Skip to content

Commit 95b281b

Browse files
WIP
1 parent 9c17364 commit 95b281b

File tree

6 files changed

+17
-15
lines changed

6 files changed

+17
-15
lines changed

articles/active-directory/identity-protection/concept-identity-protection-policies.md

Lines changed: 13 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: identity-protection
88
ms.topic: conceptual
9-
ms.date: 10/03/2022
9+
ms.date: 10/04/2022
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -23,33 +23,35 @@ Azure AD Conditional Access offers two risk conditions: **Sign-in risk** and **U
2323

2424
![Risk-based Conditional Access diagram](./media/concept-identity-protection-policies/risk-based-conditional-access-diagram.png)
2525

26-
For example, as shown in the diagram below, if you have a sign-in risk policy that requires multifactor authentication when the sign-in risk level is medium or high, then the user must pass that access control if their sign-in session is detected to be at high risk.
26+
For example, as shown in the diagram below, if organizations have a sign-in risk policy that requires multifactor authentication when the sign-in risk level is medium or high, their users must complete multifactor authentication when their sign-in risk is medium or high.
2727

28-
![Risk-based Conditional Access policy auto-remediation example diagram](./media/concept-identity-protection-policies/risk-based-conditional-access-policy-example.png)
28+
![Risk-based Conditional Access policy self-remediation example diagram](./media/concept-identity-protection-policies/risk-based-conditional-access-policy-example.png)
2929

30-
The example above also demonstrates a main benefit of risk-based policy: **automatic risk remediation**. When a user successfully completes the required access control that verified their identity, their risk will be automatically remediated. That sign-in session and their user account won't be at risk, and no action is needed from the administrator.
30+
The example above also demonstrates a main benefit of a risk-based policy: **automatic risk remediation**. When a user successfully completes the required access control, like a secure password change, their risk is remediated. That sign-in session and user account won't be at risk, and no action is needed from the administrator.
3131

32-
Automatic risk remediation will significantly reduce the risk investigation and remediation burden on the administrators while protecting your organizations from security compromises.
33-
More information about risk as a condition in a Conditional Access policy can be found in the article, [Conditional Access: Conditions](../conditional-access/concept-conditional-access-conditions.md#sign-in-risk)
32+
Allowing users to self-remediate using this process, will significantly reduce the risk investigation and remediation burden on the administrators while protecting your organizations from security compromises. More information about risk remediation can be found in the article, [Remediate risks and unblock users](howto-identity-protection-remediate-unblock.md).
3433

3534
## Sign-in risk-based Conditional Access policy
3635

37-
Identity Protection analyzes signals in real-time during each sign-in, calculates a real-time sign-in risk level based on the probability that the sign-in wasn't really the user, and sends the risk level to Conditional Access. Administrators can create a Sign-in risk-based Conditional Access policy to specify what access control to apply based on this risk level to enforce organizational requirements like:
36+
During each sign-in, Identity Protection analyzes hundreds of signals in real-time and calculates a sign-in risk level that represents the probability that the given authentication request isn't authorized. This risk level then gets sent to Conditional Access, where the organization's configured policies are evaluated. Administrators can configure sign-in risk-based Conditional Access policies to enforce access controls based on sign-in risk, including requirements such as:
3837

3938
- Block access
4039
- Allow access
4140
- Require multifactor authentication
4241

4342
If risks are detected on a sign-in, users can perform the required access control such as multifactor authentication to self-remediate and close the risky sign-in event to prevent unnecessary noise for administrators.
4443

45-
![Sign-in Risk-based Conditional Access policy](./media/concept-identity-protection-policies/sign-in-risk-CA-policy.png)
44+
![Sign-in Risk-based Conditional Access policy](./media/concept-identity-protection-policies/sign-in-risk-policy.png)
4645

4746
> [!NOTE]
4847
> Users must have previously registered for Azure AD Multifactor Authentication before triggering the sign-in risk policy.
4948
5049
## User risk-based Conditional Access policy
5150

