Skip to content

Commit ca78bb3

Browse files
[Microsoft Entra ID] ID Protection Standardization
1 parent d394ba0 commit ca78bb3

5 files changed

+24
-24
lines changed

articles/active-directory/identity-protection/concept-workload-identity-risk.md

Lines changed: 4 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,6 @@ ms.reviewer: etbasser
1515

1616
ms.collection: M365-identity-device-management
1717
---
18-
1918
# Securing workload identities
2019

2120
Azure AD Identity Protection has historically protected users in detecting, investigating, and remediating identity-based risks. We're now extending these capabilities to workload identities to protect applications and service principals.
@@ -40,10 +39,10 @@ To make use of workload identity risk, including the new **Risky workload identi
4039

4140
- Workload Identities Premium licensing: You can view and acquire licenses on the [Workload Identities blade](https://portal.azure.com/#view/Microsoft_Azure_ManagedServiceIdentity/WorkloadIdentitiesBlade) in the Azure portal.
4241
- One of the following administrator roles assigned
43-
- Global Administrator
4442
- Security Administrator
4543
- Security Operator
4644
- Security Reader Users assigned the Conditional Access administrator role can create policies that use risk as a condition.
45+
- Global Administrator
4746

4847
## Workload identity risk detections
4948

@@ -63,7 +62,7 @@ We detect risk on workload identities across sign-in behavior and offline indica
6362

6463
Organizations can find workload identities that have been flagged for risk in one of two locations:
6564

66-
1. Sign in to the [Azure portal](https://portal.azure.com).
65+
1. Sign in to the [Azure portal](https://portal.azure.com) as at least a [Security Reader](../roles/permissions-reference.md#security-reader).
6766
1. Browse to **Azure Active Directory** > **Security** > **Risky workload identities**.
6867
1. Or browse to **Azure Active Directory** > **Security** > **Risk detections**.
6968
1. Select the **Workload identity detections** tab.'
@@ -89,7 +88,7 @@ For improved security and resilience of your workload identities, Continuous Acc
8988

9089
## Investigate risky workload identities
9190

92-
Identity Protection provides organizations with two reports they can use to investigate workload identity risk. These reports are the risky workload identities, and risk detections for workload identities. All reports allow for downloading of events in .CSV format for further analysis outside of the Azure portal.
91+
Identity Protection provides organizations with two reports they can use to investigate workload identity risk. These reports are the risky workload identities, and risk detections for workload identities. All reports allow for downloading of events in .CSV format for further analysis.
9392

9493
Some of the key questions to answer during your investigation include:
9594

@@ -102,7 +101,7 @@ The [Azure Active Directory security operations guide for Applications](../archi
102101

103102
Once you determine if the workload identity was compromised, dismiss the account’s risk, or confirm the account as compromised in the Risky workload identities report. You can also select “Disable service principal” if you want to block the account from further sign-ins.
104103

105-
:::image type="content" source="media/concept-workload-identity-risk/confirm-compromise-or-dismiss-risk.png" alt-text="Confirm workload identity compromise or dismiss the risk in the Azure portal." lightbox="media/concept-workload-identity-risk/confirm-compromise-or-dismiss-risk.png":::
104+
:::image type="content" source="media/concept-workload-identity-risk/confirm-compromise-or-dismiss-risk.png" alt-text="Confirm workload identity compromise or dismiss the risk." lightbox="media/concept-workload-identity-risk/confirm-compromise-or-dismiss-risk.png":::
106105

107106
## Remediate risky workload identities
108107

articles/active-directory/identity-protection/howto-identity-protection-configure-mfa-policy.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,7 @@ For more information on Azure AD multifactor authentication, see [What is Azure
3434

3535
[!INCLUDE [portal updates](~/articles/active-directory/includes/portal-update.md)]
3636

37-
1. Sign in to the [Azure portal](https://portal.azure.com).
37+
1. Sign in to the [Azure portal](https://portal.azure.com) as at least a [Security Administrator](../roles/permissions-reference.md#security-administrator)
3838
1. Browse to **Azure Active Directory** > **Security** > **Identity Protection** > **MFA registration policy**.
3939
1. Under **Assignments** > **Users**
4040
1. Under **Include**, select **All users** or **Select individuals and groups** if limiting your rollout.

