Skip to content

Commit 50e6ebe

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into ultBUp
2 parents bfcf02f + 0ea333e commit 50e6ebe

25 files changed

+542
-136
lines changed

articles/active-directory/authentication/TOC.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@
1515
href: tutorial-enable-sspr-writeback.md
1616
- name: Configure custom banned password lists
1717
href: tutorial-configure-custom-password-protection.md
18-
- name: Integrate Azure Identity Protection
18+
- name: Enable risk-based sign-in protection
1919
href: tutorial-risk-based-sspr-mfa.md
2020
- name: Concepts
2121
expanded: true
71.8 KB
Loading
39.1 KB
Loading
38.6 KB
Loading
Lines changed: 99 additions & 54 deletions
Original file line numberDiff line numberDiff line change
@@ -1,90 +1,135 @@
11
---
2-
title: Risk-based MFA and SSPR with Azure Identity Protection
3-
description: In this tutorial, you will enable Azure Identity Protection integrations, for Multi-Factor Authentication and self-service password reset, to reduce risky behavior.
2+
title: Risk-based user sign-in protection in Azure Active Directory
3+
description: In this tutorial, you learn how to enable Azure Identity Protection to protect users when risky sign-in behavior is detected on their account.
44

5-
services: multi-factor-authentication
5+
services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: tutorial
9-
ms.date: 01/31/2018
9+
ms.date: 05/11/2020
1010

1111
ms.author: iainfou
1212
author: iainfoulds
1313
manager: daveba
14-
ms.reviewer: sahenry
1514

16-
# Customer intent: How, as an Azure AD Administrator, do I utilize Azure AD Identity Protection to better protect the sign-in process.
15+
# Customer intent: As an Azure AD Administrator, I want to learn how to use Azure Identity Protection to protect users by automatically detecting risk sign-in behavior and prompting for additional forms of authentication or request a password change.
1716
ms.collection: M365-identity-device-management
1817
---
19-
# Tutorial: Use risk detections to trigger Multi-Factor Authentication and password changes
18+
# Tutorial: Use risk detections for user sign-ins to trigger Azure Multi-Factor Authentication or password changes
2019

21-
In this tutorial, you will enable features of Azure Active Directory (Azure AD) Identity Protection, an Azure AD Premium P2 feature that is more than just a monitoring and reporting tool. To protect your organization's identities, you can configure risk-based policies that automatically respond to risky behaviors. These policies, can either automatically block or initiate remediation, including requiring password changes and enforcing Multi-Factor Authentication.
20+
To protect your users, you can configure risk-based policies in Azure Active Directory (Azure AD) that automatically respond to risky behaviors. Azure AD Identity Protection policies can automatically block a sign-in attempt or require additional action, such as require a password change or prompt for Azure Multi-Factor Authentication. These policies work with existing Azure AD Conditional Access policies as an extra layer of protection for org organization. Users may never trigger a risky behavior in one of these policies, but your organization is protected if an attempt to compromise your security is made.
2221

23-
Azure AD Identity Protection policies can be used in addition to existing Conditional Access policies as an extra layer of protection. Your users may never trigger a risky behavior requiring one of these policies, but as an administrator you know they are protected.
24-
25-
Some items that may trigger a risk detection include:
26-
27-
* Users with leaked credentials
28-
* Sign-ins from anonymous IP addresses
29-
* Impossible travel to atypical locations
30-
* Sign-ins from infected devices
31-
* Sign-ins from IP addresses with suspicious activity
32-
* Sign-ins from unfamiliar locations
33-
34-
More information about Azure AD Identity Protection can be found in the article [What is Azure AD Identity Protection](../active-directory-identityprotection.md)
22+
In this tutorial, you learn how to:
3523

3624
> [!div class="checklist"]
37-
> * Enable Azure MFA registration
25+
> * Understand the available policies for Azure AD Identity Protection
26+
> * Enable Azure Multi-Factor Authentication registration
3827
> * Enable risk-based password changes
3928
> * Enable risk-based Multi-Factor Authentication
29+
> * Test risk-based policies for user sign-in attempts
4030
4131
## Prerequisites
4232

