|
1 | 1 | ---
|
2 |
| -title: Risk-based MFA and SSPR with Azure Identity Protection |
3 |
| -description: In this tutorial, you will enable Azure Identity Protection integrations, for Multi-Factor Authentication and self-service password reset, to reduce risky behavior. |
| 2 | +title: Risk-based user sign-in protection in Azure Active Directory |
| 3 | +description: In this tutorial, you learn how to enable Azure Identity Protection to protect users when risky sign-in behavior is detected on their account. |
4 | 4 |
|
5 |
| -services: multi-factor-authentication |
| 5 | +services: active-directory |
6 | 6 | ms.service: active-directory
|
7 | 7 | ms.subservice: authentication
|
8 | 8 | ms.topic: tutorial
|
9 |
| -ms.date: 01/31/2018 |
| 9 | +ms.date: 05/11/2020 |
10 | 10 |
|
11 | 11 | ms.author: iainfou
|
12 | 12 | author: iainfoulds
|
13 | 13 | manager: daveba
|
14 |
| -ms.reviewer: sahenry |
15 | 14 |
|
16 |
| -# Customer intent: How, as an Azure AD Administrator, do I utilize Azure AD Identity Protection to better protect the sign-in process. |
| 15 | +# Customer intent: As an Azure AD Administrator, I want to learn how to use Azure Identity Protection to protect users by automatically detecting risk sign-in behavior and prompting for additional forms of authentication or request a password change. |
17 | 16 | ms.collection: M365-identity-device-management
|
18 | 17 | ---
|
19 |
| -# Tutorial: Use risk detections to trigger Multi-Factor Authentication and password changes |
| 18 | +# Tutorial: Use risk detections for user sign-ins to trigger Azure Multi-Factor Authentication or password changes |
20 | 19 |
|
21 |
| -In this tutorial, you will enable features of Azure Active Directory (Azure AD) Identity Protection, an Azure AD Premium P2 feature that is more than just a monitoring and reporting tool. To protect your organization's identities, you can configure risk-based policies that automatically respond to risky behaviors. These policies, can either automatically block or initiate remediation, including requiring password changes and enforcing Multi-Factor Authentication. |
| 20 | +To protect your users, you can configure risk-based policies in Azure Active Directory (Azure AD) that automatically respond to risky behaviors. Azure AD Identity Protection policies can automatically block a sign-in attempt or require additional action, such as require a password change or prompt for Azure Multi-Factor Authentication. These policies work with existing Azure AD Conditional Access policies as an extra layer of protection for org organization. Users may never trigger a risky behavior in one of these policies, but your organization is protected if an attempt to compromise your security is made. |
22 | 21 |
|
23 |
| -Azure AD Identity Protection policies can be used in addition to existing Conditional Access policies as an extra layer of protection. Your users may never trigger a risky behavior requiring one of these policies, but as an administrator you know they are protected. |
24 |
| - |
25 |
| -Some items that may trigger a risk detection include: |
26 |
| - |
27 |
| -* Users with leaked credentials |
28 |
| -* Sign-ins from anonymous IP addresses |
29 |
| -* Impossible travel to atypical locations |
30 |
| -* Sign-ins from infected devices |
31 |
| -* Sign-ins from IP addresses with suspicious activity |
32 |
| -* Sign-ins from unfamiliar locations |
33 |
| - |
34 |
| -More information about Azure AD Identity Protection can be found in the article [What is Azure AD Identity Protection](../active-directory-identityprotection.md) |
| 22 | +In this tutorial, you learn how to: |
35 | 23 |
|
36 | 24 | > [!div class="checklist"]
|
37 |
| -> * Enable Azure MFA registration |
| 25 | +> * Understand the available policies for Azure AD Identity Protection |
| 26 | +> * Enable Azure Multi-Factor Authentication registration |
38 | 27 | > * Enable risk-based password changes
|
39 | 28 | > * Enable risk-based Multi-Factor Authentication
|
| 29 | +> * Test risk-based policies for user sign-in attempts |
40 | 30 |
|
41 | 31 | ## Prerequisites
|
42 | 32 |
|
43 |
| -* Access to a working Azure AD tenant with at least a trial Azure AD Premium P2 license assigned. |
44 |
| -* An account with Global Administrator privileges in your Azure AD tenant. |
45 |
| -* Have completed the previous self-service password reset (SSPR) and Multi-Factor Authentication (MFA) tutorials. |
| 33 | +To complete this tutorial, you need the following resources and privileges: |
| 34 | + |
| 35 | +* A working Azure AD tenant with at least an Azure AD Premium P2 trial license enabled. |
| 36 | + * If needed, [create one for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F). |
| 37 | +* An account with *Global Administrator* privileges. |
| 38 | +* Azure AD configured for self-service password reset and Azure Multi-Factor Authentication |
| 39 | + * If needed, [complete the tutorial to enable Azure AD SSPR](tutorial-enable-sspr.md). |
| 40 | + * If needed, [complete the tutorial to enable Azure Multi-Factor Authentication](tutorial-enable-azure-mfa.md). |
| 41 | + |
| 42 | +## Overview of Azure AD Identity Protection |
| 43 | + |
