Azure Active Directory Identity Protection
Azure Active Directory Identity Protection
e OVERVIEW
c HOW-TO GUIDE
Investigate risk
i REFERENCE
Types of events
p CONCEPT
Sign-in experience
c HOW-TO GUIDE
Identity Protection uses the learnings Microsoft has acquired from their position in
organizations with Azure Active Directory, the consumer space with Microsoft Accounts,
and in gaming with Xbox to protect your users. Microsoft analyses trillions of signals per
day to identify and protect customers from threats.
The signals generated by and fed to Identity Protection, can be further fed into tools like
Conditional Access to make access decisions, or fed back to a security information and
event management (SIEM) tool for further investigation.
The sheer scale of signals and attacks requires some level of automation to be able to
keep up.
Detect risk
Identity Protection detects risks of many types, including:
The risk signals can trigger remediation efforts such as requiring: perform multifactor
authentication, reset their password using self-service password reset, or block access
until an administrator takes action.
More detail on these and other risks including how or when they're calculated can be
found in the article, What is risk.
Investigate risk
Administrators can review detections and take manual action on them if needed. There
are three key reports that administrators use for investigations in Identity Protection:
Risky users
Risky sign-ins
Risk detections
More information can be found in the article, How To: Investigate risk.
Risk levels
Identity Protection categorizes risk into tiers: low, medium, and high.
Microsoft doesn't provide specific details about how risk is calculated. Each level of risk
brings higher confidence that the user or sign-in is compromised. For example,
something like one instance of unfamiliar sign-in properties for a user might not be as
threatening as leaked credentials for another user.
Organizations can choose to store data for longer periods by changing diagnostic
settings in Azure AD. They can choose to send data to a Log Analytics workspace,
archive data to a storage account, stream data to Event Hubs, or send data to a partner
solution. Detailed information about how to do so can be found in the article, How To:
Export risk data.
Required roles
Identity Protection requires users be a Security Reader, Security Operator, Security
Administrator, Global Reader, or Global Administrator in order to access.
Configure alerts
Role Can do Can't do
Security Reader View all Identity Protection reports and Overview Configure or change
policies
Configure alerts
Give feedback on
detections
Currently, the Security Operator role can't access the Risky sign-ins report.
Conditional Access administrators can create policies that factor in user or sign-in risk as
a condition. Find more information in the article Conditional Access: Conditions.
License requirements
Using this feature requires Azure AD Premium P2 licenses. To find the right license for
your requirements, see Compare generally available features of Azure AD .
MFA No No Yes
registration
policy
More information on these rich reports can be found in the article, How To: Investigate
risk.
Next steps
Plan an Identity Protection deployment
Additional resources
Documentation
Show 5 more
Training
Module
Understand Microsoft 365 risk management - Training
Learn how Microsoft 365 identifies, assesses, responds to, and manages risks to protect customers
and the Microsoft 365 environment.
Certification
Microsoft Certified: Identity and Access Administrator Associate - Certifications
The Microsoft identity and access administrator designs, implements, and operates an organization’s
identity and access management systems by using Microsoft Azure Active Directory (Azure AD), part
of Microsoft Entra. They configure and manage authentication and authorization of identities for…
Azure Active Directory Identity
Protection - Security overview
Article • 08/23/2022 • 2 minutes to read
The Security overview in the Azure portal gives you an insight into your organization’s
security posture. It helps identify potential attacks and understand the effectiveness of
your policies.
You can find the security overview page in the Azure portal > Azure Active Directory >
Security > Identity Protection > Overview.
Trends
Tiles
Legacy authentication
The ‘Legacy authentication’ tile shows the last week’s count of legacy authentications
with risk present in your organization. Legacy authentication protocols don't support
modern security methods such as an MFA. To prevent legacy authentication, you can
apply a Conditional Access policy. Selecting the ‘Legacy authentication’ tile will redirect
you to the ‘Identity Secure Score’.
Identity Secure Score
The Identity Secure Score measures and compares your security posture to industry
patterns. If you select the Identity Secure Score tile, it will redirect to Identity Secure
Score where you can learn more about improving your security posture.
