Skip to content

Commit 7b1bc17

Browse files
authored
Added policy migration guidance
Added specific steps and images for migrating policies from Identity Protection to CA.
1 parent 503ffd1 commit 7b1bc17

File tree

1 file changed

+84
-2
lines changed

1 file changed

+84
-2
lines changed

articles/active-directory/identity-protection/howto-identity-protection-configure-risk-policies.md

Lines changed: 84 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ As we learned in the previous article, [Identity Protection policies](concept-id
2222
- Sign-in risk policy
2323
- User risk policy
2424

25-
![Risk conditions in Conditional Access](./media/howto-identity-protection-configure-risk-policies/CA-risk-policies.png)
25+
![Risk conditions in Conditional Access](./media/howto-identity-protection-configure-risk-policies/CA-risk-conditions.png)
2626

2727
## Choosing acceptable risk levels
2828

@@ -110,7 +110,7 @@ Before organizations enable remediation policies, they may want to [investigate]
110110
1. Confirm your settings and set **Enable policy** to **On**.
111111
1. Select **Create** to create to enable your policy.
112112

113-
### Migrate Identity Protection risk policies to Conditional Access
113+
## Migrate risk policies from Identity Protection to Conditional Access
114114

115115
While Identity Protection also provides two risk policies with limited conditions, we highly recommend setting up risk-based policies in Conditional Access for the following benefits:
116116

@@ -126,6 +126,88 @@ If you already have risk policies enabled in Identity Protection, we highly reco
126126
4. Disable the old risk policies in Identity Protection.
127127
5. Create additional risk policies if needed in Conditional Access.
128128

129+
Specific steps for the migration are listed below.
130+
131+
### Migrate User risk policy to Conditional Access
132+
133+
Example
134+
135+
![Migrate user risk policy to Conditional Access](./media/howto-identity-protection-configure-risk-policies/user-risk-policy-migration-to-CA.png)
136+
137+
#### Step 1 Create an equivalent user risk policy in Report-only mode Conditional Access
138+
1. Sign in to the **Azure portal** as a Global Administrator, Security Administrator, or Conditional Access Administrator.
139+
2. Browse to **Azure Active Directory** > **Security** > **Conditional Access**.
140+
3. Select **New policy**.
141+
4. Give your policy a name. We recommend that organizations create a meaningful standard for the names of their policies.
142+
5. Under **Assignments**, select **Users or workload identities**.
143+
1. Under **What does this policy apply to?**, select **Users and groups**
144+
2. Under **Include**, select users and groups that are included in your current user risk policy in Identity Protection
145+
3. Under **Exclude**, select select users and groups that are excluded from your current user risk policy
146+
4. Select **Done**.
147+
6. Under **Cloud apps or actions** > **Include**, select **All cloud apps**.
148+
7. Under **Conditions** > **User risk**, set **Configure** to **Yes**.
149+
1. Under **Configure user risk levels needed for policy to be enforced**, select the risk levels that match the configuration in your current user risk policy
150+
1. Select **Done**.
151+
8. Under **Access controls** > **Grant**.
152+
1. Select **Grant access**, select the access control that matches the configuration in your current user risk policy
153+
1. Select **Select**.
154+
9. Under **Session**.
155+
1. Select **Sign-in frequency**.
156+
1. Ensure **Every time** is selected.
157+
1. Select **Select**.
158+
10. Confirm your settings, and set **Enable policy** to **Report-only**.
159+
11. Select **Create** to create to enable your policy in Report-only mode.
160+
12. Test your new Conditional Access policy in Report-only mode to ensure that it is working as expected
161+
162+
#### Step 2 Enable the new Conditional Access user risk policy
163+
13. Browse back to **Azure Active Directory** > **Security** > **Conditional Access**.
164+
14. Select this new policy to edit it.
165+
15. Set **Enable policy** to **On** to turn the policy on
166+
167+
#### Step 3 Turn off your old user risk policy in Identity Protection
168+
16. Browse to **Azure Active Directory** > **Identity Protection** > **User risk policy**
169+
17. Set **Enforce policy** to **Off**
170+
171+
172+
### Migrate Sign-in risk policy to Conditional Access
173+
174+
Example
175+
176+
![Migrate sign-in risk policy to Conditional Access](./media/howto-identity-protection-configure-risk-policies/sign-in-risk-policy-migration-to-CA.png)
177+
178+
1. Sign in to the **Azure portal** as a Global Administrator, Security Administrator, or Conditional Access Administrator.
179+
2. Browse to **Azure Active Directory** > **Security** > **Conditional Access**.
180+
3. Select **New policy**.
181+
4. Give your policy a name. We recommend that organizations create a meaningful standard for the names of their policies.
182+
5. Under **Assignments**, select **Users or workload identities**.
183+
1. Under **What does this policy apply to?**, select **Users and groups**
184+
2. Under **Include**, select users and groups that are included in your current sign-in risk policy in Identity Protection
185+
3. Under **Exclude**, select users and groups that are excluded from your current sign-in risk policy
186+
4. Select **Done**.
187+
6. Under **Cloud apps or actions** > **Include**, select **All cloud apps**.
188+
7. Under **Conditions** > **Sign-in risk**, set **Configure** to **Yes**.
189+
1. Under **Select the sign-in risk level this policy will apply to**. Select the risk levels that match the configuration in your current sign-in risk policy
190+
1. Select **Done**.
191+
8. Under **Access controls** > **Grant**.
192+
1. Select **Grant access**, select the access control that matches the configuration in your current sign-in risk policy
193+
1. Select **Select**.
194+
9. Under **Session**.
195+
1. Select **Sign-in frequency**.
196+
1. Ensure **Every time** is selected.
197+
1. Select **Select**.
198+
10. Confirm your settings and set **Enable policy** to **Report-only**.
199+
11. Select **Create** to create to enable your policy.
200+
201+
#### Step 2 Enable the new Conditional Access sign-in risk policy
202+
13. Browse back to **Azure Active Directory** > **Security** > **Conditional Access**.
203+
14. Select this new policy to edit it.
204+
15. Set **Enable policy** to **On** to turn the policy on
205+
206+
#### Step 3 Turn off your old sign-in risk policy in Identity Protection
207+
16. Browse to **Azure Active Directory** > **Identity Protection** > **Sign-in risk policy**
208+
17. Set **Enforce policy** to **Off**
209+
210+
129211
## Next steps
130212

131213
- [Enable Azure AD Multi-Factor Authentication registration policy](howto-identity-protection-configure-mfa-policy.md)

0 commit comments

Comments
 (0)