52-
Identity Protection can calculate what it believes is normal for a user's behavior and use that to base decisions for their risk. User risk level is a calculation of probability that an identity has been compromised. If a user has risky sign-ins or there are risks such as leaked credentials detected on their account, then the user account is at risk with a user risk level calculated by Identity Protection. Administrators can create a User risk-based Conditional Access policy to specify what access control to apply based when the user is at risk to enforce organizational requirements: block access, allow access, or allow access but require a secure password change using [Azure AD self-service password reset](../authentication/howto-sspr-deployment.md).
51+
Identity Protection analyzes signals about user accounts and calculates a risk score based on the probability that the user has been compromised. If a user has risky sign-in behavior, or their credentials have been leaked, Identity Protection will use these signals to calculate the user risk level. Administrators can configure user risk-based Conditional Access policies to enforce access controls based on user risk, including requirements such as:
52+
53+
- Block access
54+
- Allow access but require a secure password change using [Azure AD self-service password reset](../authentication/howto-sspr-deployment.md).
5355

5456
A secure password change will remediate the user risk and close the risky user event to prevent unnecessary noise for administrators.
5557

@@ -58,14 +60,14 @@ A secure password change will remediate the user risk and close the risky user e
5860
5961
## Identity Protection policies
6062

61-
While Identity Protection also offers a user interface for creating user risk policy and sign-in risk policy, we highly recommend that you use Azure AD Conditional Access to create risk-based access policies for the following benefits:
63+
While Identity Protection also offers a user interface for creating user risk policy and sign-in risk policy, we highly recommend that you [use Azure AD Conditional Access to create risk-based policies](howto-identity-protection-configure-risk-policies.md) for the following benefits:
6264

6365
- Rich set of conditions to control access: Conditional Access offers a rich set of conditions such as applications and locations for configuration. The risk conditions can be used in combination with other conditions to create policies that best enforce your organizational requirements.
6466
- Multiple risk-based policies can be put in place to target different user groups or apply different access control for different risk levels.
6567
- Conditional Access policies can be created through Microsoft Graph API and can be tested first in report-only mode.
6668
- Manage all access policies in one place in Conditional Access.
6769

68-
If you already have Identity Protection risk policies set up, we encourage you to migrate them to Conditional Access.
70+
If you already have Identity Protection risk policies set up, we encourage you to [migrate them to Conditional Access](howto-identity-protection-configure-risk-policies.md#migrate-risk-policies-from-identity-protection-to-conditional-access).
6971

7072
## Azure AD MFA registration policy
7173

articles/active-directory/identity-protection/howto-identity-protection-configure-risk-policies.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: identity-protection
88
ms.topic: how-to
9-
ms.date: 10/03/2022
9+
ms.date: 10/04/2022
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -22,7 +22,7 @@ As we learned in the previous article, [Identity Protection policies](concept-id
2222
- Sign-in risk policy
2323
- User risk policy
2424

25-
![Risk conditions in Conditional Access](./media/howto-identity-protection-configure-risk-policies/CA-risk-conditions.png)
25+
![Risk conditions in Conditional Access](./media/howto-identity-protection-configure-risk-policies/sign-in-risk-conditions.png)
2626

2727
## Choosing acceptable risk levels
2828

@@ -125,11 +125,11 @@ While Identity Protection also provides two risk policies with limited condition
125125

126126
If you already have risk policies enabled in Identity Protection, we highly recommend that you migrate them to Conditional Access:
127127

128-
![Screenshots showing the migration of a user risk policy to Conditional Access](./media/howto-identity-protection-configure-risk-policies/user-risk-policy-migration-to-CA.png)
128+
![Screenshots showing the migration of a sign-in risk policy to Conditional Access](./media/howto-identity-protection-configure-risk-policies/sign-in-risk-policy-migration.png)
129129

130130
### Migrating to Conditional Access
131131

132-
1. **Create** [a risk-based policy](#enable-policies) in Conditional Access in report-only mode. You can do this with the steps above or using [Conditional Access templates](../conditional-access/concept-conditional-access-policy-common.md#common-conditional-access-policies).
132+
1. **Create an equivalent** [user risk-based](#user-risk-policy-in-conditional-access) and [sign-in risk-based ](#sign-in-risk-policy-in-conditional-access) policy in Conditional Access in report-only mode. You can do this with the steps above or using [Conditional Access templates](../conditional-access/concept-conditional-access-policy-common.md#common-conditional-access-policies) based on Microsoft's recommendations.
133133
1. Ensure that the new Conditional Access risk policy works as expected by testing it in [report-only mode](../conditional-access/howto-conditional-access-insights-reporting.md).
134134
1. **Enable** the new Conditional Access risk policy. You can choose to have both policies running side-by-side to confirm the new policies are working as expected before turning off the Identity Protection risk policies.
135135
1. Browse back to **Azure Active Directory** > **Security** > **Conditional Access**.

0 commit comments

Comments
 (0)