Skip to content

Commit 5fe1859

Browse files
authored
Merge pull request #64248 from ebasseri/patch-1
adding detections to table
2 parents d16385d + 4fca684 commit 5fe1859

File tree

1 file changed

+5
-3
lines changed

1 file changed

+5
-3
lines changed

articles/active-directory-b2c/conditional-access-identity-protection-setup.md

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -38,10 +38,12 @@ The following risk detections are currently supported for Azure AD B2C:
3838
|Risk detection type |Description |
3939
|---------|---------|
4040
| Atypical travel | Sign in from an atypical location based on the user's recent sign-ins. |
41-
|Anonymous IP address | Sign in from an anonymous IP address (for example: Tor browser, anonymizer VPNs) |
41+
|Anonymous IP address | Sign in from an anonymous IP address (for example: Tor browser, anonymizer VPNs). |
42+
|Malware linked IP address | Sign in from a malware linked IP address. |
4243
|Unfamiliar sign-in properties | Sign in with properties we've not seen recently for the given user. |
43-
|Malware linked IP address | Sign in from a malware linked IP address |
44-
|Azure AD threat intelligence | Microsoft's internal and external threat intelligence sources have identified a known attack pattern |
44+
|Admin confirmed user compromised | An admin has indicated that a user was compromised. |
45+
|Password spray | Sign in through a password spray attack. |
46+
|Azure AD threat intelligence | Microsoft's internal and external threat intelligence sources have identified a known attack pattern. |
4547

4648
## View risk events for your Azure AD B2C tenant
4749

0 commit comments

Comments
 (0)