Skip to content

Commit 8ef72a2

Browse files
fixes
1 parent 6955439 commit 8ef72a2

File tree

1 file changed

+7
-7
lines changed

1 file changed

+7
-7
lines changed

articles/active-directory/identity-protection/howto-identity-protection-configure-risk-policies.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -32,11 +32,16 @@ Choosing to apply access control on a **High** risk level reduces the number of
3232

3333
Configured trusted [network locations](../conditional-access/location-condition.md) are used by Identity Protection in some risk detections to reduce false positives.
3434

35-
## Risk remediation
35+
### Risk remediation
3636

3737
Organizations can choose to block access when risk is detected. Blocking sometimes stops legitimate users from doing what they need to. A better solution is to allow self-remediation using Azure AD Multi-Factor Authentication (MFA) and secure self-service password reset (SSPR).
3838

39-
## Microsoft's recommendation
39+
> [!WARNING]
40+
> Users must register for Azure AD MFA and SSPR before they face a situation requiring remediation. Users not registered are blocked and require administrator intervention.
41+
>
42+
> Password change (I know my password and want to change it to something new) outside of the risky user policy remediation flow does not meet the requirement for secure password reset.
43+
44+
### Microsoft's recommendation
4045

4146
Microsoft recommends the below risk policy configurations to protect your organization:
4247

@@ -47,11 +52,6 @@ Microsoft recommends the below risk policy configurations to protect your organi
4752

4853
Requiring access control when risk level is low will introduce more user interrupts. Choosing to block access rather than allowing self-remediation options, like secure password reset and multi-factor authentication, will impact your users and administrators. Weigh these choices when configuring your policies.
4954

50-
> [!WARNING]
51-
> Users must register for Azure AD MFA and SSPR before they face a situation requiring remediation. Users not registered are blocked and require administrator intervention.
52-
>
53-
> Password change (I know my password and want to change it to something new) outside of the risky user policy remediation flow does not meet the requirement for secure password reset.
54-
5555
## Exclusions
5656

5757
Policies allow for excluding users such as your [emergency access or break-glass administrator accounts](../roles/security-emergency-access.md). Organizations may need to exclude other accounts from specific policies based on the way the accounts are used. Exclusions should be reviewed regularly to see if they're still applicable.

0 commit comments

Comments
 (0)