Skip to content

Commit 46494f7

Browse files
authored
Merge pull request #107094 from neeleshray-msft/patch-14
(AzureCXP) fixes MicrosoftDocs/azure-docs#49833
2 parents 0ada36c + 3f6af11 commit 46494f7

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

articles/active-directory/identity-protection/concept-identity-protection-risks.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ Identity Protection provides organizations access to powerful resources to see a
2727

2828
There are two types of risk **User** and **Sign-in** and two types of detection or calculation **Real-time** and **Offline**.
2929

30-
### User risk'
30+
### User risk
3131

3232
A user risk represents the probability that a given identity or account is compromised.
3333

@@ -38,7 +38,7 @@ These risks are calculated offline using Microsoft's internal and external threa
3838
| Leaked credentials | This risk detection type indicates that the user's valid credentials have been leaked. When cybercriminals compromise valid passwords of legitimate users, they often share those credentials. This sharing is typically done by posting publicly on the dark web, paste sites, or by trading and selling the credentials on the black market. When the Microsoft leaked credentials service acquires user credentials from the dark web, paste sites, or other sources, they are checked against Azure AD users' current valid credentials to find valid matches. |
3939
| Azure AD threat intelligence | This risk detection type indicates user activity that is unusual for the given user or is consistent with known attack patterns based on Microsoft's internal and external threat intelligence sources. |
4040

41-
### Sign-in risk'
41+
### Sign-in risk
4242

4343
A sign-in risk represents the probability that a given authentication request isn't authorized by the identity owner.
4444

@@ -66,4 +66,4 @@ These risks can be calculated in real-time or calculated offline using Microsoft
6666
- [Policies available to mitigate risks](concept-identity-protection-policies.md)
6767

6868
- [Security overview](concept-identity-protection-security-overview.md)
69-
""'
69+
""'

0 commit comments

Comments
 (0)