Skip to content

Commit 6bb5771

Browse files
committed
[AzureAD] Additional edits and updates
1 parent 9326e14 commit 6bb5771

File tree

1 file changed

+10
-10
lines changed

1 file changed

+10
-10
lines changed

articles/active-directory/authentication/tutorial-risk-based-sspr-mfa.md

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: tutorial
9-
ms.date: 05/08/2020
9+
ms.date: 05/11/2020
1010

1111
ms.author: iainfou
1212
author: iainfoulds
@@ -41,7 +41,7 @@ To complete this tutorial, you need the following resources and privileges:
4141

4242
## Overview of Azure AD Identity Protection
4343

44-
Each day, Microsoft collects and analyses trillions of anonymized signals as part of user sign-in attempts. These signals help build patterns of good user sign-in behavior, and identify potential risky sign-in attempts. Azure AD Identity Protection can review user sign-in attempts and take additional action if there's suspicious behavior.
44+
Each day, Microsoft collects and analyses trillions of anonymized signals as part of user sign-in attempts. These signals help build patterns of good user sign-in behavior, and identify potential risky sign-in attempts. Azure AD Identity Protection can review user sign-in attempts and take additional action if there's suspicious behavior:
4545

4646
Some of the following actions may trigger Azure AD Identity Protection risk detection:
4747

@@ -52,7 +52,7 @@ Some of the following actions may trigger Azure AD Identity Protection risk dete
5252
* Sign-ins from IP addresses with suspicious activity.
5353
* Sign-ins from unfamiliar locations.
5454

55-
The following three policies are available in Azure AD Identity Protection to protect users and respond to suspicious activity. You can choose to turn the policy enforcement on or off, select users or groups for the policy to apply to, and if you want to block access at sign-in or prompt for additional action.
55+
The following three policies are available in Azure AD Identity Protection to protect users and respond to suspicious activity. You can choose to turn the policy enforcement on or off, select users or groups for the policy to apply to, and decide if you want to block access at sign-in or prompt for additional action.
5656

5757
* User risk policy
5858
* Identifies and responds to user accounts that may have compromised credentials. Can prompt the user to create a new password.
@@ -61,9 +61,9 @@ The following three policies are available in Azure AD Identity Protection to pr
6161
* MFA registration policy
6262
* Makes sure users are registered for Azure Multi-Factor Authentication. If a sign-in risk policy prompts for MFA, the user must already be registered for Azure Multi-Factor Authentication.
6363

64-
When you enable a policy user or sign in risk policy, you can also choose the threshold for risk level - low and above, medium and above, or high. This flexibility lets you decide how aggressive you want to be in enforcing any controls for suspicious sign-in events.
64+
When you enable a policy user or sign in risk policy, you can also choose the threshold for risk level - *low and above*, *medium and above*, or *high*. This flexibility lets you decide how aggressive you want to be in enforcing any controls for suspicious sign-in events.
6565

66-
For more information about Azure AD Identity Protection, see [What is Azure AD Identity Protection](../identity-protection/overview-identity-protection.md)
66+
For more information about Azure AD Identity Protection, see [What is Azure AD Identity Protection?](../identity-protection/overview-identity-protection.md)
6767

6868
## Enable MFA registration policy
6969

@@ -82,13 +82,13 @@ It's recommended to enable the MFA registration policy for users that are to be
8282

8383
## Enable user risk policy for password change
8484

85-
Microsoft works with researchers, law enforcement, various security teams at Microsoft, and other trusted sources to find username and password pairs. When one of these pairs matches an account in your environment, a risk-based password change can be requested. This policy and action makes the user update their password before they can sign in to make sure any previously exposed credentials no longer work.
85+
Microsoft works with researchers, law enforcement, various security teams at Microsoft, and other trusted sources to find username and password pairs. When one of these pairs matches an account in your environment, a risk-based password change can be requested. This policy and action requires the user update their password before they can sign in to make sure any previously exposed credentials no longer work.
8686

8787
To enable this policy, complete the following steps:
8888

8989
1. Select the **User risk policy** from the menu on the left-hand side.
9090
1. By default, the policy applies to *All users*. If desired, select **Assignments**, then choose the users or groups to apply the policy on.
91-
1. Under *Conditions*, choose **Select conditions > Select a risk level**, then choose **Medium and above**.
91+
1. Under *Conditions*, choose **Select conditions > Select a risk level**, then choose *Medium and above*.
9292
1. Choose **Select**, then **Done**.
9393
1. Under *Access*, select **Access**. Make sure the option for **Allow access** and *Require password change* is checked, then choose **Select**.
9494
1. Set **Enforce Policy** to *On*, then select **Save**.
@@ -103,7 +103,7 @@ To enable this policy, complete the following steps:
103103

104104
1. Select the **Sign-in risk policy** from the menu on the left-hand side.
105105
1. By default, the policy applies to *All users*. If desired, select **Assignments**, then choose the users or groups to apply the policy on.
106-
1. Under *Conditions*, choose **Select conditions > Select a risk level**, then choose **Medium and above**.
106+
1. Under *Conditions*, choose **Select conditions > Select a risk level**, then choose *Medium and above*.
107107
1. Choose **Select**, then **Done**.
108108
1. Under *Access*, choose **Select a control**. Make sure the option for **Allow access** and *Require multi-factor authentication* is checked, then choose **Select**.
109109
1. Set **Enforce Policy** to *On*, then select **Save**.
@@ -118,7 +118,7 @@ To test the Azure AD Identity Protection policies created in the previous steps,
118118

119119
## Clean up resources
120120

121-
If you have completed tests and no longer want to have the risk-based policies enabled, return to each policy you want to disable and set *Enforce Policy* to **Off**.
121+
If you have completed tests and no longer want to have the risk-based policies enabled, return to each policy you want to disable and set **Enforce Policy** to *Off*.
122122

123123
## Next steps
124124

@@ -132,4 +132,4 @@ In this tutorial, you enabled risk-based user policies for Azure AD Identity Pro
132132
> * Test risk-based policies for user sign-in attempts
133133
134134
> [!div class="nextstepaction"]
135-
> [Learn more about Azure AD Identity Protection](../identity-protection/overview-identity-protection.md
135+
> [Learn more about Azure AD Identity Protection](../identity-protection/overview-identity-protection.md)

0 commit comments

Comments
 (0)