43-
* Access to a working Azure AD tenant with at least a trial Azure AD Premium P2 license assigned.
44-
* An account with Global Administrator privileges in your Azure AD tenant.
45-
* Have completed the previous self-service password reset (SSPR) and Multi-Factor Authentication (MFA) tutorials.
33+
To complete this tutorial, you need the following resources and privileges:
34+
35+
* A working Azure AD tenant with at least an Azure AD Premium P2 trial license enabled.
36+
* If needed, [create one for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
37+
* An account with *Global Administrator* privileges.
38+
* Azure AD configured for self-service password reset and Azure Multi-Factor Authentication
39+
* If needed, [complete the tutorial to enable Azure AD SSPR](tutorial-enable-sspr.md).
40+
* If needed, [complete the tutorial to enable Azure Multi-Factor Authentication](tutorial-enable-azure-mfa.md).
41+
42+
## Overview of Azure AD Identity Protection
43+
44+
Each day, Microsoft collects and analyses trillions of anonymized signals as part of user sign-in attempts. These signals help build patterns of good user sign-in behavior, and identify potential risky sign-in attempts. Azure AD Identity Protection can review user sign-in attempts and take additional action if there's suspicious behavior:
45+
46+
Some of the following actions may trigger Azure AD Identity Protection risk detection:
47+
48+
* Users with leaked credentials.
49+
* Sign-ins from anonymous IP addresses.
50+
* Impossible travel to atypical locations.
51+
* Sign-ins from infected devices.
52+
* Sign-ins from IP addresses with suspicious activity.
53+
* Sign-ins from unfamiliar locations.
54+
55+
The following three policies are available in Azure AD Identity Protection to protect users and respond to suspicious activity. You can choose to turn the policy enforcement on or off, select users or groups for the policy to apply to, and decide if you want to block access at sign-in or prompt for additional action.
56+
57+
* User risk policy
58+
* Identifies and responds to user accounts that may have compromised credentials. Can prompt the user to create a new password.
59+
* Sign in risk policy
60+
* Identifies and responds to suspicious sign-in attempts. Can prompt the user to provide additional forms of verification using Azure Multi-Factor Authentication.
61+
* MFA registration policy
62+
* Makes sure users are registered for Azure Multi-Factor Authentication. If a sign-in risk policy prompts for MFA, the user must already be registered for Azure Multi-Factor Authentication.
63+
64+
When you enable a policy user or sign in risk policy, you can also choose the threshold for risk level - *low and above*, *medium and above*, or *high*. This flexibility lets you decide how aggressive you want to be in enforcing any controls for suspicious sign-in events.
65+
66+
For more information about Azure AD Identity Protection, see [What is Azure AD Identity Protection?](../identity-protection/overview-identity-protection.md)
67+
68+
## Enable MFA registration policy
4669

47-
## Enable risk-based policies for SSPR and MFA
70+
Azure AD Identity Protection includes a default policy that can help get users registered for Azure Multi-Factor Authentication. If you use additional policies to protect sign-in events, you would need users to have already registered for MFA. When you enable this policy, it doesn't require users to perform MFA at each sign-in event. The policy only checks the registration status for a user and asks them to pre-register if needed.
4871

49-
Enabling the risk-based policies is a straightforward process. The steps below will guide you through a sample configuration.
72+
It's recommended to enable the MFA registration policy for users that are to be enabled for additional Azure AD Identity Protection policies. To enable this policy, complete the following steps:
5073

51-
### Enable users to register for Multi-Factor Authentication
74+
1. Sign in to the [Azure portal](https://portal.azure.com) using a global administrator account.
75+
1. Search for and select **Azure Active Directory**, select **Security**, then under the *Protect* menu heading choose **Identity Protection**.
76+
1. Select the **MFA registration policy** from the menu on the left-hand side.
77+
1. By default, the policy applies to *All users*. If desired, select **Assignments**, then choose the users or groups to apply the policy on.
78+
1. Under *Controls*, select **Access**. Make sure the option for *Require Azure MFA registration* is checked, then choose **Select**.
79+
1. Set **Enforce Policy** to *On*, then select **Save**.
5280

53-
Azure AD Identity Protection includes a default policy that can help you to get your users registered for Multi-Factor Authentication and easily identify the current registration status. Enabling this policy does not start requiring users to perform Multi-Factor Authentication, but will ask them to pre-register.
81+
![Screenshot of how to require users to register for MFA in the Azure portal](./media/tutorial-risk-based-sspr-mfa/enable-mfa-registration.png)
5482

55-
1. Sign in to the [Azure portal](https://portal.azure.com).
56-
1. Click on **All services**, then browse to **Azure AD Identity Protection**.
57-
1. Click on **MFA registration**.
58-
1. Set Enforce Policy to **On**.
59-
1. Setting this policy will require all of your users to register methods to prepare to use by Multi-Factor Authentication.
60-
1. Click **Save**.
83+
## Enable user risk policy for password change
6184

62-
![Require users to register for MFA at sign-in](./media/tutorial-risk-based-sspr-mfa/risk-based-require-mfa-registration.png)
85+
Microsoft works with researchers, law enforcement, various security teams at Microsoft, and other trusted sources to find username and password pairs. When one of these pairs matches an account in your environment, a risk-based password change can be requested. This policy and action requires the user update their password before they can sign in to make sure any previously exposed credentials no longer work.
6386

