Skip to content

Commit aeed36b

Browse files
Updates from IP Team
1 parent 98078ad commit aeed36b

File tree

3 files changed

+43
-65
lines changed

3 files changed

+43
-65
lines changed

articles/active-directory/conditional-access/plan-conditional-access.md

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: conditional-access
88
ms.topic: how-to
9-
ms.date: 01/03/2023
9+
ms.date: 02/10/2023
1010

1111
ms.author: gasinh
1212
author: gargi-sinha
@@ -31,17 +31,17 @@ Microsoft provides [security defaults](../fundamentals/concept-fundamentals-secu
3131

3232
* A working Azure AD tenant with Azure AD Premium P1, P2, or trial license enabled. If needed, [create one for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
3333
* Azure AD Premium P2 is required to include Identity Protection risk in Conditional Access policies.
34-
* Conditional Access policies can be created or modified by anyone assigned the following roles:
35-
* [Conditional Access Administrator](../roles/permissions-reference.md#conditional-access-administrator)
36-
* [Security Administrator](../roles/permissions-reference.md#security-administrator)
37-
* [Global Administrator](../roles/permissions-reference.md#global-administrator)
38-
* Conditional Access policies and configuration can be read by anyone assigned the following roles:
39-
* [Security Reader](../roles/permissions-reference.md#security-reader)
40-
* [Global Reader](../roles/permissions-reference.md#global-reader)
41-
* A test user (non-administrator) that allows you to verify policies work as expected before you affect real users. If you need to create a user, see [Quickstart: Add new users to Azure Active Directory](../fundamentals/add-users-azure-active-directory.md).
34+
* Administrators who interact with Conditional Access must have one or more of the following role assignments depending on the tasks they're performing. To follow the [Zero Trust principle of least privilege](/security/zero-trust/), consider using [Privileged Identity Management (PIM)](../privileged-identity-management/pim-configure.md) to just-in-time activate privileged role assignments.
35+
* Read Conditional Access policies and configurations
36+
* [Security Reader](../roles/permissions-reference.md#security-reader)
37+
* [Global Reader](../roles/permissions-reference.md#global-reader)
38+
* Create or modify Conditional Access policies
39+
* [Conditional Access Administrator](../roles/permissions-reference.md#conditional-access-administrator)
40+
* [Security Administrator](../roles/permissions-reference.md#security-administrator)
41+
* A test user (non-administrator) that allows you to verify policies work as expected before deploying to real users. If you need to create a user, see [Quickstart: Add new users to Azure Active Directory](../fundamentals/add-users-azure-active-directory.md).
4242
* A group that the non-administrator user is a member of. If you need to create a group, see [Create a group and add members in Azure Active Directory](../fundamentals/active-directory-groups-create-azure-portal.md).
4343

44-
### Communication plan
44+
### Communicating change
4545

4646
Communication is critical to the success of any new functionality. You should proactively communicate with your users how their experience will change, when it will change, and how to get support if they experience issues.
4747

articles/active-directory/identity-protection/how-to-deploy-identity-protection.md

Lines changed: 33 additions & 55 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: identity-protection
88
ms.topic: how-to
9-
ms.date: 01/25/2023
9+
ms.date: 02/10/2023
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -17,119 +17,97 @@ ms.collection: M365-identity-device-management
1717
---
1818
# Plan an Identity Protection deployment
1919

20-
Azure Active Directory (Azure AD) Identity Protection enhances other capabilities like Conditional Access, self-service password reset, and logs.
20+
Azure Active Directory (Azure AD) Identity Protection detects identity-based risks, reports them, and allows administrators to investigate and remediate these risks to keep organizations safe and secure. The risks can be further fed into tools like Conditional Access to make access decisions or fed back to a security information and event management (SIEM) tool for further investigation.
21+
22+
:::image type="content" source="media/how-to-deploy-identity-protection/identity-protection-overview.png" alt-text="Screenshot showing the Identity Protection Overview page showing some risky users and sign-ins." lightbox="media/how-to-deploy-identity-protection/identity-protection-overview.png":::
2123

2224
This deployment plan extends concepts introduced in the [Conditional Access deployment plan](../conditional-access/plan-conditional-access.md).
2325

