Skip to content

Commit af284c2

Browse files
committed
[AzureAD] WIP refactor of risk-based sign-in tutorial
1 parent a42f5b3 commit af284c2

File tree

5 files changed

+81
-54
lines changed

5 files changed

+81
-54
lines changed
71.8 KB
Loading
39.1 KB
Loading
38.6 KB
Loading
Lines changed: 81 additions & 54 deletions
Original file line numberDiff line numberDiff line change
@@ -1,90 +1,117 @@
11
---
2-
title: Risk-based MFA and SSPR with Azure Identity Protection
3-
description: In this tutorial, you will enable Azure Identity Protection integrations, for Multi-Factor Authentication and self-service password reset, to reduce risky behavior.
2+
title: Risk-based user sign-in protection in Azure Active Directory
3+
description: In this tutorial, you learn how to enable Azure Identity Protection to protect users when risky sign-in behavior is detected on their account.
44

5-
services: multi-factor-authentication
5+
services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: tutorial
9-
ms.date: 01/31/2018
9+
ms.date: 05/08/2020
1010

1111
ms.author: iainfou
1212
author: iainfoulds
1313
manager: daveba
14-
ms.reviewer: sahenry
1514

16-
# Customer intent: How, as an Azure AD Administrator, do I utilize Azure AD Identity Protection to better protect the sign-in process.
15+
# Customer intent: As an Azure AD Administrator, I want to learn how to use Azure Identity Protection to protect users by automatically detecting risk sign-in behavior and prompting for additional forms of authentication or request a password change.
1716
ms.collection: M365-identity-device-management
1817
---
19-
# Tutorial: Use risk detections to trigger Multi-Factor Authentication and password changes
18+
# Tutorial: Use risk detections for user sign-ins to trigger Azure Multi-Factor Authentication or password changes
2019

21-
In this tutorial, you will enable features of Azure Active Directory (Azure AD) Identity Protection, an Azure AD Premium P2 feature that is more than just a monitoring and reporting tool. To protect your organization's identities, you can configure risk-based policies that automatically respond to risky behaviors. These policies, can either automatically block or initiate remediation, including requiring password changes and enforcing Multi-Factor Authentication.
20+
To protect your users, you can configure risk-based policies in Azure Active Directory (Azure AD) that automatically respond to risky behaviors. Azure AD Identity Protection policies can automatically block a sign-in attempt or require additional action, such as require a password change or prompt for Azure Multi-Factor Authentication. These policies work with existing Azure AD Conditional Access policies as an extra layer of protection for org organization. Users may never trigger a risky behavior in one of these policies, but your organization is protected if an attempt to compromise your security is made.
2221

23-
Azure AD Identity Protection policies can be used in addition to existing Conditional Access policies as an extra layer of protection. Your users may never trigger a risky behavior requiring one of these policies, but as an administrator you know they are protected.
24-
25-
Some items that may trigger a risk detection include:
26-
27-
* Users with leaked credentials
28-
* Sign-ins from anonymous IP addresses
29-
* Impossible travel to atypical locations
30-
* Sign-ins from infected devices
31-
* Sign-ins from IP addresses with suspicious activity
32-
* Sign-ins from unfamiliar locations
33-
34-
More information about Azure AD Identity Protection can be found in the article [What is Azure AD Identity Protection](../active-directory-identityprotection.md)
22+
In this tutorial, you learn how to:
3523

3624
> [!div class="checklist"]
37-
> * Enable Azure MFA registration
25+
> * Understand the available policies for Azure AD Identity Protection
26+
> * Enable Azure Multi-Factor Authentication registration
3827
> * Enable risk-based password changes
3928
> * Enable risk-based Multi-Factor Authentication
29+
> * Test risk-based policies for user sign-in attempts
4030
4131
## Prerequisites
4232

