Skip to content

Commit da73902

Browse files
Merge pull request #239651 from Justinha/susp-preview
Susp preview
2 parents 6ecedf5 + 9b8deb7 commit da73902

File tree

1 file changed

+6
-6
lines changed

1 file changed

+6
-6
lines changed

articles/active-directory/authentication/howto-mfa-mfasettings.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: multi-factor-authentication
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: how-to
9-
ms.date: 05/17/2023
9+
ms.date: 05/30/2023
1010

1111
ms.author: justinha
1212
author: justinha
@@ -78,14 +78,14 @@ To unblock a user, complete the following steps:
7878

7979
## Report suspicious activity
8080

81-
A preview of **Report Suspicious Activity**, the updated MFA **Fraud Alert** feature, is now available. When an unknown and suspicious MFA prompt is received, users can report the fraud attempt by using Microsoft Authenticator or through their phone. These alerts are integrated with [Identity Protection](../identity-protection/overview-identity-protection.md) for more comprehensive coverage and capability.
81+
**Report suspicious activity**, the updated **MFA Fraud Alert** feature, is now available. When an unknown and suspicious MFA prompt is received, users can report the fraud attempt by using Microsoft Authenticator or through their phone. These alerts are integrated with [Identity Protection](../identity-protection/overview-identity-protection.md) for more comprehensive coverage and capability.
8282

8383
Users who report an MFA prompt as suspicious are set to **High User Risk**. Administrators can use risk-based policies to limit access for these users, or enable self-service password reset (SSPR) for users to remediate problems on their own. If you previously used the **Fraud Alert** automatic blocking feature and don't have an Azure AD P2 license for risk-based policies, you can use risk detection events to identify and disable impacted users and automatically prevent their sign-in. For more information about using risk-based policies, see [Risk-based access policies](../identity-protection/concept-identity-protection-policies.md).
8484

85-
To enable **Report Suspicious Activity** from the Authentication Methods Settings:
85+
To enable **Report suspicious activity** from the Authentication Methods Settings:
8686

8787
1. In the Azure portal, click **Azure Active Directory** > **Security** > **Authentication Methods** > **Settings**.
88-
1. Set **Report Suspicious Activity** to **Enabled**.
88+
1. Set **Report suspicious activity** to **Enabled**.
8989
1. Select **All users** or a specific group.
9090

9191
### View suspicious activity events
@@ -104,9 +104,9 @@ Once a user has reported a prompt as suspicious, the risk should be investigated
104104

105105
### Report suspicious activity and fraud alert
106106

107-
**Report Suspicious Activity** and the legacy **Fraud Alert** implementation can operate in parallel. You can keep your tenant-wide **Fraud Alert** functionality in place while you start to use **Report Suspicious Activity** with a targeted test group.
107+
**Report suspicious activity** and the legacy **Fraud Alert** implementation can operate in parallel. You can keep your tenant-wide **Fraud Alert** functionality in place while you start to use **Report suspicious activity** with a targeted test group.
108108

109-
If **Fraud Alert** is enabled with Automatic Blocking, and **Report Suspicious Activity** is enabled, the user will be added to the blocklist and set as high-risk and in-scope for any other policies configured. These users will need to be removed from the blocklist and have their risk remediated to enable them to sign in with MFA.
109+
If **Fraud Alert** is enabled with Automatic Blocking, and **Report suspicious activity** is enabled, the user will be added to the blocklist and set as high-risk and in-scope for any other policies configured. These users will need to be removed from the blocklist and have their risk remediated to enable them to sign in with MFA.
110110

111111
## Notifications
112112

0 commit comments

Comments
 (0)