Skip to content

Commit c0d857a

Browse files
authored
Merge pull request #100246 from MicrosoftGuyJFlo/PublicPR45163
[Azure AD] Identity Protection - Public PR 45163 Clarification
2 parents 006b49d + dc512ba commit c0d857a

File tree

1 file changed

+3
-1
lines changed

1 file changed

+3
-1
lines changed

articles/active-directory/identity-protection/howto-identity-protection-configure-risk-policies.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: identity-protection
88
ms.topic: conceptual
9-
ms.date: 10/18/2019
9+
ms.date: 01/06/2020
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -44,6 +44,8 @@ Choosing a **High** threshold reduces the number of times a policy is triggered
4444

4545
All of the policies allow for excluding users such as your [emergency access or break-glass administrator accounts](../users-groups-roles/directory-emergency-access.md). Organizations may determine they need to exclude other accounts from specific policies based on the way the accounts are used. All exclusions should be reviewed regularly to see if they are still applicable.
4646

47+
Configured trusted [network locations](../conditional-access/location-condition.md) are used by Identity Protection in some risk detections to reduce false positives.
48+
4749
## Enable policies
4850

4951
To enable the user risk and sign-in risk policies complete the following steps.

0 commit comments

Comments
 (0)