43-
* Access to a working Azure AD tenant with at least a trial Azure AD Premium P2 license assigned.
44-
* An account with Global Administrator privileges in your Azure AD tenant.
45-
* Have completed the previous self-service password reset (SSPR) and Multi-Factor Authentication (MFA) tutorials.
33+
To complete this tutorial, you need the following resources and privileges:
34+
35+
* A working Azure AD tenant with at least an Azure AD Premium P2 trial license enabled.
36+
* If needed, [create one for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
37+
* An account with *Global Administrator* privileges.
38+
* Azure AD configured for self-service password reset and Azure Multi-Factor Authentication
39+
* If needed, [complete the tutorial to enable Azure AD SSPR](tutorial-enable-sspr.md).
40+
* If needed, [complete the tutorial to enable Azure Multi-Factor Authentication](tutorial-enable-azure-mfa.md).
41+
42+
## Overview of Azure AD Identity Protection
43+
44+
Each day, Microsoft collects and analyses trillions of anonymized signals as part of user sign-in attempts. These signals help build patterns of good user sign-in behavior, and identify potential risky sign-in attempts. Azure AD Identity Protection can review user sign-in attempts and take additional action if there's suspicious behavior.
45+
46+
Some of the following actions may trigger Azure AD Identity Protection risk detection:
47+
48+
* Users with leaked credentials.
49+
* Sign-ins from anonymous IP addresses.
50+
* Impossible travel to atypical locations.
51+
* Sign-ins from infected devices.
52+
* Sign-ins from IP addresses with suspicious activity.
53+
* Sign-ins from unfamiliar locations.
4654

47-
## Enable risk-based policies for SSPR and MFA
55+
The following three policies are available in Azure AD Identity Protection to protect users and respond to suspicious activity. You can choose to turn the policy enforcement on or off, select users or groups for the policy to apply to, and if you want to block access at sign-in or prompt for additional action.
4856

49-
Enabling the risk-based policies is a straightforward process. The steps below will guide you through a sample configuration.
57+
* User risk policy
58+
* Identifies and responds to user accounts that may have compromised credentials. Can prompt the user to create a new password.
59+
* Sign in risk policy
60+
* Identifies and responds to suspicious sign-in attempts. Can prompt the user to provide additional forms of verification using Azure Multi-Factor Authentication.
61+
* MFA registration policy
62+
* Makes sure users are registered for Azure Multi-Factor Authentication. If a sign-in risk policy prompts for MFA, the user must already be registered for Azure Multi-Factor Authentication.
5063

51-
### Enable users to register for Multi-Factor Authentication
64+
When you enable a policy, you can also choose the threshold for risk level - low and above, medium and above, or high. This flexibility lets you decide how aggressive you want to be in enforcing any controls for suspicious sign-in events.
5265

53-
Azure AD Identity Protection includes a default policy that can help you to get your users registered for Multi-Factor Authentication and easily identify the current registration status. Enabling this policy does not start requiring users to perform Multi-Factor Authentication, but will ask them to pre-register.
66+
For more information about Azure AD Identity Protection, see [What is Azure AD Identity Protection](../identity-protection/overview-identity-protection.md)
5467

55-
1. Sign in to the [Azure portal](https://portal.azure.com).
56-
1. Click on **All services**, then browse to **Azure AD Identity Protection**.
57-
1. Click on **MFA registration**.
58-
1. Set Enforce Policy to **On**.
59-
1. Setting this policy will require all of your users to register methods to prepare to use by Multi-Factor Authentication.
60-
1. Click **Save**.
68+
## Enable MFA registration policy
6169

62-
![Require users to register for MFA at sign-in](./media/tutorial-risk-based-sspr-mfa/risk-based-require-mfa-registration.png)
70+
Azure AD Identity Protection includes a default policy that can help get users registered for Azure Multi-Factor Authentication. If you use additional policies to protect sign-in events, you would need users to have already registered for MFA. When you enable this policy, it doesn't require users to perform MFA at each sign-in event. The policy only checks the registration status for a user and asks them to pre-register if needed.
6371

64-
### Enable risk-based password changes
72+
It's recommended to enable the MFA registration policy for users that are to be enabled for additional Azure AD Identity Protection policies. To enable this policy, complete the following steps:
6573

66-
Microsoft works with researchers, law enforcement, various security teams at Microsoft, and other trusted sources to find username and password pairs. When one of these pairs matches an account in your environment, a risk-based password change can be triggered using the following policy.
74+
1. Sign in to the [Azure portal](https://portal.azure.com) using a global administrator account.
75+
1. Search for and select **Azure Active Directory**, select **Security**, then under the *Protect* menu heading choose **Identity Protection**.
76+
1. Select the **MFA registration policy** from the menu on the left-hand side.
77+
1. By default, the policy applies to *All users*. If desired, select **Assignments**, then choose the users or groups to apply the policy on.
78+
1. Under *Controls*, select **Access**. Make sure the option for *Require Azure MFA registration* is checked, then choose **Select**.
79+
1. Set **Enforce Policy** to *On*, then select **Save**.
6780