| 44 | +Each day, Microsoft collects and analyses trillions of anonymized signals as part of user sign-in attempts. These signals help build patterns of good user sign-in behavior, and identify potential risky sign-in attempts. Azure AD Identity Protection can review user sign-in attempts and take additional action if there's suspicious behavior: |
| 45 | + |
| 46 | +Some of the following actions may trigger Azure AD Identity Protection risk detection: |
| 47 | + |
| 48 | +* Users with leaked credentials. |
| 49 | +* Sign-ins from anonymous IP addresses. |
| 50 | +* Impossible travel to atypical locations. |
| 51 | +* Sign-ins from infected devices. |
| 52 | +* Sign-ins from IP addresses with suspicious activity. |
| 53 | +* Sign-ins from unfamiliar locations. |
| 54 | + |
| 55 | +The following three policies are available in Azure AD Identity Protection to protect users and respond to suspicious activity. You can choose to turn the policy enforcement on or off, select users or groups for the policy to apply to, and decide if you want to block access at sign-in or prompt for additional action. |
| 56 | + |
| 57 | +* User risk policy |
| 58 | + * Identifies and responds to user accounts that may have compromised credentials. Can prompt the user to create a new password. |
| 59 | +* Sign in risk policy |
| 60 | + * Identifies and responds to suspicious sign-in attempts. Can prompt the user to provide additional forms of verification using Azure Multi-Factor Authentication. |
| 61 | +* MFA registration policy |
| 62 | + * Makes sure users are registered for Azure Multi-Factor Authentication. If a sign-in risk policy prompts for MFA, the user must already be registered for Azure Multi-Factor Authentication. |
| 63 | + |
| 64 | +When you enable a policy user or sign in risk policy, you can also choose the threshold for risk level - *low and above*, *medium and above*, or *high*. This flexibility lets you decide how aggressive you want to be in enforcing any controls for suspicious sign-in events. |
| 65 | + |
| 66 | +For more information about Azure AD Identity Protection, see [What is Azure AD Identity Protection?](../identity-protection/overview-identity-protection.md) |
| 67 | + |
| 68 | +## Enable MFA registration policy |
46 | 69 |
|
47 |
| -## Enable risk-based policies for SSPR and MFA |
| 70 | +Azure AD Identity Protection includes a default policy that can help get users registered for Azure Multi-Factor Authentication. If you use additional policies to protect sign-in events, you would need users to have already registered for MFA. When you enable this policy, it doesn't require users to perform MFA at each sign-in event. The policy only checks the registration status for a user and asks them to pre-register if needed. |
48 | 71 |
|
49 |
| -Enabling the risk-based policies is a straightforward process. The steps below will guide you through a sample configuration. |
| 72 | +It's recommended to enable the MFA registration policy for users that are to be enabled for additional Azure AD Identity Protection policies. To enable this policy, complete the following steps: |
50 | 73 |
|
51 |
| -### Enable users to register for Multi-Factor Authentication |
| 74 | +1. Sign in to the [Azure portal](https://portal.azure.com) using a global administrator account. |
| 75 | +1. Search for and select **Azure Active Directory**, select **Security**, then under the *Protect* menu heading choose **Identity Protection**. |
| 76 | +1. Select the **MFA registration policy** from the menu on the left-hand side. |
| 77 | +1. By default, the policy applies to *All users*. If desired, select **Assignments**, then choose the users or groups to apply the policy on. |
| 78 | +1. Under *Controls*, select **Access**. Make sure the option for *Require Azure MFA registration* is checked, then choose **Select**. |
| 79 | +1. Set **Enforce Policy** to *On*, then select **Save**. |
52 | 80 |
|
53 |
| -Azure AD Identity Protection includes a default policy that can help you to get your users registered for Multi-Factor Authentication and easily identify the current registration status. Enabling this policy does not start requiring users to perform Multi-Factor Authentication, but will ask them to pre-register. |
| 81 | +  |
54 | 82 |
|
55 |
| -1. Sign in to the [Azure portal](https://portal.azure.com). |
56 |
| -1. Click on **All services**, then browse to **Azure AD Identity Protection**. |
57 |
| -1. Click on **MFA registration**. |
58 |
| -1. Set Enforce Policy to **On**. |
59 |
| - 1. Setting this policy will require all of your users to register methods to prepare to use by Multi-Factor Authentication. |
60 |
| -1. Click **Save**. |
| 83 | +## Enable user risk policy for password change |
61 | 84 |
|
62 |
| -  |
| 85 | +Microsoft works with researchers, law enforcement, various security teams at Microsoft, and other trusted sources to find username and password pairs. When one of these pairs matches an account in your environment, a risk-based password change can be requested. This policy and action requires the user update their password before they can sign in to make sure any previously exposed credentials no longer work. |
63 | 86 |
|
64 |
| -### Enable risk-based password changes |
| 87 | +To enable this policy, complete the following steps: |
65 | 88 |
|
66 |