articles/active-directory/identity-protection/howto-identity-protection-configure-risk-policies.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -64,7 +64,7 @@ Before organizations enable remediation policies, they may want to [investigate]
6464

6565
### User risk policy in Conditional Access
6666

67-
1. Sign in to the **Azure portal** as a Conditional Access Administrator, Security Administrator, or Global Administrator.
67+
1. Sign in to the [Azure portal](https://portal.azure.com) as at least a [Conditional Access Administrator](../roles/permissions-reference.md#conditional-access-administrator).
6868
1. Browse to **Azure Active Directory** > **Security** > **Conditional Access**.
6969
1. Select **New policy**.
7070
1. Give your policy a name. We recommend that organizations create a meaningful standard for the names of their policies.
@@ -90,7 +90,7 @@ After confirming your settings using [report-only mode](../conditional-access/ho
9090

9191
### Sign-in risk policy in Conditional Access
9292

93-
1. Sign in to the **Azure portal** as a Conditional Access Administrator, Security Administrator, or Global Administrator.
93+
1. Sign in to the [Azure portal](https://portal.azure.com) as at least a [Conditional Access Administrator](../roles/permissions-reference.md#conditional-access-administrator).
9494
1. Browse to **Azure Active Directory** > **Security** > **Conditional Access**.
9595
1. Select **New policy**.
9696
1. Give your policy a name. We recommend that organizations create a meaningful standard for the names of their policies.

articles/active-directory/identity-protection/howto-identity-protection-remediate-unblock.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -66,7 +66,7 @@ Administrators are given two options when resetting a password for their users:
6666

6767
If after investigation and confirming that the user account isn't at risk of being compromised, then you can choose to dismiss the risky user.
6868

69-
To **Dismiss user risk**, search for and select **Azure AD Risky users** in the Azure portal or the Entra portal, select the affected user, and select **Dismiss user(s) risk**.
69+
To **Dismiss user risk**, search for and select **Azure AD Risky users** in the Azure portal or the Microsoft Entra admin center, select the affected user, and select **Dismiss user(s) risk**.
7070

7171
When you select **Dismiss user risk**, the user is no longer at risk, and all the risky sign-ins of this user and corresponding risk detections are dismissed as well.
7272

articles/active-directory/identity-protection/howto-identity-protection-simulate-risk.md

Lines changed: 16 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -75,10 +75,10 @@ Simulating the atypical travel condition is difficult because the algorithm uses
7575
**To simulate an atypical travel risk detection, perform the following steps**:
7676

7777
1. Using your standard browser, navigate to [https://myapps.microsoft.com](https://myapps.microsoft.com).
78-
2. Enter the credentials of the account you want to generate an atypical travel risk detection for.
79-
3. Change your user agent. You can change user agent in Microsoft Edge from Developer Tools (F12).
80-
4. Change your IP address. You can change your IP address by using a VPN, a Tor add-on, or creating a new virtual machine in Azure in a different data center.
81-
5. Sign-in to [https://myapps.microsoft.com](https://myapps.microsoft.com) using the same credentials as before and within a few minutes after the previous sign-in.
78+
1. Enter the credentials of the account you want to generate an atypical travel risk detection for.
79+
1. Change your user agent. You can change user agent in Microsoft Edge from Developer Tools (F12).
80+
1. Change your IP address. You can change your IP address by using a VPN, a Tor add-on, or creating a new virtual machine in Azure in a different data center.
81+
1. Sign-in to [https://myapps.microsoft.com](https://myapps.microsoft.com) using the same credentials as before and within a few minutes after the previous sign-in.
8282

8383
The sign-in shows up in the Identity Protection dashboard within 2-4 hours.
8484

@@ -88,25 +88,26 @@ The sign-in shows up in the Identity Protection dashboard within 2-4 hours.
8888