Next steps
What is risk
Policies available to mitigate risks
Additional resources
Documentation
Export and use Azure Active Directory Identity Protection data - Microsoft Entra
Learn how to investigate using long-term data in Azure Active Directory Identity Protection
Show 5 more
Training
Module
Manage Azure AD Identity Protection - Training
Protecting a user's identity by monitoring their usage and sign-in patterns will ensure a secure cloud
solution. Explore how to design and implement Azure AD Identity protection.
What is risk?
Article • 02/16/2023 • 11 minutes to read
Risk detections in Azure AD Identity Protection include any identified suspicious actions
related to user accounts in the directory. Risk detections (both user and sign-in linked)
contribute to the overall user risk score that is found in the Risky Users report.
7 Note
Identity Protection generates risk detections only when the correct credentials are
used. If incorrect credentials are used on a sign-in, it does not represent risk of
credential compromise.
A sign-in risk represents the probability that a given authentication request isn't
authorized by the identity owner. Risky activity can be detected for a user that isn't
linked to a specific malicious sign-in but to the user itself.
7 Note
Our system may detect that the risk event that contributed to the risk user risk
score was either:
A false positive
The user risk was remediated by policy by either:
Completing multifactor authentication
Secure password change.
Our system will dismiss the risk state and a risk detail of “AI confirmed sign-in safe”
will show and no longer contribute to the user’s overall risk.
Premium detections
Premium detections are visible only to Azure AD Premium P2 customers. Customers
without Azure AD Premium P2 licenses still receive the premium detections but they'll
be titled "additional risk detected".
Sign-in risk
Atypical Offline This risk detection type identifies two sign-ins originating from
travel geographically distant locations, where at least one of the locations
may also be atypical for the user, given past behavior. The algorithm
takes into account multiple factors including the time between the
two sign-ins and the time it would have taken for the user to travel
from the first location to the second. This risk may indicate that a
different user is using the same credentials.
Anomalous Offline This detection indicates that there are abnormal characteristics in the
Token token such as an unusual token lifetime or a token that is played
from an unfamiliar location. This detection covers Session Tokens
and Refresh Tokens.
Token Issuer Offline This risk detection indicates the SAML token issuer for the associated
Anomaly SAML token is potentially compromised. The claims included in the
token are unusual or match known attacker patterns.
Malware Offline This risk detection type indicates sign-ins from IP addresses infected
linked IP with malware that is known to actively communicate with a bot
address server. This detection matches the IP addresses of the user's device
against IP addresses that were in contact with a bot server while the
bot server was active.
Unfamiliar Real-time This risk detection type considers past sign-in history to look for
sign-in anomalous sign-ins. The system stores information about previous
properties sign-ins, and triggers a risk detection when a sign-in occurs with
properties that are unfamiliar to the user. These properties can
include IP, ASN, location, device, browser, and tenant IP subnet.
Newly created users will be in "learning mode" period where the
unfamiliar sign-in properties risk detection will be turned off while
our algorithms learn the user's behavior. The learning mode duration
is dynamic and depends on how much time it takes the algorithm to
gather enough information about the user's sign-in patterns. The
minimum duration is five days. A user can go back into learning
mode after a long period of inactivity.
Suspicious Offline This detection is discovered by Microsoft Defender for Cloud Apps.
inbox This detection looks at your environment and triggers alerts when
manipulation suspicious rules that delete or move messages or folders are set on a
rules user's inbox. This detection may indicate: a user's account is
compromised, messages are being intentionally hidden, and the
mailbox is being used to distribute spam or malware in your
organization.
Password Offline A password spray attack is where multiple usernames are attacked
spray using common passwords in a unified brute force manner to gain
unauthorized access. This risk detection is triggered when a
password spray attack has been successfully performed. For example,
the attacker is successfully authenticated, in the detected instance.
Risk Detection Description
detection type
Impossible Offline This detection is discovered by Microsoft Defender for Cloud Apps.
travel This detection identifies user activities (is a single or multiple
sessions) originating from geographically distant locations within a
time period shorter than the time it takes to travel from the first
location to the second. This risk may indicate that a different user is
using the same credentials.
New country Offline This detection is discovered by Microsoft Defender for Cloud Apps.
This detection considers past activity locations to determine new and
infrequent locations. The anomaly detection engine stores
information about previous locations used by users in the
organization.
Activity from Offline This detection is discovered by Microsoft Defender for Cloud Apps.
anonymous This detection identifies that users were active from an IP address
IP address that has been identified as an anonymous proxy IP address.
