You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
# Conditional Access: User risk-based Conditional Access
19
19
20
-
Microsoft works with researchers, law enforcement, various security teams at Microsoft, and other trusted sources to find leaked username and password pairs. Organizations with Azure AD Premium P2 licenses can create Conditional Access policies incorporating [Azure AD Identity Protection user risk detections](../identity-protection/concept-identity-protection-risks.md#user-linked-detections).
20
+
Microsoft works with researchers, law enforcement, various security teams at Microsoft, and other trusted sources to find leaked username and password pairs. Organizations with Azure AD Premium P2 licenses can create Conditional Access policies incorporating [Azure AD Identity Protection user risk detections](../identity-protection/concept-identity-protection-risks.md).
21
21
22
22
There are two locations where this policy may be configured, Conditional Access and Identity Protection. Configuration using a Conditional Access policy is the preferred method providing more context including enhanced diagnostic data, report-only mode integration, Graph API support, and the ability to utilize other Conditional Access attributes in the policy.
23
23
@@ -36,29 +36,17 @@ Organizations can choose to deploy this policy using the steps outlined below or
36
36
1. Under **Exclude**, select **Users and groups** and choose your organization's emergency access or break-glass accounts.
37
37
1. Select **Done**.
38
38
1. Under **Cloud apps or actions** > **Include**, select **All cloud apps**.
39
-
1. Under **Conditions** > **User risk**, set **Configure** to **Yes**. Under **Configure user risk levels needed for policy to be enforced** select **High**, then select **Done**.
40
-
1. Under **Access controls** > **Grant**, select **Grant access**, **Require password change**, and select **Select**.
41
-
1. Confirm your settings and set **Enable policy** to **Report-only**.
39
+
1. Under **Conditions** > **User risk**, set **Configure** to **Yes**.
40
+
1. Under **Configure user risk levels needed for policy to be enforced**, select **High**.
1. Confirm your settings, and set **Enable policy** to **Report-only**.
42
46
1. Select **Create** to create to enable your policy.
43
47
44
48
After confirming your settings using [report-only mode](howto-conditional-access-insights-reporting.md), an administrator can move the **Enable policy** toggle from **Report-only** to **On**.
45
49
46
-
## Enable through Identity Protection
47
-
48
-
1. Sign in to the **Azure portal**.
49
-
1. Select **All services**, then browse to **Azure AD Identity Protection**.
50
-
1. Select **User risk policy**.
51
-
1. Under **Assignments**, select **Users**.
52
-
1. Under **Include**, select **All users**.
53
-
1. Under **Exclude**, select **Select excluded users**, choose your organization's emergency access or break-glass accounts, and select **Select**.
54
-
1. Select **Done**.
55
-
1. Under **Conditions**, select **User risk**, then choose **High**.
56
-
1. Select **Select**, then **Done**.
57
-
1. Under **Controls** > **Access**, choose **Allow access**, and then select **Require password change**.
58
-
1. Select **Select**.
59
-
1. Set **Enforce Policy** to **On**.
60
-
1. Select **Save**.
61
-
62
50
## Next steps
63
51
64
52
[Conditional Access common policies](concept-conditional-access-policy-common.md)
1. Confirm your settings and set **Enable policy** to **Report-only**.
46
48
1. Select **Create** to create to enable your policy.
47
49
48
50
After confirming your settings using [report-only mode](howto-conditional-access-insights-reporting.md), an administrator can move the **Enable policy** toggle from **Report-only** to **On**.
49
51
50
-
## Enable through Identity Protection
51
-
52
-
1. Sign in to the **Azure portal**.
53
-
1. Select **All services**, then browse to **Azure AD Identity Protection**.
54
-
1. Select **Sign-in risk policy**.
55
-
1. Under **Assignments**, select **Users**.
56
-
1. Under **Include**, select **All users**.
57
-
1. Under **Exclude**, select **Select excluded users**, choose your organization's emergency access or break-glass accounts, and select **Select**.
58
-
1. Select **Done**.
59
-
1. Under **Conditions**, select **Sign-in risk**, then choose **Medium and above**.
60
-
1. Select **Select**, then **Done**.
61
-
1. Under **Controls** > **Access**, choose **Allow access**, and then select **Require multi-factor authentication**.
62
-
1. Select **Select**.
63
-
1. Set **Enforce Policy** to **On**.
64
-
1. Select **Save**.
65
-
66
52
## Next steps
67
53
68
54
[Conditional Access common policies](concept-conditional-access-policy-common.md)
0 commit comments