8989
This risk detection indicates that the application's valid credentials have been leaked. This leak can occur when someone checks in the credentials in a public code artifact on GitHub. Therefore, to simulate this detection, you need a GitHub account and can [sign up a GitHub account](https://docs.github.com/get-started/signing-up-for-github) if you don't have one already.
9090

91-
**To simulate Leaked Credentials in GitHub for Workload Identities, perform the following steps**:
92-
1. Sign in to the [Azure portal](https://portal.azure.com).
93-
2. Browse to **Azure Active Directory** > **App registrations**.
94-
3. Select **New registration** to register a new application or reuse an existing stale application.
95-
4. Select **Certificates & Secrets** > **New client Secret** , add a description of your client secret and set an expiration for the secret or specify a custom lifetime and select **Add**. Record the secret's value for later use for your GitHub Commit.
91+
### Simulate Leaked Credentials in GitHub for Workload Identities
92+
93+
1. Sign in to the [Azure portal](https://portal.azure.com) as at least a [Security Administrator](../roles/permissions-reference.md#security-administrator).
94+
1. Browse to **Azure Active Directory** > **App registrations**.
95+
1. Select **New registration** to register a new application or reuse an existing stale application.
96+
1. Select **Certificates & Secrets** > **New client Secret** , add a description of your client secret and set an expiration for the secret or specify a custom lifetime and select **Add**. Record the secret's value for later use for your GitHub Commit.
9697

9798
> [!Note]
9899
> **You can not retrieve the secret again after you leave this page**.
99100
100-
5. Get the TenantID and Application(Client)ID in the **Overview** page.
101-
6. Ensure you disable the application via **Azure Active Directory** > **Enterprise Application** > **Properties** > Set **Enabled for users to sign-in** to **No**.
102-
7. Create a **public** GitHub Repository, add the following config and commit the change as a file with the .txt extension.
101+
1. Get the TenantID and Application(Client)ID in the **Overview** page.
102+
1. Ensure you disable the application via **Azure Active Directory** > **Enterprise Application** > **Properties** > Set **Enabled for users to sign-in** to **No**.
103+
1. Create a **public** GitHub Repository, add the following config and commit the change as a file with the .txt extension.
103104
```GitHub file
104105
"AadClientId": "XXXX-2dd4-4645-98c2-960cf76a4357",
105106
"AadSecret": "p3n7Q~XXXX",
106107
"AadTenantDomain": "XXXX.onmicrosoft.com",
107108
"AadTenantId": "99d4947b-XXX-XXXX-9ace-abceab54bcd4",
108109
```
109-
7. In about 8 hours, you'll be able to view a leaked credential detection under **Azure Active Directory** > **Security** > **Risk Detection** > **Workload identity detections** where the additional info will contain the URL of your GitHub commit.
110+
1. In about 8 hours, you'll be able to view a leaked credential detection under **Azure Active Directory** > **Security** > **Risk Detection** > **Workload identity detections** where the additional info will contain the URL of your GitHub commit.
110111

111112
## Testing risk policies
112113

@@ -116,7 +117,7 @@ This section provides you with steps for testing the user and the sign-in risk p
116117

117118
To test a user risk security policy, perform the following steps:
118119

119-
1. Sign in to the [Azure portal](https://portal.azure.com).
120+
1. Sign in to the [Azure portal](https://portal.azure.com) as at least a [Security Administrator](../roles/permissions-reference.md#security-administrator).
120121
1. Browse to **Azure Active Directory** > **Security** > **Identity Protection** > **Overview**.
121122
1. Select **Configure user risk policy**.
122123
1. Under **Assignments**
@@ -136,7 +137,7 @@ To test a user risk security policy, perform the following steps:
136137

137138
To test a sign-in risk policy, perform the following steps:
138139

139-
1. Sign in to the [Azure portal](https://portal.azure.com).
140+
1. Sign in to the [Azure portal](https://portal.azure.com) as at least a [Security Administrator](../roles/permissions-reference.md#security-administrator).
140141
1. Browse to **Azure Active Directory** > **Security** > **Identity Protection** > **Overview**.
141142
1. Select **Configure sign-in risk policy**.
142143
1. Under **Assignments**

0 commit comments

Comments
 (0)