Suspicious Offline This detection is discovered by Microsoft Defender for Cloud Apps.
inbox This detection looks for suspicious email forwarding rules, for
forwarding example, if a user created an inbox rule that forwards a copy of all
emails to an external address.
Mass Access Offline This detection is discovered by Microsoft Defender for Cloud Apps.
to Sensitive This detection looks at your environment and triggers alerts when
Files users access multiple files from Microsoft SharePoint or Microsoft
OneDrive. An alert is triggered only if the number of accessed files is
uncommon for the user and the files might contain sensitive
information
Additional Real-time This detection indicates that one of the premium detections was
risk detected or Offline detected. Since the premium detections are visible only to Azure AD
Premium P2 customers, they're titled "additional risk detected" for
customers without Azure AD Premium P2 licenses.
Anonymous Real-time This risk detection type indicates sign-ins from an anonymous IP
IP address address (for example, Tor browser or anonymous VPN). These IP
addresses are typically used by actors who want to hide their sign-in
information (IP address, location, device, and so on) for potentially
malicious intent.
Risk Detection Description
detection type
Admin Offline This detection indicates an admin has selected 'Confirm user
confirmed compromised' in the Risky users UI or using riskyUsers API. To see
user which admin has confirmed this user compromised, check the user's
compromised risk history (via UI or API).
Azure AD Offline This risk detection type indicates user activity that is unusual for the
threat user or consistent with known attack patterns. This detection is
intelligence based on Microsoft's internal and external threat intelligence
sources.
User-linked detections
Possible Offline This risk detection type is detected by Microsoft Defender for Endpoint
attempt to (MDE). A Primary Refresh Token (PRT) is a key artifact of Azure AD
access authentication on Windows 10, Windows Server 2016, and later
Primary versions, iOS, and Android devices. A PRT is a JSON Web Token (JWT)
Refresh that's specially issued to Microsoft first-party token brokers to enable
Token single sign-on (SSO) across the applications used on those devices.
(PRT) Attackers can attempt to access this resource to move laterally into an
organization or perform credential theft. This detection will move users
to high risk and will only fire in organizations that have deployed MDE.
This detection is low-volume and will be seen infrequently by most
organizations. However, when it does occur it's high risk and users
should be remediated.
Anomalous Offline This risk detection baselines normal administrative user behavior in
user Azure AD, and spots anomalous patterns of behavior like suspicious
activity changes to the directory. The detection is triggered against the
administrator making the change or the object that was changed.
User Offline This risk detection is reported by a user who denied a multifactor
reported authentication (MFA) prompt and reported it as suspicious activity. An
suspicious MFA prompt that wasn't initiated by the user may mean that the user’s
activity credentials have been compromised.
Additional Real-time This detection indicates that one of the premium detections was
risk or Offline detected. Since the premium detections are visible only to Azure AD
detected Premium P2 customers, they're titled "additional risk detected" for
customers without Azure AD Premium P2 licenses.
Leaked Offline This risk detection type indicates that the user's valid credentials have
credentials been leaked. When cybercriminals compromise valid passwords of
legitimate users, they often share those credentials. This sharing is
typically done by posting publicly on the dark web, paste sites, or by
trading and selling the credentials on the black market. When the
Microsoft leaked credentials service acquires user credentials from the
dark web, paste sites, or other sources, they're checked against Azure
AD users' current valid credentials to find valid matches. For more
information about leaked credentials, see Common questions.
Azure AD Offline This risk detection type indicates user activity that is unusual for the
threat user or consistent with known attack patterns. This detection is based
intelligence on Microsoft's internal and external threat intelligence sources.
Common questions
Risk levels
Identity Protection categorizes risk into three tiers: low, medium, and high. When
configuring Identity protection policies, you can also configure it to trigger upon No risk
level. No Risk means there's no active indication that the user's identity has been
compromised.
Microsoft doesn't provide specific details about how risk is calculated. Each level of risk
brings higher confidence that the user or sign-in is compromised. For example,
something like one instance of unfamiliar sign-in properties for a user might not be as
threatening as leaked credentials for another user.
Leaked credentials
Public paste sites such as pastebin.com and paste.ca where bad actors typically
post such material. This location is most bad actors' first stop on their hunt to find
stolen credentials.
