Skip to content

Commit f409ba5

Browse files
Build Fixes
1 parent 02d01ca commit f409ba5

File tree

5 files changed

+17
-48
lines changed

5 files changed

+17
-48
lines changed

articles/active-directory/authentication/howto-mfa-getstarted.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -103,8 +103,8 @@ If your organization uses [Azure AD Identity Protection](../identity-protection/
103103
Risk policies include:
104104

105105
- [Require all users to register for Azure AD Multi-Factor Authentication](../identity-protection/howto-identity-protection-configure-mfa-policy.md)
106-
- [Require a password change for users that are high-risk](../identity-protection/howto-identity-protection-configure-risk-policies.md#user-risk-with-conditional-access)
107-
- [Require MFA for users with medium or high sign in risk](../identity-protection/howto-identity-protection-configure-risk-policies.md#sign-in-risk-with-conditional-access)
106+
- [Require a password change for users that are high-risk](../identity-protection/howto-identity-protection-configure-risk-policies.md#user-risk-policy-in-conditional-access)
107+
- [Require MFA for users with medium or high sign in risk](../identity-protection/howto-identity-protection-configure-risk-policies.md#sign-in-risk-policy-in-conditional-access)
108108

109109
### Convert users from per-user MFA to Conditional Access based MFA
110110

articles/active-directory/identity-protection/TOC.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@
1111
href: concept-identity-protection-security-overview.md
1212
- name: What are risks?
1313
href: concept-identity-protection-risks.md
14-
- name: Identity Protection policies
14+
- name: Risk-based access policies
1515
href: concept-identity-protection-policies.md
1616
- name: What is the sign-in experience?
1717
href: concept-identity-protection-user-experience.md

articles/active-directory/identity-protection/concept-identity-protection-risks.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ ms.date: 08/16/2022
1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
1313
manager: amycolannino
14-
ms.reviewer: sahandle, chuqiaoshi
14+
ms.reviewer: chuqiaoshi
1515

1616
ms.collection: M365-identity-device-management
1717
---
@@ -99,7 +99,7 @@ Premium detections are visible only to Azure AD Premium P2 customers. Customers
9999

100100
### Risk levels
101101

102-
Identity Protection categorizes risk into three tiers: low, medium, and high. When configuring [custom Identity protection policies](./concept-identity-protection-policies.md#custom-conditional-access-policy), you can also configure it to trigger upon **No risk** level. No Risk means there's no active indication that the user's identity has been compromised.
102+
Identity Protection categorizes risk into three tiers: low, medium, and high. When configuring [Identity protection policies](./concept-identity-protection-policies.md), you can also configure it to trigger upon **No risk** level. No Risk means there's no active indication that the user's identity has been compromised.
103103

104104
Microsoft doesn't provide specific details about how risk is calculated. Each level of risk brings higher confidence that the user or sign-in is compromised. For example, something like one instance of unfamiliar sign-in properties for a user might not be as threatening as leaked credentials for another user.
105105

articles/active-directory/identity-protection/howto-identity-protection-configure-risk-policies.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -86,7 +86,7 @@ Before organizations enable remediation policies, they may want to [investigate]
8686
1. Confirm your settings and set **Enable policy** to **Report-only**.
8787
1. Select **Create** to create to enable your policy.
8888

89-
After confirming your settings using [report-only mode](howto-conditional-access-insights-reporting.md), an administrator can move the **Enable policy** toggle from **Report-only** to **On**.
89+
After confirming your settings using [report-only mode](../conditional-access/howto-conditional-access-insights-reporting.md), an administrator can move the **Enable policy** toggle from **Report-only** to **On**.
9090

9191
### Sign-in risk policy in Conditional Access
9292

@@ -112,7 +112,7 @@ After confirming your settings using [report-only mode](howto-conditional-access
112112
1. Confirm your settings and set **Enable policy** to **Report-only**.
113113
1. Select **Create** to create to enable your policy.
114114

115-
After confirming your settings using [report-only mode](howto-conditional-access-insights-reporting.md), an administrator can move the **Enable policy** toggle from **Report-only** to **On**.
115+
After confirming your settings using [report-only mode](../conditional-access/howto-conditional-access-insights-reporting.md), an administrator can move the **Enable policy** toggle from **Report-only** to **On**.
116116

117117
## Migrate risk policies from Identity Protection to Conditional Access
118118

@@ -128,14 +128,14 @@ If you already have risk policies enabled in Identity Protection, we highly reco
128128
![Screenshots showing the migration of a user risk policy to Conditional Access](./media/howto-identity-protection-configure-risk-policies/user-risk-policy-migration-to-CA.png)
129129

