Skip to content

Commit eb074e6

Browse files
authored
Merge pull request #46842 from MarkusVi/quickfix04
quickfix04
2 parents 0094d54 + 059837a commit eb074e6

File tree

1 file changed

+3
-2
lines changed

1 file changed

+3
-2
lines changed

articles/active-directory/active-directory-conditional-access-app-sign-in-risk.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.devlang: na
1414
ms.topic: article
1515
ms.tgt_pltfrm: na
1616
ms.workload: identity
17-
ms.date: 07/16/2018
17+
ms.date: 07/17/2018
1818
ms.author: markvi
1919
ms.reviewer: calebb
2020
#Customer intent: As an IT admin, I want to configure a policy to handle suspicious sign-ins, so that they can be automatically handled.
@@ -59,14 +59,15 @@ The goal of this step is to make sure that your test account can access your ten
5959

6060
## Create your conditional access policy
6161

62-
The scenario in this quickstart uses a sign-in from a Tor Browser to generate a detected **Sign-ins from anonymous IP addresses** risk event. The risk level of this risk event is medium.
62+
The scenario in this quickstart uses a sign-in from a Tor Browser to generate a detected **Sign-ins from anonymous IP addresses** risk event. The risk level of this risk event is medium. To respond to this risk event, you set the sign-in risk condition to medium. In a production environment, you should set the sign-in risk condition either to high or to medium and high.
6363

6464
This section shows how to create the required conditional access policy. In your policy, set:
6565

6666
|Setting |Value|
6767
|--- | --- |
6868
| Users and groups | Alain Charon |
6969
| Cloud apps | All cloud apps |
70+
| Sign-in risk | Medium |
7071
| Grant | Block access |
7172

7273

0 commit comments

Comments
 (0)