2426
## Prerequisites
2527

2628
* A working Azure AD tenant with Azure AD Premium P2, or trial license enabled. If needed, [create one for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
2729
* Azure AD Premium P2 is required to include Identity Protection risk in Conditional Access policies.
28-
* Conditional Access policies can be created or modified by anyone assigned the following roles:
29-
* [Conditional Access Administrator](../roles/permissions-reference.md#conditional-access-administrator)
30-
* [Security Administrator](../roles/permissions-reference.md#security-administrator)
31-
* [Global Administrator](../roles/permissions-reference.md#global-administrator)
32-
* Identity Protection and Conditional Access policies and configuration can be read by anyone assigned the following roles:
33-
* [Security Reader](../roles/permissions-reference.md#security-reader)
34-
* [Global Reader](../roles/permissions-reference.md#global-reader)
35-
* Identity Protection can be managed by anyone assigned the following roles:
36-
* [Security Operator](../roles/permissions-reference.md#security-operator)
37-
* [Security Administrator](../roles/permissions-reference.md#security-administrator)
38-
* [Global Administrator](../roles/permissions-reference.md#global-administrator)
39-
* A test user (non-administrator) that allows you to verify policies work as expected before you affect real users. If you need to create a user, see [Quickstart: Add new users to Azure Active Directory](../fundamentals/add-users-azure-active-directory.md).
30+
* Administrators who interact with Identity Protection must have one or more of the following role assignments depending on the tasks they're performing. To follow the [Zero Trust principle of least privilege](/security/zero-trust/), consider using [Privileged Identity Management (PIM)](../privileged-identity-management/pim-configure.md) to just-in-time activate privileged role assignments.
31+
* Read Identity Protection and Conditional Access policies and configurations
32+
* [Security Reader](../roles/permissions-reference.md#security-reader)
33+
* [Global Reader](../roles/permissions-reference.md#global-reader)
34+
* Manage Identity Protection
35+
* [Security Operator](../roles/permissions-reference.md#security-operator)
36+
* [Security Administrator](../roles/permissions-reference.md#security-administrator)
37+
* Create or modify Conditional Access policies
38+
* [Conditional Access Administrator](../roles/permissions-reference.md#conditional-access-administrator)
39+
* [Security Administrator](../roles/permissions-reference.md#security-administrator)
40+
* A test user (non-administrator) that allows you to verify policies work as expected before deploying to real users. If you need to create a user, see [Quickstart: Add new users to Azure Active Directory](../fundamentals/add-users-azure-active-directory.md).
4041
* A group that the non-administrator user is a member of. If you need to create a group, see [Create a group and add members in Azure Active Directory](../fundamentals/active-directory-groups-create-azure-portal.md).
4142

4243
### Engage the right stakeholders
4344

4445
When technology projects fail, they typically do so due to mismatched expectations on affect, outcomes, and responsibilities. To avoid these pitfalls, ensure that you’re engaging the right stakeholders and that stakeholder roles in the project are well understood by documenting the stakeholders, their project input, and accountability.
4546

46-
### Communication plan
47+
### Communicating change
4748

48-
Communication is critical to the success of any new functionality. You should proactively communicate with your users how their [experience](concept-identity-protection-user-experience.md) will change, when it will change, and how to get support if they experience issues.
49+
Communication is critical to the success of any new functionality. You should proactively communicate with your users how their [experience](concept-identity-protection-user-experience.md) changes, when it changes, and how to get support if they experience issues.
4950

5051
## Step 1: Review existing reports
5152

52-
It's important to understand your current Identity Protection reports before deploying risk based Conditional Access policies. This review is to give you an understanding of your environment, investigate suspicious behavior you may have missed and to dismiss or confirm safe user who you have determined aren't at risk. We recommend allowing users to self-remediate through policies that will be discussed in [Step 3](#step-3-configure-your-policies).
53+
It's important to review the [Identity Protection reports](howto-identity-protection-investigate-risk.md) before deploying risk-based Conditional Access policies. This review gives an opportunity to investigate existing suspicious behavior you may have missed and to dismiss or confirm these users as safe if you've determined they aren't at risk.
5354