Law enforcement agencies.
Other groups at Microsoft doing dark web research.
I haven't seen any leaked credential risk events for quite some
time?
If you haven't seen any leaked credential risk events, it is because of the following
reasons:
Locations
Location in risk detections is determined by IP address lookup.
Next steps
Policies available to mitigate risks
Investigate risk
Remediate and unblock users
Security overview
Additional resources
Documentation
Export and use Azure Active Directory Identity Protection data - Microsoft Entra
Learn how to investigate using long-term data in Azure Active Directory Identity Protection
Show 5 more
Risk-based access policies
Article • 11/16/2022 • 3 minutes to read
Access control policies can be applied to protect organizations when a sign-in or user is
detected to be at risk. Such policies are called risk-based policies.
Azure AD Conditional Access offers two risk conditions: Sign-in risk and User risk.
Organizations can create risk-based Conditional Access policies by configuring these
two risk conditions and choosing an access control method. During each sign-in,
Identity Protection sends the detected risk levels to Conditional Access, and the risk-
based policies will apply if the policy conditions are satisfied.
For example, as shown in the diagram below, if organizations have a sign-in risk policy
that requires multifactor authentication when the sign-in risk level is medium or high,
their users must complete multifactor authentication when their sign-in risk is medium
or high.
The example above also demonstrates a main benefit of a risk-based policy: automatic
risk remediation. When a user successfully completes the required access control, like a
secure password change, their risk is remediated. That sign-in session and user account
won't be at risk, and no action is needed from the administrator.
Allowing users to self-remediate using this process will significantly reduce the risk
investigation and remediation burden on the administrators while protecting your
organizations from security compromises. More information about risk remediation can
be found in the article, Remediate risks and unblock users.
Block access
Allow access
Require multifactor authentication
If risks are detected on a sign-in, users can perform the required access control such as
multifactor authentication to self-remediate and close the risky sign-in event to prevent
unnecessary noise for administrators.
7 Note
Block access
Allow access but require a secure password change.
A secure password change will remediate the user risk and close the risky user event to
prevent unnecessary noise for administrators.
Rich set of conditions to control access: Conditional Access offers a rich set of
conditions such as applications and locations for configuration. The risk conditions
can be used in combination with other conditions to create policies that best
enforce your organizational requirements.
Multiple risk-based policies can be put in place to target different user groups or
apply different access control for different risk levels.
Conditional Access policies can be created through Microsoft Graph API and can
be tested first in report-only mode.
Manage all access policies in one place in Conditional Access.
If you already have Identity Protection risk policies set up, we encourage you to migrate
them to Conditional Access.
More information about Azure AD multifactor authentication can be found in the article,
How it works: Azure AD multifactor authentication.
Next steps
Enable Azure AD self-service password reset
Enable Azure AD multifactor authentication
Enable Azure AD multifactor authentication registration policy
Enable sign-in and user risk policies
Additional resources
Documentation
What is risk? Azure AD Identity Protection - Microsoft Entra
Explaining risk in Azure AD Identity Protection
Show 5 more
Training
Module
Manage Azure AD Identity Protection - Training
Protecting a user's identity by monitoring their usage and sign-in patterns will ensure a secure cloud
solution. Explore how to design and implement Azure AD Identity protection.
User experiences with Azure AD Identity
Protection
Article • 02/28/2023 • 3 minutes to read
All of the Identity Protection policies have an impact on the sign in experience for users.
Allowing users to register for and use tools like Azure AD MFA and self-service password
reset can lessen the impact. These tools along with the appropriate policy choices gives
users a self-remediation option when they need it.
Registration interrupt
1. At sign-in to any Azure AD-integrated application, the user gets a notification
about the requirement to set up the account for multifactor authentication. This
policy is also triggered in the Windows 10 Out of Box Experience for new users
with a new device.
2. Complete the guided steps to register for Azure AD multifactor authentication and
complete your sign-in.
2. The user is required to prove their identity by completing Azure AD MFA with one
of their previously registered methods.
3. Finally, the user is forced to change their password using self-service password
reset since someone else may have had access to their account.
IT staff can follow the instructions in the section Unblocking users to allow users to sign
back in.
Additional resources
Documentation
Show 5 more
Training
These differences make workload identities harder to manage and put them at higher
risk for compromise.
