Skip to content

Commit 882b469

Browse files
committed
add Identity Protection section
1 parent 8e46196 commit 882b469

File tree

1 file changed

+25
-1
lines changed

1 file changed

+25
-1
lines changed

articles/azure-portal/mobile-app/microsoft-entra-id.md

Lines changed: 25 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Use Microsoft Entra ID with the Azure mobile app
33
description: Use the Azure mobile app to manage users and groups with Microsoft Entra ID.
4-
ms.date: 03/08/2024
4+
ms.date: 04/04/2024
55
ms.topic: conceptual
66
---
77

@@ -54,6 +54,30 @@ To [manage authentication methods](/entra/identity/authentication/concept-authen
5454
> [!NOTE]
5555
> You won't see the **Authentication methods** card if you don't have the appropriate permissions to manage authentication methods and/or password changes for a user.
5656
57+
## Investigate risky users and sign-ins
58+
59+
[Microsoft Entra ID Protection](/entra/id-protection/overview-identity-protection) provides organizations with reporting they can use to [investigate identity risks in their environment](/entra/id-protection/howto-identity-protection-investigate-risk).
60+
61+
If you have the [necessary permissions](/entra/id-protection/overview-identity-protection), you'll see details in the **Risky users** and **Risky sign-ins** sections within **Microsoft Entra ID**. You can open these sections to view more information and perform some management tasks.
62+
63+
### Manage risky users
64+
65+
1. In **Microsoft Entra ID**, scroll down to the **Security** card and then select **Risky users**.
66+
1. Search or scroll to find and select a specific risky user.
67+
1. Review basic information for this user, a list of their risky sign-ins, and their risk history.
68+
1. Select the three dots near the top of the screen to [take action on the user](/entra/id-protection/howto-identity-protection-investigate-risk). You can:
69+
70+
* Reset the user's password
71+
* Confirm user compromise
72+
* Dismiss user risk
73+
* Block the user from signing in (or unblock, if previously blocked)
74+
75+
## Monitor risky sign-ins
76+
77+
1. In **Microsoft Entra ID**, scroll down to the **Security** card and then select **Risky sign-ins**. It may take a minute or two for the list of all risky sign-ins to load.
78+
1. Search or scroll to find and select a specific risky sign-in.
79+
1. Select the risky sign-in to view more details about the sign-in. To perform actions such as blocking the user, follow the steps in the previous section.
80+
5781
## Activate Privileged Identity Management (PIM) roles
5882

5983
If you have been made eligible for an administrative role through Microsoft Entra Privileged Identity Management (PIM), you must activate the role assignment when you need to perform privileged actions. This activation can be done from within the Azure mobile app.

0 commit comments

Comments
 (0)