Skip to content

Commit ce86da8

Browse files
committed
[AzureAD] Add test and next steps sections
1 parent af284c2 commit ce86da8

File tree

2 files changed

+20
-2
lines changed

2 files changed

+20
-2
lines changed

articles/active-directory/authentication/TOC.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@
1515
href: tutorial-enable-sspr-writeback.md
1616
- name: Configure custom banned password lists
1717
href: tutorial-configure-custom-password-protection.md
18-
- name: Integrate Azure Identity Protection
18+
- name: Enable risk-based sign-in protection
1919
href: tutorial-risk-based-sspr-mfa.md
2020
- name: Concepts
2121
expanded: true

articles/active-directory/authentication/tutorial-risk-based-sspr-mfa.md

Lines changed: 19 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -61,7 +61,7 @@ The following three policies are available in Azure AD Identity Protection to pr
6161
* MFA registration policy
6262
* Makes sure users are registered for Azure Multi-Factor Authentication. If a sign-in risk policy prompts for MFA, the user must already be registered for Azure Multi-Factor Authentication.
6363

64-
When you enable a policy, you can also choose the threshold for risk level - low and above, medium and above, or high. This flexibility lets you decide how aggressive you want to be in enforcing any controls for suspicious sign-in events.
64+
When you enable a policy user or sign in risk policy, you can also choose the threshold for risk level - low and above, medium and above, or high. This flexibility lets you decide how aggressive you want to be in enforcing any controls for suspicious sign-in events.
6565

6666
For more information about Azure AD Identity Protection, see [What is Azure AD Identity Protection](../identity-protection/overview-identity-protection.md)
6767

@@ -110,8 +110,26 @@ To enable this policy, complete the following steps:
110110

111111
![Screenshot of how to enable the sign-in risk policy in the Azure portal](./media/tutorial-risk-based-sspr-mfa/enable-sign-in-risk-policy.png)
112112

113+
## Test risky sign events
114+
115+
Most user sign-in events won't trigger the risk-based policies configured in the previous steps. A user may never see a prompt for additional MFA or to reset their password. If their credentials remain secure and their behavior consistent, their sign-in events would be successful.
116+
117+
To test the Azure AD Identity Protection policies created in the previous steps, you need a way to simulate risky behavior or potential attacks. The steps to do these tests vary based on the Azure AD Identity Protection policy you want to validate. For more information on scenarios and steps, see [Simulate risk detections in Azure AD Identity Protection](../identity-protection/howto-identity-protection-simulate-risk.md).
118+
113119
## Clean up resources
114120

115121
If you have completed tests and no longer want to have the risk-based policies enabled, return to each policy you want to disable and set *Enforce Policy* to **Off**.
116122

117123
## Next steps
124+
125+
In this tutorial, you enabled risk-based user policies for Azure AD Identity Protection. You learned how to:
126+
127+
> [!div class="checklist"]
128+
> * Understand the available policies for Azure AD Identity Protection
129+
> * Enable Azure Multi-Factor Authentication registration
130+
> * Enable risk-based password changes
131+
> * Enable risk-based Multi-Factor Authentication
132+
> * Test risk-based policies for user sign-in attempts
133+
134+
> [!div class="nextstepaction"]
135+
> [Learn more about Azure AD Identity Protection](../identity-protection/overview-identity-protection.md

0 commit comments

Comments
 (0)