File tree Expand file tree Collapse file tree 1 file changed +5
-3
lines changed
articles/active-directory-b2c Expand file tree Collapse file tree 1 file changed +5
-3
lines changed Original file line number Diff line number Diff line change @@ -38,10 +38,12 @@ The following risk detections are currently supported for Azure AD B2C:
38
38
| Risk detection type | Description |
39
39
| ---------| ---------|
40
40
| Atypical travel | Sign in from an atypical location based on the user's recent sign-ins. |
41
- | Anonymous IP address | Sign in from an anonymous IP address (for example: Tor browser, anonymizer VPNs) |
41
+ | Anonymous IP address | Sign in from an anonymous IP address (for example: Tor browser, anonymizer VPNs). |
42
+ | Malware linked IP address | Sign in from a malware linked IP address. |
42
43
| Unfamiliar sign-in properties | Sign in with properties we've not seen recently for the given user. |
43
- | Malware linked IP address | Sign in from a malware linked IP address |
44
- | Azure AD threat intelligence | Microsoft's internal and external threat intelligence sources have identified a known attack pattern |
44
+ | Admin confirmed user compromised | An admin has indicated that a user was compromised. |
45
+ | Password spray | Sign in through a password spray attack. |
46
+ | Azure AD threat intelligence | Microsoft's internal and external threat intelligence sources have identified a known attack pattern. |
45
47
46
48
## View risk events for your Azure AD B2C tenant
47
49
You can’t perform that action at this time.
0 commit comments