64-
### Enable risk-based password changes
87+
To enable this policy, complete the following steps:
6588

66-
Microsoft works with researchers, law enforcement, various security teams at Microsoft, and other trusted sources to find username and password pairs. When one of these pairs matches an account in your environment, a risk-based password change can be triggered using the following policy.
89+
1. Select the **User risk policy** from the menu on the left-hand side.
90+
1. By default, the policy applies to *All users*. If desired, select **Assignments**, then choose the users or groups to apply the policy on.
91+
1. Under *Conditions*, choose **Select conditions > Select a risk level**, then choose *Medium and above*.
92+
1. Choose **Select**, then **Done**.
93+
1. Under *Access*, select **Access**. Make sure the option for **Allow access** and *Require password change* is checked, then choose **Select**.
94+
1. Set **Enforce Policy** to *On*, then select **Save**.
6795

68-
1. Click on User risk policy.
69-
1. Under **Conditions**, select **User risk**, then choose **Medium and above**.
70-
1. Click "Select" then "Done"
71-
1. Under **Access**, choose **Allow access**, and then select **Require password change**.
72-
1. Click "Select"
73-
1. Set Enforce Policy to **On**.
74-
1. Click **Save**
96+
![Screenshot of how to enable the user risk policy in the Azure portal](./media/tutorial-risk-based-sspr-mfa/enable-user-risk-policy.png)
7597

76-
### Enable risk-based Multi-Factor Authentication
98+
## Enable sign-in risk policy for MFA
7799

78-
Most users have a normal behavior that can be tracked, when they fall outside of this norm it could be risky to allow them to just sign in. You may want to block that user or maybe just ask them to perform a Multi-Factor Authentication to prove that they are really who they say they are. To enable a policy requiring MFA when a risky sign-in is detected, enable the following policy.
100+
Most users have a normal behavior that can be tracked. When they fall outside of this norm, it could be risky to allow them to successfully sign in. Instead, you may want to block that user, or ask them to perform a multi-factor authentication. If the user successfully completes the MFA challenge, you can consider it a valid sign-in attempt and grant access to the application or service.
79101

80-
1. Click on Sign-in risk policy
81-
1. Under **Conditions**, select **User risk**, then choose **Medium and above**.
82-
1. Click "Select" then "Done"
83-
1. Under **Access**, choose **Allow access**, and then select **Require multi-factor authentication**.
84-
1. Click "Select"
85-
1. Set Enforce Policy to **On**.
86-
1. Click **Save**
102+
To enable this policy, complete the following steps:
103+
104+
1. Select the **Sign-in risk policy** from the menu on the left-hand side.
105+
1. By default, the policy applies to *All users*. If desired, select **Assignments**, then choose the users or groups to apply the policy on.
106+
1. Under *Conditions*, choose **Select conditions > Select a risk level**, then choose *Medium and above*.
107+
1. Choose **Select**, then **Done**.
108+
1. Under *Access*, choose **Select a control**. Make sure the option for **Allow access** and *Require multi-factor authentication* is checked, then choose **Select**.
109+
1. Set **Enforce Policy** to *On*, then select **Save**.
110+
111+
![Screenshot of how to enable the sign-in risk policy in the Azure portal](./media/tutorial-risk-based-sspr-mfa/enable-sign-in-risk-policy.png)
112+
113+
## Test risky sign events
114+
115+
Most user sign-in events won't trigger the risk-based policies configured in the previous steps. A user may never see a prompt for additional MFA or to reset their password. If their credentials remain secure and their behavior consistent, their sign-in events would be successful.
116+
117+
To test the Azure AD Identity Protection policies created in the previous steps, you need a way to simulate risky behavior or potential attacks. The steps to do these tests vary based on the Azure AD Identity Protection policy you want to validate. For more information on scenarios and steps, see [Simulate risk detections in Azure AD Identity Protection](../identity-protection/howto-identity-protection-simulate-risk.md).
87118

