Cloud Build

Microsoft Azure, 365 and all things Tech

Skip to content
  • About Me
  • Terms
  • Privacy
  • Contact Me

how to enable alerts for high risk logins in azure

Configure user and sign-in risk policies in Azure AD Identity Protection

Posted on March 6, 2021 by Imran Rashid
Reading Time: 5 minutes

In this blog post I will go through the process of enabling a user sign-in and user risk policy within Azure Identity Protection located within the Azure Portal.

Risk detections in Azure AD Identity Protection include any identified suspicious actions related to user accounts in the directory.

User risk policy
With the user risk policy turned on, Azure Active Directory detects the probability that a user account has been compromised. As an administrator, you can configure a user risk conditional access policy to automatically respond to a specific user risk level. For example, you can block access to your resources or require a password change to get a user account back into a clean state.

Identity Protection categorises risk into three tiers: low, medium, and high. While Microsoft does not provide specific details about how risk is calculated, Microsoft say that each level brings higher confidence that the user or sign-in is compromised. For example, something like one instance of unfamiliar sign-in properties for a user might not be as threatening as leaked credentials for another user.

User sign-in policy
Turning on the sign-in risk policy ensures that suspicious sign-ins are challenged for multi-factor authentication (MFA). Note that if MFA is not enabled for the user, access will be blocked.

Note: to make use of these features every user that benefits or is affected from a feature exclusive to the Azure AD P2 offerings needs a Azure AD P2 licence or a licence including Azure AD P2, for example 365 E5 – Source: Microsoft

  1. Login to your Azure Portal (portal.azure.com
  2. Search and click Azure AD Identity Protection

3. Below is a screenshot displaying both user risk policy and sign-in risk policies We’ll start with user risk policy

4. Click user risk policy and below are the parameters available

5. Click all users and below I can apply this policy to all users or target individuals or groups.

I can also exclude users or groups as shown in the screenshot below

Note: exclusions over ride inclusions, so if a user is in two groups, one excluded and the other included, the excluded will policy will take priority.

For the purpose of this demo, I will be leaving the default of all users

6. Next, move onto user risk which assesses the likelihood that the user account is compromised.

7. The below risks (High, Medium and above, low and above) are based on a Microsoft Algorithm. While Microsoft does not provide specific details about how risk is calculated, they say that each level brings higher confidence that the user or sign-in is compromised. For example, something like one instance of unfamiliar sign-in properties for a user might not be as threatening as leaked credentials for another user. For common questions, visit the following Microsoft article – Common Questions

I’ll be setting the user risk as High so I’m going to be looking for something that has been flagged as a high risk which means there is an account which has highly likely been compromised. Click Done

8. Next, I move onto Access located under Controls

9. Here is where we configure the action if the condition is met. For the purpose of this demo, I will click Allow access but will force the user to change the password. You could also block the user when a high risk is identified. Click done

10. Select On and click save

11. That’s the user risk policy set

Let’s move onto Sign-in Risk Policy

  1. Click Sign-in risk policy

2. I’ll be leaving the default setting to apply the policy to all users

3. Next I click on Sign-in risk which is based on the likelihood that the sign-in is coming from someone else other than the user.

4. I set this to high and click done

5. Click access located under Controls

6. I click allow but the user will be forced to perform multi-factor authentication, click done

Note: If multi-factor is not configured for the user, the user will be blocked

7. Finally, I turn on the policy and click save

That’s both policies configured

To view risk alerts, click the options located under Report in the menu located towards the left.

Further down the menu, we have notify on users at risk detected alerts and weekly digest. Users in the Global administrator, Security administrator, or Security reader roles are automatically added to this list if that user has a valid email or alternate email configured. Microsoft attempt to send emails to the first 20 members of each role. If a user is enrolled in PIM to elevate to one of these roles on demand then they will only receive emails if they are elevated at the time the email is sent.

By default admins are alerted based on high risk alerts as shown below

Posted in Azure
Tagged how many licences are require to use Azure AD Identity Protection how to configure risk policy in azure how to configure signin policies in azure how to enable alerts for high risk logins in azure
Leave a comment

Follow Me

  • LinkedIn
  • Bluesky
  • X
  • Meetup
  • GitHub
  • RSS Feed

Search

Subscribe

Keep up to date on the latest articles. We will never spam you or forward your details to third parties.

Name

Email


Recent Posts

  • Microsoft 365 Copilot Chat and Microsoft 365 Copilot Explained
  • Obtain Free Let’s Encrypt Certificates and Store Them in Azure Key Vault: A Step by Step Guide
  • Azure Traffic Manager 404 Web Site not found
  • Be Part of HISTORY – Earn Your Free AI Skills Badge Today!
  • Part 3 – Microsoft Purview Roles and Scopes
  • How to access Azure Cloud Shell locally
  • Microsoft Purview Portal – Part 2
  • Introduction to Microsoft Purview – Part 1
  • Microsoft announces FREE GitHub Copilot for VS Code
  • User Guide: How to register passkeys in Microsoft Authenticator and physical passkeys
  • The Evilginx Threat: Protecting Your Credentials with Phishing Resistant MFA
  • Part 1 – What is a FIDO2 key and How to Set One Up for Emergency Access in Entra ID
  • Part 2 – Configure a YubiKey For An Emergency Access Account In Entra ID
  • From Nerves to Confidence: My Transformation Journey
  • Part 4 – Free Version of Microsoft Copilot
  • Part 3 – How to write Microsoft Copilot Prompts
  • Part 2 – Microsoft 365 Copilot under the hood
  • Part 1 – Save time and be more productive at work with Microsoft 365 Copilot
  • Build your own copilot with Microsoft Copilot Studio
  • Integrate Defender for Endpoint with Defender for Cloud Apps
Azure community hero
Azure learner
Cloud champion
Top azure blogs

Certifications

  • azure-solutions-architect-expert-600×600
  • azure-security-engineer-associate600x600
  • azure-administrator-associate
  • NCDA-7-Mode_352x352
  • Designing+and+Deploying+Microsoft+Exchange+Server+2016-01
  • Microsoft_Exam533
  • Microsoft_Exam534
  • MCSA-Cloud-Platform-2018
  • azure-solutions-architect-expert-600×600
  • CERT-Associate-Microsoft365-Teams-Administrator
  • MS-100-exam
  • exam-ms100_1-600×600
  • microsoft365-enterprise-adminstrator-expert-600×600
  • microsoft365-messaging-administrator-associate-600×600
  • SCI_Challange_Complete_OpenHack_600X600
  • Microsoft Certified Trainer
  • MCT-2023-2024
  • azure-network-engineer-associate-600×600
  • sc-300
  • az-900
  • SC-900
  • AI-900
  • Microsoftaiskillsfestgwrattemptbadge[full]
Azure crazy logo
Bradcuglogo

RSS Feed

  • Twitter
  • linkedin

Cloud Build

© All rights reserved.

Powered by WordPress

Subscribe to new posts

Name

Email


Recent Posts

  • Microsoft 365 Copilot Chat and Microsoft 365 Copilot Explained
  • Obtain Free Let’s Encrypt Certificates and Store Them in Azure Key Vault: A Step by Step Guide
  • Azure Traffic Manager 404 Web Site not found

Archives

  • About Me
  • Contact Me
  • Privacy
  • Terms

Subscribe

Subscribe to new tech posts.
We will never send you spam email or forward your details to third parties.


Name

Email


This will close in 0 seconds

error: Content is protected !!