54-
### Existing risk detections
55+
- [Investigate risk detections](howto-identity-protection-investigate-risk.md)
56+
- [Remediate risks and unblock users](howto-identity-protection-remediate-unblock.md)
57+
- [Make bulk changes using Microsoft Graph PowerShell](howto-identity-protection-graph-api.md)
5558

56-
If your users haven't been remediating risk, then they may have accumulated risk. Users who reset their password on-premises don't remediate risk. Make sure before you dismiss risks, you've determined they aren't really at risk by [investigating risk detections](howto-identity-protection-investigate-risk.md). After investigating, you can remediate user risk by following the steps in the article, [Remediate risks and unblock users](howto-identity-protection-remediate-unblock.md). Make bulk changes to user risk by following the samples in the article, [Azure Active Directory Identity Protection and the Microsoft Graph PowerShell](howto-identity-protection-graph-api.md).
59+
For efficiency, we recommend allowing users to self-remediate through policies that are discussed in [Step 3](#step-3-configure-your-policies).
5760

5861
## Step 2: Plan for Conditional Access risk policies
5962

60-
Conditional Access brings signals together to make decisions and enforce organizational policies. Conditional access sign-in risk and user policies work to automate threat detections and allow users to self-remediate risk.
63+
Identity Protection sends risk signals to Conditional Access, to make decisions and enforce organizational policies like requiring multifactor authentication or password change. There are several items organizations should plan for prior to creating their policies.
6164

6265
### Policy exclusions
6366

6467
[!INCLUDE [active-directory-policy-exclusions](../../../includes/active-directory-policy-exclude-user.md)]
6568

66-
### Related features
67-
68-
For users to self-remediate risk though, they must register for Azure AD Multifactor Authentication before they become risky. For more information see the article, [Plan an Azure Active Directory Multi-Factor Authentication deployment](../authentication/howto-mfa-getstarted.md).
69-
70-
Other features that you may wish to consider include:
69+
### Multifactor authentication
7170

72-
- [Plan a passwordless authentication deployment in Azure Active Directory](../authentication/howto-authentication-passwordless-deployment.md)
73-
- [Plan an Azure Active Directory self-service password reset deployment](../authentication/howto-sspr-deployment.md)
74-
- [Plan and deploy on-premises Azure Active Directory Password Protection](../authentication/howto-password-ban-bad-on-premises-deploy.md)
71+
For users to self-remediate risk though, they must register for Azure AD Multifactor Authentication before they become risky. For more information, see the article [Plan an Azure Active Directory Multi-Factor Authentication deployment](../authentication/howto-mfa-getstarted.md).
7572

7673
### Known network locations
7774

78-
It's important to configure named locations in Conditional Access and add your VPN ranges to Defender for Cloud Apps. Sign-ins from named locations, marked as trusted or known, improve the accuracy of Azure AD Identity Protection's risk calculation. These sign-ins lower a user's risk when they authenticate from a location marked as trusted or known. This practice will reduce false positives for some detections in your environment.
75+
It's important to configure named locations in Conditional Access and add your VPN ranges to [Defender for Cloud Apps](/defender-cloud-apps/ip-tags#create-an-ip-address-range). Sign-ins from named locations, marked as trusted or known, improve the accuracy of Azure AD Identity Protection risk calculations. These sign-ins lower a user's risk when they authenticate from a location marked as trusted or known. This practice reduces false positives for some detections in your environment.
7976

8077
### Report only mode
8178

82-
Report-only mode is a Conditional Access policy state that allows administrators to evaluate the effect of Conditional Access policies before enforcing them in their environment.
79+
[Report-only mode](../conditional-access/howto-conditional-access-insights-reporting.md) is a Conditional Access policy state that allows administrators to evaluate the effect of Conditional Access policies before enforcing them in their environment.
8380

8481
## Step 3: Configure your policies
8582

8683
### Identity Protection MFA registration policy
8784

8885
Use the Identity Protection multifactor authentication registration policy to help get your users registered for Azure AD Multifactor Authentication before they need to use it. Follow the steps in the article [How To: Configure the Azure AD multifactor authentication registration policy](howto-identity-protection-configure-mfa-policy.md) to enable this policy.
8986

