Skip to content

Commit f1ca1bb

Browse files
authored
Merge pull request #177648 from MicrosoftGuyJFlo/GitHubIssue80730
[Azure AD] Identity Protection - GitHub Issue 80730
2 parents ebeac1e + d45afe3 commit f1ca1bb

File tree

1 file changed

+4
-2
lines changed

1 file changed

+4
-2
lines changed

articles/active-directory/identity-protection/howto-identity-protection-configure-risk-policies.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: identity-protection
88
ms.topic: how-to
9-
ms.date: 05/27/2021
9+
ms.date: 10/26/2021
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -38,7 +38,7 @@ Configured trusted [network locations](../conditional-access/location-condition.
3838

3939
### Risk remediation
4040

41-
Organizations can choose to block access when risk is detected. Blocking sometimes stops legitimate users from doing what they need to. A better solution is to allow self-remediation using Azure AD Multi-Factor Authentication (MFA) and self-service password reset (SSPR).
41+
Organizations can choose to block access when risk is detected. Blocking sometimes stops legitimate users from doing what they need to. A better solution is to allow self-remediation using Azure AD Multi-Factor Authentication (MFA) and self-service password reset (SSPR).
4242

4343
- When a user risk policy triggers:
4444
- Administrators can require a secure password reset, requiring Azure AD MFA be done before the user creates a new password with SSPR, resetting the user risk.
@@ -65,6 +65,8 @@ There are two locations where these policies may be configured, Conditional Acce
6565

6666
> [!VIDEO https://www.youtube.com/embed/zEsbbik-BTE]
6767
68+
Before enabling remediation policies, organizations may want to [investigate](howto-identity-protection-investigate-risk.md) and [remediate](howto-identity-protection-remediate-unblock.md) any active risks.
69+
6870
### User risk with Conditional Access
6971

7072
1. Sign in to the **Azure portal** as a global administrator, security administrator, or Conditional Access administrator.

0 commit comments

Comments
 (0)