Skip to content

Commit 47f5589

Browse files
authored
Update howto-identity-protection-remediate-unblock.md
1 parent 19acbe8 commit 47f5589

File tree

1 file changed

+6
-6
lines changed

1 file changed

+6
-6
lines changed

articles/active-directory/identity-protection/howto-identity-protection-remediate-unblock.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -19,14 +19,14 @@ ms.collection: M365-identity-device-management
1919

2020
After completing your [investigation](howto-identity-protection-investigate-risk.md), you need to take action to remediate the risky users or unblock them. Organizations can enable automated remediation by setting up [risk-based policies](howto-identity-protection-configure-risk-policies.md). Organizations should try to investigate and remediate all risky users in a time period that your organization is comfortable with. Microsoft recommends acting quickly, because time matters when working with risks.
2121

22-
## Risk Remediation
22+
## Risk remediation
2323

2424
All active risk detections contribute to the calculation of the user's risk level. The user risk level is an indicator (low, medium, high) of the probability that the user's account has been compromised. As an administrator, after thorough investigation on the risky users and the corresponding risky sign-ins and detections, you want to remediate the risky users so that they're no longer at risk and won't be blocked.
2525

2626
Some risk detections and the corresponding risky sign-ins may be marked by Identity Protection as dismissed with risk state "Dismissed" and risk detail "Azure AD Identity Protection assessed sign-in safe" because those events were no longer determined to be risky.
2727

2828
Administrators have the following options to remediate:
29-
- Setup [risk-based policies](howto-identity-protection-configure-risk-policies.md) to allow users to self-remediate their risks
29+
- Set up [risk-based policies](howto-identity-protection-configure-risk-policies.md) to allow users to self-remediate their risks
3030
- Manual password reset
3131
- Dismiss user risk
3232

@@ -36,16 +36,16 @@ You can allow users to self-remediate their sign-in risks and user risks by sett
3636

3737
Here are the prerequisites on users before risk-based policies can be applied to them to allow self-remediation of risks:
3838
- To perform MFA to self-remediate a sign-in risk:
39-
- the user must have registered for Azure AD MFA
39+
- The user must have registered for Azure AD MFA.
4040
- To perform secure password change to self-remediate a user risk:
41-
- the user must have registered for Azure AD MFA
42-
- for hybrid users that are synced from on-premises to cloud, password writeback must have been enabled on them
41+
- The user must have registered for Azure AD MFA.
42+
- For hybrid users that are synced from on-premises to cloud, password writeback must have been enabled on them.
4343

4444
If a risk-based policy is applied to a user during sign-in before the above prerequisites are met, then the user will be blocked because they aren't able to perform the required access control, and admin intervention will be required to unblock the user.
4545

4646
Risk-based policies are configured based on risk levels and will only apply if the risk level of the sign-in or user matches the configured level. Some detections may not raise risk to the level where the policy will apply, and administrators will need to handle those risky users manually. Administrators may determine that extra measures are necessary like [blocking access from locations](../conditional-access/howto-conditional-access-policy-location.md) or lowering the acceptable risk in their policies.
4747

48-
### Self-remediation with Self-service password reset
48+
### Self-remediation with self-service password reset
4949

5050
If a user has registered for self-service password reset (SSPR), then they can also remediate their own user risk by performing a self-service password reset.
5151

0 commit comments

Comments
 (0)