle next to their name.
34-
1. Select **Add** in the top right corner to add the selected users(s) to the group.
33+
1. Search or scroll to find users you want to add to the group, then select one or more users by tapping the circle next to their name.
34+
1. Select **Add** in the top right corner to add the selected users to the group.
3535

3636
## Add group memberships for a specified user
3737

@@ -40,20 +40,46 @@ You can also add a single user to one or more groups in the **Users** section of
4040
1. In **Microsoft Entra ID**, select **Users**, then search or scroll to find and select the desired user.
4141
1. On the **Groups** card, select **See All** to display all current group memberships for that user.
4242
1. Select the **+** icon in the top right corner.
43-
1. Search or scroll to find groups to which this user should be added, then select the group(s) by tapping the circle next to the group name.
44-
1. Select **Add** in the top right corner to add the user to the selected group(s).
43+
1. Search or scroll to find groups to which this user should be added, then select one or more groups by tapping the circle next to the group name.
44+
1. Select **Add** in the top right corner to add the user to the selected groups.
4545

4646
## Manage authentication methods or reset password for a user
4747

48-
To [manage authentication methods](/entra/identity/authentication/concept-authentication-methods-manage) or [reset a user's password](/entra/fundamentals/users-reset-password-azure-portal), you need to do the following steps:
48+
To [manage authentication methods](/entra/identity/authentication/concept-authentication-methods-manage) or [reset a user's password](/entra/fundamentals/users-reset-password-azure-portal):
4949

5050
1. In **Microsoft Entra ID**, select **Users**, then search or scroll to find and select the desired user.
5151
1. On the **Authentication methods** card, select **Manage**.
52-
1. Select **Reset password** to assign a temporary password to the user, or **Authentication methods** to manage to Tap on the desired user, then tap on “Reset password” or “Authentication methods” based on your permissions.
52+
1. Select **Reset password** to assign a temporary password to the user, or **Authentication methods** to manage authentication methods for self-service password reset.
5353

5454
> [!NOTE]
5555
> You won't see the **Authentication methods** card if you don't have the appropriate permissions to manage authentication methods and/or password changes for a user.
5656
57+
## Investigate risky users and sign-ins
58+
59+
[Microsoft Entra ID Protection](/entra/id-protection/overview-identity-protection) provides organizations with reporting they can use to [investigate identity risks in their environment](/entra/id-protection/howto-identity-protection-investigate-risk).
60+
61+
If you have the [necessary permissions and license](/entra/id-protection/overview-identity-protection#required-roles), you'll see details in the **Risky users** and **Risky sign-ins** sections within **Microsoft Entra ID**. You can open these sections to view more information and perform some management tasks.
62+
63+
### Manage risky users
64+
65+
1. In **Microsoft Entra ID**, scroll down to the **Security** card and then select **Risky users**.
66+
1. Search or scroll to find and select a specific risky user.
67+
1. Review basic information for this user, a list of their risky sign-ins, and their risk history.
68+
1. To [take action on the user](/entra/id-protection/howto-identity-protection-investigate-risk), select the three dots near the top of the screen. You can:
69+
70+
* Reset the user's password
71+
* Confirm user compromise
72+
* Dismiss user risk
73+
* Block the user from signing in (or unblock, if previously blocked)
74+
75+
### Monitor risky sign-ins
76+
77+
1. In **Microsoft Entra ID**, scroll down to the **Security** card and then select **Risky sign-ins**. It may take a minute or two for the list of all risky sign-ins to load.
78+
79+
1. Search or scroll to find and select a specific risky sign-in.
80+
81+
1. Review details about the risky sign-in.
82+
5783
## Activate Privileged Identity Management (PIM) roles
5884

5985
If you have been made eligible for an administrative role through Microsoft Entra Privileged Identity Management (PIM), you must activate the role assignment when you need to perform privileged actions. This activation can be done from within the Azure mobile app.

0 commit comments

Comments
 (0)