Skip to content

Commit fd73a9e

Browse files
authored
Merge pull request #199963 from MicrosoftGuyJFlo/GitHubIssue93287
[Azure AD] Identity Protection - Git Hub Issue 93287
2 parents 3f838fd + 711a11f commit fd73a9e

File tree

1 file changed

+20
-24
lines changed

1 file changed

+20
-24
lines changed

articles/active-directory/identity-protection/overview-identity-protection.md

Lines changed: 20 additions & 24 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: identity-protection
88
ms.topic: overview
9-
ms.date: 06/15/2021
9+
ms.date: 05/31/2022
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -31,16 +31,12 @@ The signals generated by and fed to Identity Protection, can be further fed into
3131

3232
## Why is automation important?
3333

34-
In his [blog post in October of 2018](https://techcommunity.microsoft.com/t5/Azure-Active-Directory-Identity/Eight-essentials-for-hybrid-identity-3-Securing-your-identity/ba-p/275843) Alex Weinert, who leads Microsoft's Identity Security and Protection team, explains why automation is so important when dealing with the volume of events:
34+
In the blog post *[Cyber Signals: Defending against cyber threats with the latest research, insights, and trends](https://www.microsoft.com/security/blog/2022/02/03/cyber-signals-defending-against-cyber-threats-with-the-latest-research-insights-and-trends/)* dated February 3, 2022 we shared a thread intelligence brief including the following statistics:
3535

36-
> Each day, our machine learning and heuristic systems provide risk scores for 18 billion login attempts for over 800 million distinct accounts, 300 million of which are discernibly done by adversaries (entities like: criminal actors, hackers).
37-
>
38-
> At Ignite last year, I spoke about the top 3 attacks on our identity systems. Here is the recent volume of these attacks
39-
>
40-
> - **Breach replay**: 4.6BN attacks detected in May 2018
41-
> - **Password spray**: 350k in April 2018
42-
> - **Phishing**: This is hard to quantify exactly, but we saw 23M risk events in March 2018, many of which are phish related
36+
> * Analyzed ...24 trillion security signals combined with intelligence we track by monitoring more than 40 nation-state groups and over 140 threat groups...
37+
> * ...From January 2021 through December 2021, we’ve blocked more than 25.6 billion Azure AD brute force authentication attacks...
4338
39+
This scale of signals and attacks requires some level of automation to be able to keep up.
4440
## Risk detection and remediation
4541

4642
Identity Protection identifies risks of many types, including:
@@ -53,7 +49,7 @@ Identity Protection identifies risks of many types, including:
5349
- Password spray
5450
- and more...
5551

56-
More detail on these and other risks including how or when they are calculated can be found in the article, [What is risk](concept-identity-protection-risks.md).
52+
More detail on these and other risks including how or when they're calculated can be found in the article, [What is risk](concept-identity-protection-risks.md).
5753

5854
The risk signals can trigger remediation efforts such as requiring users to: perform Azure AD Multi-Factor Authentication, reset their password using self-service password reset, or blocking until an administrator takes action.
5955

@@ -69,17 +65,17 @@ More information can be found in the article, [How To: Investigate risk](howto-i
6965

7066
### Risk levels
7167

72-
Identity Protection categorizes risk into three tiers: low, medium, and high.
68+
Identity Protection categorizes risk into tiers: low, medium, and high.
7369

74-
While Microsoft does not provide specific details about how risk is calculated, we will say that each level brings higher confidence that the user or sign-in is compromised. For example, something like one instance of unfamiliar sign-in properties for a user might not be as threatening as leaked credentials for another user.
70+
While Microsoft doesn't provide specific details about how risk is calculated, we'll say that each level brings higher confidence that the user or sign-in is compromised. For example, something like one instance of unfamiliar sign-in properties for a user might not be as threatening as leaked credentials for another user.
7571

7672
## Exporting risk data
7773

7874
Data from Identity Protection can be exported to other tools for archive and further investigation and correlation. The Microsoft Graph based APIs allow organizations to collect this data for further processing in a tool such as their SIEM. Information about how to access the Identity Protection API can be found in the article, [Get started with Azure Active Directory Identity Protection and Microsoft Graph](howto-identity-protection-graph-api.md)
7975

