Skip to content

Commit befe6cc

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into fa
2 parents e9b6b7e + 6a03912 commit befe6cc

13 files changed

+249
-91
lines changed

articles/active-directory/conditional-access/howto-conditional-access-policy-risk-user.md

Lines changed: 9 additions & 21 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: conditional-access
88
ms.topic: how-to
9-
ms.date: 11/05/2021
9+
ms.date: 03/21/2022
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -17,7 +17,7 @@ ms.collection: M365-identity-device-management
1717
---
1818
# Conditional Access: User risk-based Conditional Access
1919

20-
Microsoft works with researchers, law enforcement, various security teams at Microsoft, and other trusted sources to find leaked username and password pairs. Organizations with Azure AD Premium P2 licenses can create Conditional Access policies incorporating [Azure AD Identity Protection user risk detections](../identity-protection/concept-identity-protection-risks.md#user-linked-detections).
20+
Microsoft works with researchers, law enforcement, various security teams at Microsoft, and other trusted sources to find leaked username and password pairs. Organizations with Azure AD Premium P2 licenses can create Conditional Access policies incorporating [Azure AD Identity Protection user risk detections](../identity-protection/concept-identity-protection-risks.md).
2121

2222
There are two locations where this policy may be configured, Conditional Access and Identity Protection. Configuration using a Conditional Access policy is the preferred method providing more context including enhanced diagnostic data, report-only mode integration, Graph API support, and the ability to utilize other Conditional Access attributes in the policy.
2323

@@ -36,29 +36,17 @@ Organizations can choose to deploy this policy using the steps outlined below or
3636
1. Under **Exclude**, select **Users and groups** and choose your organization's emergency access or break-glass accounts.
3737
1. Select **Done**.
3838
1. Under **Cloud apps or actions** > **Include**, select **All cloud apps**.
39-
1. Under **Conditions** > **User risk**, set **Configure** to **Yes**. Under **Configure user risk levels needed for policy to be enforced** select **High**, then select **Done**.
40-
1. Under **Access controls** > **Grant**, select **Grant access**, **Require password change**, and select **Select**.
41-
1. Confirm your settings and set **Enable policy** to **Report-only**.
39+
1. Under **Conditions** > **User risk**, set **Configure** to **Yes**.
40+
1. Under **Configure user risk levels needed for policy to be enforced**, select **High**.
41+
1. Select **Done**.
42+
1. Under **Access controls** > **Grant**.
43+
1. Select **Grant access**, **Require password change**.
44+
1. Select **Select**.
45+
1. Confirm your settings, and set **Enable policy** to **Report-only**.
4246
1. Select **Create** to create to enable your policy.
4347

4448
After confirming your settings using [report-only mode](howto-conditional-access-insights-reporting.md), an administrator can move the **Enable policy** toggle from **Report-only** to **On**.
4549

46-
## Enable through Identity Protection
47-
48-
1. Sign in to the **Azure portal**.
49-
1. Select **All services**, then browse to **Azure AD Identity Protection**.
50-
1. Select **User risk policy**.
51-
1. Under **Assignments**, select **Users**.
52-
1. Under **Include**, select **All users**.
53-
1. Under **Exclude**, select **Select excluded users**, choose your organization's emergency access or break-glass accounts, and select **Select**.
54-
1. Select **Done**.
55-
1. Under **Conditions**, select **User risk**, then choose **High**.
56-
1. Select **Select**, then **Done**.
57-
1. Under **Controls** > **Access**, choose **Allow access**, and then select **Require password change**.
58-
1. Select **Select**.
59-
1. Set **Enforce Policy** to **On**.
60-
1. Select **Save**.
61-
6250
## Next steps
6351

6452
[Conditional Access common policies](concept-conditional-access-policy-common.md)

articles/active-directory/conditional-access/howto-conditional-access-policy-risk.md

Lines changed: 5 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: conditional-access
88
ms.topic: how-to
9-
ms.date: 11/05/2021
9+
ms.date: 03/21/2022
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -38,31 +38,17 @@ Organizations can choose to deploy this policy using the steps outlined below or
3838
1. Under **Exclude**, select **Users and groups** and choose your organization's emergency access or break-glass accounts.
3939
1. Select **Done**.
4040
1. Under **Cloud apps or actions** > **Include**, select **All cloud apps**.
41-
1. Under **Conditions** > **Sign-in risk**, set **Configure** to **Yes**. Under **Select the sign-in risk level this policy will apply to**
41+
1. Under **Conditions** > **Sign-in risk**, set **Configure** to **Yes**. Under **Select the sign-in risk level this policy will apply to**.
4242
1. Select **High** and **Medium**.
4343
1. Select **Done**.
44-
1. Under **Access controls** > **Grant**, select **Grant access**, **Require multi-factor authentication**, and select **Select**.
44+
1. Under **Access controls** > **Grant**.
45+
1. Select **Grant access**, **Require multi-factor authentication**.
46+
1. Select **Select**.
4547
1. Confirm your settings and set **Enable policy** to **Report-only**.
4648
1. Select **Create** to create to enable your policy.
4749

4850
After confirming your settings using [report-only mode](howto-conditional-access-insights-reporting.md), an administrator can move the **Enable policy** toggle from **Report-only** to **On**.
4951

50-
## Enable through Identity Protection
51-
52-
1. Sign in to the **Azure portal**.
53-
1. Select **All services**, then browse to **Azure AD Identity Protection**.
54-
1. Select **Sign-in risk policy**.
55-
1. Under **Assignments**, select **Users**.
56-
1. Under **Include**, select **All users**.
57-
1. Under **Exclude**, select **Select excluded users**, choose your organization's emergency access or break-glass accounts, and select **Select**.
58-
1. Select **Done**.
59-
1. Under **Conditions**, select **Sign-in risk**, then choose **Medium and above**.
60-
1. Select **Select**, then **Done**.
61-
1. Under **Controls** > **Access**, choose **Allow access**, and then select **Require multi-factor authentication**.
62-
1. Select **Select**.
63-
1. Set **Enforce Policy** to **On**.
64-
1. Select **Save**.
65-
6652
## Next steps
6753

6854
[Conditional Access common policies](concept-conditional-access-policy-common.md)

0 commit comments

Comments
 (0)