) Important
7 Note
Identity Protection detects risk on single tenant, third party SaaS, and multi-tenant
apps. Managed Identities are not currently in scope.
Prerequisites
To make use of workload identity risk, including the new Risky workload identities
blade and the Workload identity detections tab in the Risk detections blade in the
portal, you must have the following.
Workload Identities Premium licensing: You can view and acquire licenses on the
Workload Identities blade in the Azure portal.
One of the following administrator roles assigned
Global Administrator
Security Administrator
Security Operator
Security Reader
Users assigned the Conditional Access administrator role can create policies that use risk
as a condition.
Azure AD Offline This risk detection indicates some activity that is consistent with
threat known attack patterns based on Microsoft's internal and external
intelligence threat intelligence sources.
Suspicious Offline This risk detection indicates sign-in properties or patterns that are
Sign-ins unusual for this service principal.
Leaked Offline This risk detection indicates that the account's valid credentials have
Credentials been leaked. This leak can occur when someone checks in the
credentials in public code artifact on GitHub, or when the credentials
are leaked through a data breach.
Malicious Offline This detection indicates that Microsoft has disabled an application
application for violating our terms of service. We recommend conducting an
investigation of the application. Note: These applications will
show DisabledDueToViolationOfServicesAgreement on the
disabledByMicrosoftStatus property on the related application and
service principal resource types in Microsoft Graph. To prevent them
from being instantiated in your organization again in the future, you
cannot delete these objects.
Suspicious Offline This detection indicates that Microsoft has identified an application
application that may be violating our terms of service, but hasn't disabled it. We
recommend conducting an investigation of the application.
Anomalous Offline This risk detection baselines normal administrative service principal
service behavior in Azure AD, and spots anomalous patterns of behavior like
principal suspicious changes to the directory. The detection is triggered
activity against the administrative service principal making the change or
the object that was changed.
riskyServicePrincipals
servicePrincipalRiskDetections
For improved security and resilience of your workload identities, Continuous Access
Evaluation (CAE) for workload identities is a powerful tool that offers instant
enforcement of your Conditional Access policies and any detected risk signals. CAE-
enabled third party workload identities accessing CAE-capable first party resources are
equipped with 24 hour Long Lived Tokens (LLT's) that are subject to continuous security
checks. Refer to the CAE for workload identities documentation for information on
configuring workload identity clients for CAE and up to date feature scope.
The Azure Active Directory security operations guide for Applications provides detailed
guidance on the above investigation areas.
Once you determine if the workload identity was compromised, dismiss the account’s
risk, or confirm the account as compromised in the Risky workload identities report. You
can also select “Disable service principal” if you want to block the account from further
sign-ins.
Remediate risky workload identities
1. Inventory credentials assigned to the risky workload identity, whether for the
service principal or application objects.
2. Add a new credential. Microsoft recommends using x509 certificates.
3. Remove the compromised credentials. If you believe the account is at risk, we
recommend removing all existing credentials.
4. Remediate any Azure KeyVault secrets that the Service Principal has access to by
rotating them.
The Azure AD Toolkit is a PowerShell module that can help you perform some of these
actions.
Next steps
Conditional Access for workload identities
Microsoft Graph API
Azure AD audit logs
Azure AD sign-in logs
Simulate risk detections
Additional resources
Documentation
Azure Active Directory Conditional Access for workload identities - Microsoft Entra
Protecting workload identities with Conditional Access policies
Show 5 more
Training
Module
Authenticate your Azure deployment workflow by using workload identities - Training
Learn how to create, manage, and grant permissions to workload identities, which enable your
deployment workflows to securely authenticate to Azure.
Certification
Microsoft Certified: Identity and Access Administrator Associate - Certifications
The Microsoft identity and access administrator designs, implements, and operates an organization’s
identity and access management systems by using Microsoft Azure Active Directory (Azure AD), part
of Microsoft Entra. They configure and manage authentication and authorization of identities for…
Identity Protection and B2B users
Article • 03/10/2023 • 5 minutes to read
1. Go to the Password reset portal and initiate the password reset. If self-service
password reset isn't enabled for your account and you can't proceed, reach out to
your IT administrator with the information below.