130130
1. Create an equivalent risk policy in [Conditional Access in report-only mode](#enable-policies).
131-
1. Ensure that the new Conditional Access risk policy works as expected by testing it in [report-only mode](howto-conditional-access-insights-reporting.md).
131+
1. Ensure that the new Conditional Access risk policy works as expected by testing it in [report-only mode](../conditional-access/howto-conditional-access-insights-reporting.md).
132132
1. Enable the new Conditional Access risk policy. You can choose to have both policies running side-by-side to confirm the new policies are working as expected before turning off the Identity Protection risk policies.
133-
1. Browse back to **Azure Active Directory** > **Security** > **Conditional Access**.
134-
1. Select this new policy to edit it.
135-
1. Set **Enable policy** to **On** to enable the policy
133+
1. Browse back to **Azure Active Directory** > **Security** > **Conditional Access**.
134+
1. Select this new policy to edit it.
135+
1. Set **Enable policy** to **On** to enable the policy
136136
1. Disable the old risk policies in Identity Protection.
137-
1. Browse to **Azure Active Directory** > **Identity Protection** > Select the **User risk** or **Sign-in risk** policy.
138-
1. Set **Enforce policy** to **Off**
137+
1. Browse to **Azure Active Directory** > **Identity Protection** > Select the **User risk** or **Sign-in risk** policy.
138+
1. Set **Enforce policy** to **Off**
139139
1. Create other risk policies if needed in Conditional Access.
140140

141141
## Next steps

articles/active-directory/reports-monitoring/workbook-risk-analysis.md

Lines changed: 4 additions & 35 deletions
Original file line numberDiff line numberDiff line change
@@ -14,94 +14,63 @@ ms.workload: identity
1414
ms.subservice: report-monitor
1515
ms.date: 08/26/2022
1616
ms.author: markvi
17-
ms.reviewer: sahandle
17+
ms.reviewer: chuqiaoshi
1818

1919
ms.collection: M365-identity-device-management
2020
---
21-
2221
# Identity protection risk analysis workbook
2322

2423
Azure AD Identity Protection detects, remediates, and prevents compromised identities. As an IT administrator, you want to understand risk trends in your organizations and opportunities for better policy configuration. With the Identity Protection Risky Analysis Workbook, you can answer common questions about your Identity Protection implementation.
2524

2625
This article provides you with an overview of this workbook.
2726

28-
2927
## Description
3028

3129
![Workbook category](./media/workbook-risk-analysis/workbook-category.png)
3230

33-
34-
As an IT administrator, you need to understand trends in identity risks and gaps in your policy implementations to ensure you are best protecting your organizations from identity compromise. The identity protection risk analysis workbook helps you analyze the state of risk in your organization.
31+
As an IT administrator, you need to understand trends in identity risks and gaps in your policy implementations, to ensure you're best protecting your organizations from identity compromise. The identity protection risk analysis workbook helps you analyze the state of risk in your organization.
3532

3633
**This workbook:**
3734

3835
- Provides visualizations of where in the world risk is being detected.
39-
4036
- Allows you to understand the trends in real time vs. Offline risk detections.
41-
4237
- Provides insight into how effective you are at responding to risky users.
4338

44-
45-
46-
47-
4839
## Sections
4940

5041
This workbook has five sections:
5142

5243
- Heatmap of risk detections
53-
5444
- Offline vs real-time risk detections
55-
5645
- Risk detection trends
57-
5846
- Risky users
59-
6047
- Summary
6148

62-
63-
64-
65-
66-
67-
6849
## Filters
6950

70-
7151
This workbook supports setting a time range filter.
7252

73-
7453
![Set time range filter](./media/workbook-risk-analysis/time-range-filter.png)
7554

7655
There are more filters in the risk detection trends and risky users sections.
7756

7857
Risk Detection Trends:
7958

8059
- Detection timing type (real-time or offline)
81-
8260
- Risk level (low, medium, high, or none)
8361

8462
Risky Users:
8563

8664
- Risk detail (which indicates what changed a user’s risk level)
87-
8865
- Risk level (low, medium, high, or none)
8966

90-
9167
## Best practices
9268

69+
- **[Enable risky sign-in policies](../identity-protection/concept-identity-protection-policies.md#sign-in-risk-based-conditional-access-policy)** - To prompt for multi-factor authentication (MFA) on medium risk or above. Enabling the policy reduces the proportion of active real-time risk detections by allowing legitimate users to self-remediate the risk detections with MFA.
9370

94-
- **[Enable risky sign-in policies](../identity-protection/concept-identity-protection-policies.md)** - To prompt for multi-factor authentication (MFA) on medium risk or above. Enabling the policy reduces the proportion of active real-time risk detections by allowing legitimate users to self-remediate the risk detections with MFA.
95-
96-
- **[Enable a risky user policy](../identity-protection/howto-identity-protection-configure-risk-policies.md#user-risk-with-conditional-access)** - To enable users to securely remediate their accounts when they are high risk. Enabling the policy reduces the number of active at-risk users in your organization by returning the user’s credentials to a safe state.
97-
98-
99-
100-
71+
- **[Enable a risky user policy](../identity-protection/howto-identity-protection-configure-risk-policies.md#user-risk-policy-in-conditional-access)** - To enable users to securely remediate their accounts when they're high risk. Enabling the policy reduces the number of active at-risk users in your organization by returning the user’s credentials to a safe state.
10172

10273
## Next steps
10374

10475
- To learn more about identity protection, see [What is identity protection](../identity-protection/overview-identity-protection.md).
105-
10676
- For more information about Azure AD workbooks, see [How to use Azure AD workbooks](howto-use-azure-monitor-workbooks.md).
107-

0 commit comments

Comments
 (0)