68-
1. Click on User risk policy.
69-
1. Under **Conditions**, select **User risk**, then choose **Medium and above**.
70-
1. Click "Select" then "Done"
71-
1. Under **Access**, choose **Allow access**, and then select **Require password change**.
72-
1. Click "Select"
73-
1. Set Enforce Policy to **On**.
74-
1. Click **Save**
81+
![Screenshot of how to require users to register for MFA in the Azure portal](./media/tutorial-risk-based-sspr-mfa/enable-mfa-registration.png)
7582

76-
### Enable risk-based Multi-Factor Authentication
83+
## Enable user risk policy for password change
7784

78-
Most users have a normal behavior that can be tracked, when they fall outside of this norm it could be risky to allow them to just sign in. You may want to block that user or maybe just ask them to perform a Multi-Factor Authentication to prove that they are really who they say they are. To enable a policy requiring MFA when a risky sign-in is detected, enable the following policy.
85+
Microsoft works with researchers, law enforcement, various security teams at Microsoft, and other trusted sources to find username and password pairs. When one of these pairs matches an account in your environment, a risk-based password change can be requested. This policy and action makes the user update their password before they can sign in to make sure any previously exposed credentials no longer work.
7986

80-
1. Click on Sign-in risk policy
81-
1. Under **Conditions**, select **User risk**, then choose **Medium and above**.
82-
1. Click "Select" then "Done"
83-
1. Under **Access**, choose **Allow access**, and then select **Require multi-factor authentication**.
84-
1. Click "Select"
85-
1. Set Enforce Policy to **On**.
86-
1. Click **Save**
87+
To enable this policy, complete the following steps:
88+
89+
1. Select the **User risk policy** from the menu on the left-hand side.
90+
1. By default, the policy applies to *All users*. If desired, select **Assignments**, then choose the users or groups to apply the policy on.
91+
1. Under *Conditions*, choose **Select conditions > Select a risk level**, then choose **Medium and above**.
92+
1. Choose **Select**, then **Done**.
93+
1. Under *Access*, select **Access**. Make sure the option for **Allow access** and *Require password change* is checked, then choose **Select**.
94+
1. Set **Enforce Policy** to *On*, then select **Save**.
95+
96+
![Screenshot of how to enable the user risk policy in the Azure portal](./media/tutorial-risk-based-sspr-mfa/enable-user-risk-policy.png)
97+
98+
## Enable sign-in risk policy for MFA
99+
100+
Most users have a normal behavior that can be tracked. When they fall outside of this norm, it could be risky to allow them to successfully sign in. Instead, you may want to block that user, or ask them to perform a multi-factor authentication. If the user successfully completes the MFA challenge, you can consider it a valid sign-in attempt and grant access to the application or service.
101+
102+
To enable this policy, complete the following steps:
103+
104+
1. Select the **Sign-in risk policy** from the menu on the left-hand side.
105+
1. By default, the policy applies to *All users*. If desired, select **Assignments**, then choose the users or groups to apply the policy on.
106+
1. Under *Conditions*, choose **Select conditions > Select a risk level**, then choose **Medium and above**.
107+
1. Choose **Select**, then **Done**.
108+
1. Under *Access*, choose **Select a control**. Make sure the option for **Allow access** and *Require multi-factor authentication* is checked, then choose **Select**.
109+
1. Set **Enforce Policy** to *On*, then select **Save**.
110+
111+
![Screenshot of how to enable the sign-in risk policy in the Azure portal](./media/tutorial-risk-based-sspr-mfa/enable-sign-in-risk-policy.png)
87112

88113
## Clean up resources
89114

90-
If you have completed testing and no longer want to have the risk-based policies enabled, return to each policy you want to disable, and set **Enforce Policy** to **Off**.
115+
If you have completed tests and no longer want to have the risk-based policies enabled, return to each policy you want to disable and set *Enforce Policy* to **Off**.
116+
117+
## Next steps

0 commit comments

Comments
 (0)