2. If self-service password reset is enabled for your account, you'll be prompted to
verify your identity using security methods prior to changing your password. For
assistance, see the Reset your work or school password article.
3. Once you have successfully and securely reset your password, your user risk will be
remediated. You can now try again to sign-in as a guest user.
If after resetting your password you're still blocked as a guest due to risk, reach out to
your organization's IT administrator.
To dismiss user risk, go to the Risky users report in the Azure AD Security menu.
Search for the impacted user using the 'User' filter and select the user. Select the
"dismiss user risk" option from the top toolbar. This action may take a few minutes to
complete and update the user risk state in the report.
If a guest user triggers the Identity Protection user risk policy to force password
reset, they will be blocked. This block is due to the inability to reset passwords in
the resource directory.
Guest users do not appear in the risky users report. This limitation is due to the
risk evaluation occurring in the B2B user's home directory.
Administrators cannot dismiss or remediate a risky B2B collaboration user in their
resource directory. This limitation is due to administrators in the resource directory
not having access to the B2B user's home directory.
Next steps
See the following articles on Azure AD B2B collaboration:
Additional resources
Documentation
Remediate risks and unblock users in Azure AD Identity Protection - Microsoft Entra
Learn about the options you have close active risk detections.
Configure the MFA registration policy - Azure Active Directory Identity Protection -
Microsoft Entra
Learn how to configure the Azure AD Identity Protection multifactor authentication registration
policy.
Require MFA for guest users with Conditional Access - Azure Active Directory -
Microsoft Entra
Create a custom Conditional Access policy requiring guest users perform multifactor authentication
Show 5 more
Plan an Identity Protection deployment
Article • 03/10/2023 • 5 minutes to read
Azure Active Directory (Azure AD) Identity Protection detects identity-based risks,
reports them, and allows administrators to investigate and remediate these risks to keep
organizations safe and secure. The risks can be further fed into tools like Conditional
Access to make access decisions or fed back to a security information and event
management (SIEM) tool for further investigation.
Prerequisites
A working Azure AD tenant with Azure AD Premium P2, or trial license enabled. If
needed, create one for free .
Azure AD Premium P2 is required to include Identity Protection risk in
Conditional Access policies.
Administrators who interact with Identity Protection must have one or more of the
following role assignments depending on the tasks they're performing. To follow
the Zero Trust principle of least privilege, consider using Privileged Identity
Management (PIM) to just-in-time activate privileged role assignments.
Read Identity Protection and Conditional Access policies and configurations
Security Reader
Global Reader
Manage Identity Protection
Security Operator
Security Administrator
Create or modify Conditional Access policies
Conditional Access Administrator
Security Administrator
A test user (non-administrator) that allows you to verify policies work as expected
before deploying to real users. If you need to create a user, see Quickstart: Add
new users to Azure Active Directory.
A group that the non-administrator user is a member of. If you need to create a
group, see Create a group and add members in Azure Active Directory.
Communicating change
Communication is critical to the success of any new functionality. You should proactively
communicate with your users how their experience changes, when it changes, and how
to get support if they experience issues.
Policy exclusions
Conditional Access policies are powerful tools, we recommend excluding the following
accounts from your policies:
Multifactor authentication
For users to self-remediate risk though, they must register for Azure AD Multifactor
Authentication before they become risky. For more information, see the article Plan an
Azure Active Directory Multi-Factor Authentication deployment.
User risk - Microsoft works with researchers, law enforcement, various security teams at
Microsoft, and other trusted sources to find leaked username and password pairs. When
these vulnerable users are detected, we recommend requiring users perform multifactor
authentication then reset their password.
The article Configure and enable risk policies provides guidance to create Conditional
Access policies to address these risks.
You can also use the Identity Protection APIs to export risk information to other tools, so
your security team can monitor and alert on risk events.
During testing, you might want to simulate some threats to test your investigation
processes.
Next steps
What is risk?