88119
## Clean up resources
89120

90-
If you have completed testing and no longer want to have the risk-based policies enabled, return to each policy you want to disable, and set **Enforce Policy** to **Off**.
121+
If you have completed tests and no longer want to have the risk-based policies enabled, return to each policy you want to disable and set **Enforce Policy** to *Off*.
122+
123+
## Next steps
124+
125+
In this tutorial, you enabled risk-based user policies for Azure AD Identity Protection. You learned how to:
126+
127+
> [!div class="checklist"]
128+
> * Understand the available policies for Azure AD Identity Protection
129+
> * Enable Azure Multi-Factor Authentication registration
130+
> * Enable risk-based password changes
131+
> * Enable risk-based Multi-Factor Authentication
132+
> * Test risk-based policies for user sign-in attempts
133+
134+
> [!div class="nextstepaction"]
135+
> [Learn more about Azure AD Identity Protection](../identity-protection/overview-identity-protection.md)

articles/search/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -315,6 +315,8 @@
315315
href: search-security-overview.md
316316
- name: Create a private endpoint
317317
href: service-create-private-endpoint.md
318+
- name: Configure an IP firewall
319+
href: service-configure-firewall.md
318320
- name: Service key management
319321
href: search-security-api-keys.md
320322
- name: Role-based admin access
242 KB
Loading
225 KB
Loading
Lines changed: 58 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,58 @@
1+
---
2+
title: Configure an IP firewall for your Azure Cognitive Search service
3+
titleSuffix: Azure Cognitive Search
4+
description: Configure IP control policies to restrict access to your Azure Cognitive Search service.
5+
6+
manager: nitinme
7+
author: mrcarter8
8+
ms.author: mcarter
9+
ms.service: cognitive-search
10+
ms.topic: conceptual
11+
ms.date: 05/11/2020
12+
---
13+
14+
# Configure IP firewall for Azure Cognitive Search
15+
16+
Azure Cognitive Search supports IP rules for inbound firewall support. This model provides an additional layer of security for your search service similar to the IP rules you'll find in an Azure virtual network security group. With these IP rules, you can configure your search service to be accessible only from an approved set of machines and/or cloud services. Access to data stored in your search service from these approved sets of machines and services will still require the caller to present a valid authorization token.
17+
18+
> [!Important]
19+
> IP rules on your Azure Cognitive Search service can be configured using the Azure portal or the [Management REST API version 2020-03-13](https://docs.microsoft.com/rest/api/searchmanagement/).
20+
21+
## <a id="configure-ip-policy"></a> Configure an IP firewall using the Azure portal
22+
23+
To set the IP access control policy in the Azure portal, go to your Azure Cognitive Search service page and select **Networking** on the navigation menu. Endpoint networking connectivity must be **Public**. If your connectivity is set to **Private**, you can only access your search service via a Private Endpoint.
24+
25+
![Screenshot showing how to configure the IP firewall in the Azure portal](./media/service-configure-firewall/azure-portal-firewall.png)
26+
27+
The Azure portal provides the ability to specify IP addresses and IP address ranges in the CIDR format. An example of CIDR notation is 8.8.8.0/24, which represents the IPs that range from 8.8.8.0 to 8.8.8.255.
28+
29+
> [!NOTE]
30+
> After you enable the IP access control policy for your Azure Cognitive Search service, all requests to the data plane from machines outside the allowed list of IP address ranges are rejected. When IP rules are configured, some features of the Azure portal are disabled. You'll be able to view and manage service level information, but portal access to index data and the various components in the service, such as the index, indexer, and skillset definitions, is restricted for security reasons.
31+
32+
### Requests from your current IP
33+
34+
To simplify development, the Azure portal helps you identify and add the IP of your client machine to the allowed list. Apps running on your machine can then access your Azure Cognitive Search service.
35+
36+
The portal automatically detects your client IP address. It might be the client IP address of your machine or network gateway. Make sure to remove this IP address before you take your workload to production.
37+
38+
To add your current IP to the list of IPs, check **Add your client IP address**. Then select **Save**.
39+
40+
![Screenshot showing a how to configure IP firewall settings to allow the current IP](./media/service-configure-firewall/enable-current-ip.png)
41+
42+
## <a id="troubleshoot-ip-firewall"></a>Troubleshoot issues with an IP access control policy
43+
44+
You can troubleshoot issues with an IP access control policy by using the following options:
45+
46+
### Azure portal
47+
48+
Enabling an IP access control policy for your Azure Cognitive Search service blocks all requests from machines outside the allowed list of IP address ranges, including the Azure portal. You'll be able to view and manage service level information, but portal access to index data and the various components in the service, such as the index, indexer, and skillset definitions, is restricted for security reasons.
49+
50+
### SDKs
51+
52+
When you access Azure Cognitive Search service using the SDK from machines that are not in the allowed list, a generic **403 Forbidden** response is returned with no additional details. Verify the allowed IP list for your account, and make sure that the correct configuration updated for your search service.
53+
54+
## Next steps
55+
56+
For more information on accessing your search service via Private Link, see the following article:
57+
58+
* [Create a Private Endpoint for a secure connection to Azure Cognitive Search](service-create-private-endpoint.md)

0 commit comments

Comments
 (0)