| -Microsoft works with researchers, law enforcement, various security teams at Microsoft, and other trusted sources to find username and password pairs. When one of these pairs matches an account in your environment, a risk-based password change can be triggered using the following policy. |
| 89 | +1. Select the **User risk policy** from the menu on the left-hand side. |
| 90 | +1. By default, the policy applies to *All users*. If desired, select **Assignments**, then choose the users or groups to apply the policy on. |
| 91 | +1. Under *Conditions*, choose **Select conditions > Select a risk level**, then choose *Medium and above*. |
| 92 | +1. Choose **Select**, then **Done**. |
| 93 | +1. Under *Access*, select **Access**. Make sure the option for **Allow access** and *Require password change* is checked, then choose **Select**. |
| 94 | +1. Set **Enforce Policy** to *On*, then select **Save**. |
67 | 95 |
|
68 |
| -1. Click on User risk policy. |
69 |
| -1. Under **Conditions**, select **User risk**, then choose **Medium and above**. |
70 |
| -1. Click "Select" then "Done" |
71 |
| -1. Under **Access**, choose **Allow access**, and then select **Require password change**. |
72 |
| -1. Click "Select" |
73 |
| -1. Set Enforce Policy to **On**. |
74 |
| -1. Click **Save** |
| 96 | +  |
75 | 97 |
|
76 |
| -### Enable risk-based Multi-Factor Authentication |
| 98 | +## Enable sign-in risk policy for MFA |
77 | 99 |
|
78 |
| -Most users have a normal behavior that can be tracked, when they fall outside of this norm it could be risky to allow them to just sign in. You may want to block that user or maybe just ask them to perform a Multi-Factor Authentication to prove that they are really who they say they are. To enable a policy requiring MFA when a risky sign-in is detected, enable the following policy. |
| 100 | +Most users have a normal behavior that can be tracked. When they fall outside of this norm, it could be risky to allow them to successfully sign in. Instead, you may want to block that user, or ask them to perform a multi-factor authentication. If the user successfully completes the MFA challenge, you can consider it a valid sign-in attempt and grant access to the application or service. |
79 | 101 |
|
80 |
| -1. Click on Sign-in risk policy |
81 |
| -1. Under **Conditions**, select **User risk**, then choose **Medium and above**. |
82 |
| -1. Click "Select" then "Done" |
83 |
| -1. Under **Access**, choose **Allow access**, and then select **Require multi-factor authentication**. |
84 |
| -1. Click "Select" |
85 |
| -1. Set Enforce Policy to **On**. |
86 |
| -1. Click **Save** |
| 102 | +To enable this policy, complete the following steps: |
| 103 | + |
| 104 | +1. Select the **Sign-in risk policy** from the menu on the left-hand side. |
| 105 | +1. By default, the policy applies to *All users*. If desired, select **Assignments**, then choose the users or groups to apply the policy on. |
| 106 | +1. Under *Conditions*, choose **Select conditions > Select a risk level**, then choose *Medium and above*. |
| 107 | +1. Choose **Select**, then **Done**. |
| 108 | +1. Under *Access*, choose **Select a control**. Make sure the option for **Allow access** and *Require multi-factor authentication* is checked, then choose **Select**. |
| 109 | +1. Set **Enforce Policy** to *On*, then select **Save**. |
| 110 | + |
| 111 | +  |
| 112 | + |
| 113 | +## Test risky sign events |
| 114 | + |
| 115 | +Most user sign-in events won't trigger the risk-based policies configured in the previous steps. A user may never see a prompt for additional MFA or to reset their password. If their credentials remain secure and their behavior consistent, their sign-in events would be successful. |
| 116 | + |
| 117 | +To test the Azure AD Identity Protection policies created in the previous steps, you need a way to simulate risky behavior or potential attacks. The steps to do these tests vary based on the Azure AD Identity Protection policy you want to validate. For more information on scenarios and steps, see [Simulate risk detections in Azure AD Identity Protection](../identity-protection/howto-identity-protection-simulate-risk.md). |
87 | 118 |
|
88 | 119 | ## Clean up resources
|
89 | 120 |
|
90 |
| -If you have completed testing and no longer want to have the risk-based policies enabled, return to each policy you want to disable, and set **Enforce Policy** to **Off**. |
| 121 | +If you have completed tests and no longer want to have the risk-based policies enabled, return to each policy you want to disable and set **Enforce Policy** to *Off*. |
| 122 | + |
| 123 | +## Next steps |
| 124 | + |
| 125 | +In this tutorial, you enabled risk-based user policies for Azure AD Identity Protection. You learned how to: |
| 126 | + |
| 127 | +> [!div class="checklist"] |
| 128 | +> * Understand the available policies for Azure AD Identity Protection |
| 129 | +> * Enable Azure Multi-Factor Authentication registration |
| 130 | +> * Enable risk-based password changes |
| 131 | +> * Enable risk-based Multi-Factor Authentication |
| 132 | +> * Test risk-based policies for user sign-in attempts |
| 133 | +
|
| 134 | +> [!div class="nextstepaction"] |
| 135 | +> [Learn more about Azure AD Identity Protection](../identity-protection/overview-identity-protection.md) |
0 commit comments