90-
### Conditional Access sign-in risk policy
91-
92-
Most users have a normal behavior that can be tracked, when they fall outside of this norm it could be risky to allow them to just sign in. You may want to block that user or maybe just ask them to perform multi-factor authentication to prove that they're really who they say they are. You may want to start by scoping these policies to admins only.
93-
94-
The article [Common Conditional Access policy: Sign-in risk-based multifactor authentication](../conditional-access/howto-conditional-access-policy-risk.md) provides guidance to create a sign-in risk policy.
95-
96-
### Conditional Access user risk
87+
### Conditional Access policies
9788

98-
Microsoft works with researchers, law enforcement, various security teams at Microsoft, and other trusted sources to find leaked username and password pairs. When these vulnerable users are detected, we recommend requiring users perform multifactor authentication then reset their password.
89+
**Sign-in risk** - Most users have a normal behavior that can be tracked, when they fall outside of this norm it could be risky to allow them to just sign in. You may want to block that user or maybe just ask them to perform multi-factor authentication to prove that they're really who they say they are. You may want to start by scoping these policies to admins only.
9990

100-
The article [Common Conditional Access policy: User risk-based password change](../conditional-access/howto-conditional-access-policy-risk-user.md) provides guidance to create a user risk policy that requires password change.
91+
**User risk** - Microsoft works with researchers, law enforcement, various security teams at Microsoft, and other trusted sources to find leaked username and password pairs. When these vulnerable users are detected, we recommend requiring users perform multifactor authentication then reset their password.
10192

102-
### Migrating from older Identity Protection policies
103-
104-
If you already deployed legacy Identity Protection risk policies we recommend migrating them to Conditional Access policies. Conditional Access policies provide the following benefits:
105-
106-
- Enhanced diagnostic data
107-
- Report-only mode integration
108-
- Graph API support
109-
- Ability to use more Conditional Access attributes like sign-in frequency in the policy
110-
111-
For more information, see the section [Migrate risk policies from Identity Protection to Conditional Access](howto-identity-protection-configure-risk-policies.md#migrate-risk-policies-from-identity-protection-to-conditional-access).
93+
The article [Configure and enable risk policies](howto-identity-protection-configure-risk-policies.md) provides guidance to create Conditional Access policies to address these risks.
11294

11395
## Step 4: Monitoring and continuous operational needs
11496

115-
### Enable notifications
97+
### Email notifications
11698

11799
[Enable notifications](howto-identity-protection-configure-notifications.md) so you can respond when a user is flagged as at risk so you can start investigating immediately. You can also set up weekly digest emails giving you an overview of risk for that week.
118100

119101
### Monitor and investigate
120102

121103
The [Identity Protection workbook](../reports-monitoring/workbook-risk-analysis.md) can help monitor and look for patterns in your tenant. Monitor this workbook for trends and also Conditional Access Report Only mode results to see if there are any changes that need to be made, for example, additions to named locations.
122104

123-
Microsoft Defender for Cloud Apps provides an investigation framework organizations can use as a starting point. For more information, see the article [How to investigate anomaly detection alerts] (/defender-cloud-apps/investigate-anomaly-alerts).
105+
Microsoft Defender for Cloud Apps provides an investigation framework organizations can use as a starting point. For more information, see the article [How to investigate anomaly detection alerts](/defender-cloud-apps/investigate-anomaly-alerts).
124106

125107
You can also use the Identity Protection APIs to [export risk information](howto-export-risk-data.md) to other tools, so your security team can monitor and alert on risk events.
126108

127109
During testing, you might want to [simulate some threats](howto-identity-protection-simulate-risk.md) to test your investigation processes.
128110

129-
## Step 5: Enable Conditional Access policies
130-
131-
After you've completed all your analysis, evaluated policies in report only mode, and you have your stakeholders on board it's time to turn on your Conditional Access risk policies.
132-
133111
## Next steps
134112

135113
[What is risk?](concept-identity-protection-risks.md)
Loading

0 commit comments

Comments
 (0)