You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/identity-protection/howto-identity-protection-configure-risk-policies.md
+84-2Lines changed: 84 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -22,7 +22,7 @@ As we learned in the previous article, [Identity Protection policies](concept-id
22
22
- Sign-in risk policy
23
23
- User risk policy
24
24
25
-

25
+

26
26
27
27
## Choosing acceptable risk levels
28
28
@@ -110,7 +110,7 @@ Before organizations enable remediation policies, they may want to [investigate]
110
110
1. Confirm your settings and set **Enable policy** to **On**.
111
111
1. Select **Create** to create to enable your policy.
112
112
113
-
###Migrate Identity Protection risk policies to Conditional Access
113
+
## Migrate risk policies from Identity Protection to Conditional Access
114
114
115
115
While Identity Protection also provides two risk policies with limited conditions, we highly recommend setting up risk-based policies in Conditional Access for the following benefits:
116
116
@@ -126,6 +126,88 @@ If you already have risk policies enabled in Identity Protection, we highly reco
126
126
4. Disable the old risk policies in Identity Protection.
127
127
5. Create additional risk policies if needed in Conditional Access.
128
128
129
+
Specific steps for the migration are listed below.
130
+
131
+
### Migrate User risk policy to Conditional Access
132
+
133
+
Example
134
+
135
+

136
+
137
+
#### Step 1 Create an equivalent user risk policy in Report-only mode Conditional Access
138
+
1. Sign in to the **Azure portal** as a Global Administrator, Security Administrator, or Conditional Access Administrator.
139
+
2. Browse to **Azure Active Directory** > **Security** > **Conditional Access**.
140
+
3. Select **New policy**.
141
+
4. Give your policy a name. We recommend that organizations create a meaningful standard for the names of their policies.
142
+
5. Under **Assignments**, select **Users or workload identities**.
143
+
1. Under **What does this policy apply to?**, select **Users and groups**
144
+
2. Under **Include**, select users and groups that are included in your current user risk policy in Identity Protection
145
+
3. Under **Exclude**, select select users and groups that are excluded from your current user risk policy
146
+
4. Select **Done**.
147
+
6. Under **Cloud apps or actions** > **Include**, select **All cloud apps**.
148
+
7. Under **Conditions** > **User risk**, set **Configure** to **Yes**.
149
+
1. Under **Configure user risk levels needed for policy to be enforced**, select the risk levels that match the configuration in your current user risk policy
150
+
1. Select **Done**.
151
+
8. Under **Access controls** > **Grant**.
152
+
1. Select **Grant access**, select the access control that matches the configuration in your current user risk policy
153
+
1. Select **Select**.
154
+
9. Under **Session**.
155
+
1. Select **Sign-in frequency**.
156
+
1. Ensure **Every time** is selected.
157
+
1. Select **Select**.
158
+
10. Confirm your settings, and set **Enable policy** to **Report-only**.
159
+
11. Select **Create** to create to enable your policy in Report-only mode.
160
+
12. Test your new Conditional Access policy in Report-only mode to ensure that it is working as expected
161
+
162
+
#### Step 2 Enable the new Conditional Access user risk policy
163
+
13. Browse back to **Azure Active Directory** > **Security** > **Conditional Access**.
164
+
14. Select this new policy to edit it.
165
+
15. Set **Enable policy** to **On** to turn the policy on
166
+
167
+
#### Step 3 Turn off your old user risk policy in Identity Protection
168
+
16. Browse to **Azure Active Directory** > **Identity Protection** > **User risk policy**
169
+
17. Set **Enforce policy** to **Off**
170
+
171
+
172
+
### Migrate Sign-in risk policy to Conditional Access
173
+
174
+
Example
175
+
176
+

177
+
178
+
1. Sign in to the **Azure portal** as a Global Administrator, Security Administrator, or Conditional Access Administrator.
179
+
2. Browse to **Azure Active Directory** > **Security** > **Conditional Access**.
180
+
3. Select **New policy**.
181
+
4. Give your policy a name. We recommend that organizations create a meaningful standard for the names of their policies.
182
+
5. Under **Assignments**, select **Users or workload identities**.
183
+
1. Under **What does this policy apply to?**, select **Users and groups**
184
+
2. Under **Include**, select users and groups that are included in your current sign-in risk policy in Identity Protection
185
+
3. Under **Exclude**, select users and groups that are excluded from your current sign-in risk policy
186
+
4. Select **Done**.
187
+
6. Under **Cloud apps or actions** > **Include**, select **All cloud apps**.
188
+
7. Under **Conditions** > **Sign-in risk**, set **Configure** to **Yes**.
189
+
1. Under **Select the sign-in risk level this policy will apply to**. Select the risk levels that match the configuration in your current sign-in risk policy
190
+
1. Select **Done**.
191
+
8. Under **Access controls** > **Grant**.
192
+
1. Select **Grant access**, select the access control that matches the configuration in your current sign-in risk policy
193
+
1. Select **Select**.
194
+
9. Under **Session**.
195
+
1. Select **Sign-in frequency**.
196
+
1. Ensure **Every time** is selected.
197
+
1. Select **Select**.
198
+
10. Confirm your settings and set **Enable policy** to **Report-only**.
199
+
11. Select **Create** to create to enable your policy.
200
+
201
+
#### Step 2 Enable the new Conditional Access sign-in risk policy
202
+
13. Browse back to **Azure Active Directory** > **Security** > **Conditional Access**.
203
+
14. Select this new policy to edit it.
204
+
15. Set **Enable policy** to **On** to turn the policy on
205
+
206
+
#### Step 3 Turn off your old sign-in risk policy in Identity Protection
207
+
16. Browse to **Azure Active Directory** > **Identity Protection** > **Sign-in risk policy**
208
+
17. Set **Enforce policy** to **Off**
209
+
210
+
129
211
## Next steps
130
212
131
213
-[Enable Azure AD Multi-Factor Authentication registration policy](howto-identity-protection-configure-mfa-policy.md)
0 commit comments