You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/identity-protection/concept-workload-identity-risk.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -79,10 +79,10 @@ Identity Protection provides organizations with two reports they can use to inve
79
79
80
80
Some of the key questions to answer during your investigation include:
81
81
82
-
1. Do accounts show suspicious sign-in activity?
83
-
1. Have there been unauthorized changes to the credentials?
84
-
1. Have there been suspicious configuration changes to accounts?
85
-
1. Did the account acquire unauthorized application roles?
82
+
- Do accounts show suspicious sign-in activity?
83
+
- Have there been unauthorized changes to the credentials?
84
+
- Have there been suspicious configuration changes to accounts?
85
+
- Did the account acquire unauthorized application roles?
86
86
87
87
The [Azure Active Directory security operations guide for Applications](../fundamentals/security-operations-applications.md) provides detailed guidance on the above investigation areas.
0 commit comments