Differences
This shows you the differences between two versions of the page.
| Both sides previous revision Previous revision Next revision | Previous revision | ||
| azure:az-500:manage_secure_access_by_using_azure_ad [2022/06/24 14:56] – [Access Reviews] mmuze | azure:az-500:manage_secure_access_by_using_azure_ad [2022/07/22 23:17] (current) – [§ Identity Protection] mmuze | ||
|---|---|---|---|
| Line 12: | Line 12: | ||
| * [[azure: | * [[azure: | ||
| - | ====== | + | ====== |
| + | * Identity Protection provides policies for a few common scenarios. | ||
| + | * These policies require an AAD P2 license | ||
| + | * [[https:// | ||
| + | * These are under '' | ||
| + | * **Azure AD MFA registration policy** - requires users to register for MFA | ||
| + | * **Sign-in risk policy** - a risk score is calculated to indicate the likelihood that a sign-in was not performed by the user. Based on this score administrators can choose to block access, allow access or allow access but require multi-factor authentication. | ||
| + | * **User risk policy** - a risk score is calculate to indicate the likelihood that a user account has been compromised. Based on this score administrators can choose to block access, allow access or allow access but require a password change. | ||
| + | |||
| + | * [[https:// | ||
| Identity Protection is a tool that allows organizations to accomplish three key tasks: | Identity Protection is a tool that allows organizations to accomplish three key tasks: | ||
| Line 33: | Line 42: | ||
| * Administrators can choose to block access, allow access, or allow access but require a password change using Azure AD self-service password reset | * Administrators can choose to block access, allow access, or allow access but require a password change using Azure AD self-service password reset | ||
| * [[https:// | * [[https:// | ||
| - | |||
| - | ===== Azure MFA Registration Policy ===== | ||
| - | * As a best practice it is recommended to require MFA and this policy does that. | ||
| ===== Sign-in Risk Policy ===== | ===== Sign-in Risk Policy ===== | ||
| * Sign-in risk represents the probability that a given authentication request isn't authorized by the identity owner. | * Sign-in risk represents the probability that a given authentication request isn't authorized by the identity owner. | ||
| * Identity Protection analyzes signals from each sign-in, both real-time and offline, and calculates a risk score based on the probability that the sign-in wasn't performed by the user. Administrators can decide based on this risk score signal to enforce organizational requirements. Administrators can choose to block access, allow access, or allow access but require multi-factor authentication. | * Identity Protection analyzes signals from each sign-in, both real-time and offline, and calculates a risk score based on the probability that the sign-in wasn't performed by the user. Administrators can decide based on this risk score signal to enforce organizational requirements. Administrators can choose to block access, allow access, or allow access but require multi-factor authentication. | ||
| + | * Sign-in risk is about a particular sign-in event, whereas user risk is about multiple factors, including anomalous sign-ins. | ||
| + | * [[https:// | ||
| + | |||
| + | ===== Azure MFA Registration Policy ===== | ||
| + | * As a best practice it is recommended to require MFA and this policy does that. | ||
| + | * MFA **Enabled** = The admin has enabled MFA on the account, but the user hasn't set it up. | ||
| + | * MFA **Enforced** = The user has completed the setup of their MFA. | ||
| + | * [[https:// | ||
| ===== Risk Events ===== | ===== Risk Events ===== | ||
| Line 55: | Line 69: | ||
| * // | * // | ||
| * Conditional Access requires a AAD P1 license, but the risk-based policy capabilties requires a P2 license | * Conditional Access requires a AAD P1 license, but the risk-based policy capabilties requires a P2 license | ||
| + | * When a user/group is both included and excluded in a policy the exclusion overrides the inclusion. | ||
| {{: | {{: | ||
| - | * When organizations both include and exclude a user or group the user or group is excluded from the policy, as an exclude action overrides an include in policy. | ||
| ====== Azure AD Access Reviews ====== | ====== Azure AD Access Reviews ====== | ||
| - | * Requires an Azure AD P3 license | + | |
| + | | ||
| + | * Access Reviews can be use to see who has administrative access, who is a Global Administrator, | ||
| + | * There are multiple types of reviews as shown here, [[https:// | ||
| + | * security/ | ||
| + | * application access | ||
| + | * AAD role | ||
| + | * ARM/RBAC roles | ||
| + | * As part of creating an Access Review you specify things like the frequency of the review and who will do the review. | ||
| + | * [[https:// | ||
| + | * **Licensing: | ||