Skip to content

Commit 6955439

Browse files
Updates
1 parent f409ba5 commit 6955439

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

articles/active-directory/identity-protection/howto-identity-protection-configure-risk-policies.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -74,7 +74,7 @@ Before organizations enable remediation policies, they may want to [investigate]
7474
1. Select **Done**.
7575
1. Under **Cloud apps or actions** > **Include**, select **All cloud apps**.
7676
1. Under **Conditions** > **User risk**, set **Configure** to **Yes**.
77-
1. Under **Configure user risk levels needed for policy to be enforced**, select **High**.
77+
1. Under **Configure user risk levels needed for policy to be enforced**, select **High**. ([This is based on Microsoft recommendations and may be different for each organization](#choosing-acceptable-risk-levels))
7878
1. Select **Done**.
7979
1. Under **Access controls** > **Grant**.
8080
1. Select **Grant access**, **Require password change**.
@@ -99,7 +99,7 @@ After confirming your settings using [report-only mode](../conditional-access/ho
9999
1. Under **Exclude**, select **Users and groups** and choose your organization's emergency access or break-glass accounts.
100100
1. Select **Done**.
101101
1. Under **Cloud apps or actions** > **Include**, select **All cloud apps**.
102-
1. Under **Conditions** > **Sign-in risk**, set **Configure** to **Yes**. Under **Select the sign-in risk level this policy will apply to**.
102+
1. Under **Conditions** > **Sign-in risk**, set **Configure** to **Yes**. Under **Select the sign-in risk level this policy will apply to**. ([This is based on Microsoft recommendations and may be different for each organization](#choosing-acceptable-risk-levels))
103103
1. Select **High** and **Medium**.
104104
1. Select **Done**.
105105
1. Under **Access controls** > **Grant**.

0 commit comments

Comments
 (0)