8076
Information about integrating Identity Protection information with Microsoft Sentinel can be found in the article, [Connect data from Azure AD Identity Protection](../../sentinel/data-connectors-reference.md#azure-active-directory-identity-protection).
8177

82-
Additionally, organizations can choose to store data for longer periods by changing diagnostic settings in Azure AD to send RiskyUsers and UserRiskEvents data to a Log Analytics workspace, archive data to a storage account, stream data to an Event Hub, or send data to a partner solution. Detailed information about how to do so can be found in the article, [How To: Export risk data](howto-export-risk-data.md).
78+
Additionally, organizations can choose to store data for longer periods by changing diagnostic settings in Azure AD to send RiskyUsers and UserRiskEvents data to a Log Analytics workspace, archive data to a storage account, stream data to Event Hubs, or send data to a partner solution. Detailed information about how to do so can be found in the article, [How To: Export risk data](howto-export-risk-data.md).
8379

8480
## Permissions
8581

@@ -92,25 +88,25 @@ Identity Protection requires users be a Security Reader, Security Operator, Secu
9288
| Security operator | View all Identity Protection reports and Overview blade <br><br> Dismiss user risk, confirm safe sign-in, confirm compromise | Configure or change policies <br><br> Reset password for a user <br><br> Configure alerts |
9389
| Security reader | View all Identity Protection reports and Overview blade | Configure or change policies <br><br> Reset password for a user <br><br> Configure alerts <br><br> Give feedback on detections |
9490

95-
Currently, the security operator role cannot access the Risky sign-ins report.
91+
Currently, the security operator role can't access the Risky sign-ins report.
9692

9793
Conditional Access administrators can also create policies that factor in sign-in risk as a condition. Find more information in the article [Conditional Access: Conditions](../conditional-access/concept-conditional-access-conditions.md#sign-in-risk).
9894

9995
## License requirements
10096

10197
[!INCLUDE [Active Directory P2 license](../../../includes/active-directory-p2-license.md)]
10298

103-
| Capability | Details | Azure AD Free / Microsoft 365 Apps | Azure AD Premium P1|Azure AD Premium P2 |
99+
| Capability | Details | Azure AD Free / Microsoft 365 Apps | Azure AD Premium P1 | Azure AD Premium P2 |
104100
| --- | --- | --- | --- | --- |
105-
| Risk policies | User risk policy (via Identity Protection) | No | No |Yes |
106-
| Risk policies | Sign-in risk policy (via Identity Protection or Conditional Access) | No | No |Yes |
107-
| Security reports | Overview | No | No |Yes |
108-
| Security reports | Risky users | Limited Information. Only users with medium and high risk are shown. No details drawer or risk history. | Limited Information. Only users with medium and high risk are shown. No details drawer or risk history. | Full access|
109-
| Security reports | Risky sign-ins | Limited Information. No risk detail or risk level is shown. | Limited Information. No risk detail or risk level is shown. | Full access|
110-
| Security reports | Risk detections | No | Limited Information. No details drawer.| Full access|
111-
| Notifications | Users at risk detected alerts | No | No |Yes |
112-
| Notifications | Weekly digest| No | No | Yes |
113-
| | MFA registration policy | No | No | Yes |
101+
| Risk policies | User risk policy (via Identity Protection) | No | No | Yes |
102+
| Risk policies | Sign-in risk policy (via Identity Protection or Conditional Access) | No | No | Yes |
103+
| Security reports | Overview | No | No | Yes |
104+
| Security reports | Risky users | Limited Information. Only users with medium and high risk are shown. No details drawer or risk history. | Limited Information. Only users with medium and high risk are shown. No details drawer or risk history. | Full access|
105+
| Security reports | Risky sign-ins | Limited Information. No risk detail or risk level is shown. | Limited Information. No risk detail or risk level is shown. | Full access |
106+
| Security reports | Risk detections | No | Limited Information. No details drawer.| Full access |
107+
| Notifications | Users at risk detected alerts | No | No | Yes |
108+
| Notifications | Weekly digest | No | No | Yes |
109+
| MFA registration policy | | No | No | Yes |
114110

115111
More information on these rich reports can be found in the article, [How To: Investigate risk](howto-identity-protection-investigate-risk.md#navigating-the-reports).
116112

0 commit comments

Comments
 (0)