Azure Active Directory Identity
Protection notifications
Article • 02/23/2023 • 4 minutes to read
Azure AD Identity Protection sends two types of automated notification emails to help
you manage user risk and risk detections:
7 Note
The configuration for this alert allows you to specify at what user risk level you want the
alert to be generated. The email will be generated when the user's risk level reaches
what you have specified. For example, if you set the policy to alert on medium user risk
and your user John's user risk score moves to medium risk because of a real-time sign-
in risk, you'll receive the users at risk detected email. If the user has subsequent risk
detections that cause the user risk level calculation to be the specified risk level (or
higher), you'll receive more user at risk detected emails when the user risk score is
recalculated. For example, if a user moves to medium risk on January 1, you'll receive an
email notification if your settings are set to alert on medium risk. If that same user then
has another risk detection on January 5 that's also medium risk, and the user risk score
is recalculated and is still medium, you'll receive another email notification.
However, an extra email notification will only be sent if the time the risk detection
occurred (that caused the change in user risk level) is more recent than when the last
email was sent. For example, a user signs in on January 1 at 5 AM and there's no real-
time risk (meaning no email would be generated because of that sign-in). 10 minutes
later, at 5:10 AM, the same user signs-in again and has high real-time risk, causing the
user risk level to move to high and an email to be sent. Then, at 5:15 AM, the offline risk
score for the original sign-in at 5 AM changes to high risk because of offline risk
processing. Another user flagged for risk e-mail wouldn't be sent, since the time of the
first sign-in was before the second sign-in that already triggered an email notification.
To prevent an overload of e-mails, you'll only receive one email within a 5-second time
period. This delay means that if multiple users move to the specified risk level during the
same 5-second time period, we'll aggregate and send one e-mail to represent the
change in risk level for all of them.
The user risk level that triggers the generation of this email - By default, the risk
level is set to “High” risk.
The recipients of this email - Users in the Global Administrator, Security
Administrator, or Security Reader roles are automatically added to this list. We
attempt to send emails to the first 20 members of each role. If a user is enrolled in
PIM to elevate to one of these roles on demand, then they will only receive emails
if they are elevated at the time the email is sent.
Optionally you can Add custom email here users defined must have the
appropriate permissions to view the linked reports in the Azure portal.
Configure the users at risk email in the Azure portal under Azure Active Directory >
Security > Identity Protection > Users at risk detected alerts.
It includes:
Users in the Global Administrator, Security Administrator, or Security Reader roles are
automatically added to this list. We attempt to send emails to the first 20 members of
each role. If a user is enrolled in PIM to elevate to one of these roles on demand, then
they will only receive emails if they are elevated at the time the email is sent
Configure the weekly digest email in the Azure portal under Azure Active Directory >
Security > Identity Protection > Weekly digest.
See also
Azure Active Directory Identity Protection
Additional resources
Documentation
Provide risk feedback in Azure Active Directory Identity Protection - Microsoft Entra
How and why should you provide feedback on Identity Protection risk detections.
Show 5 more
Training
Azure Active Directory (Azure AD) Identity Protection helps you manage the roll-out of
Azure AD multifactor authentication (MFA) registration by configuring a Conditional
Access policy to require MFA registration no matter what modern authentication app
you're signing in to.
We recommend that you require Azure AD multifactor authentication for user sign-ins
because it:
Policy configuration
1. Navigate to the Azure portal .
2. Browse to Azure Active Directory > Security > Identity Protection > MFA
registration policy.
a. Under Assignments > Users
i. Under Include, select All users or Select individuals and groups if limiting
your rollout.
ii. Under Exclude, select Users and groups and choose your organization's
emergency access or break-glass accounts.
3. Enforce Policy - On
4. Save
User experience
Azure AD Identity Protection will prompt your users to register the next time they sign in
interactively and they'll have 14 days to complete registration. During this 14-day
period, they can bypass registration if MFA isn't required as a condition, but at the end
of the period they'll be required to register before they can complete the sign-in
process.
Next steps
Enable sign-in and user risk policies
Enable Azure AD self-service password reset
Enable Azure AD multifactor authentication
Additional resources
Documentation
Require MFA for administrators with Conditional Access - Azure Active Directory -
Microsoft Entra
Create a custom Conditional Access policy to require administrators to perform multifactor
authentication
Show 5 more
Training
Module
Improve sign-in security with Microsoft Authenticator - Training
Improve Azure AD sign-in security by running a registration campaign to nudge users to set up
Microsoft Authenticator push notifications as their default sign-in method.
Certification
Microsoft Certified: Identity and Access Administrator Associate - Certifications
The Microsoft identity and access administrator designs, implements, and operates an organization’s
identity and access management systems by using Microsoft Azure Active Directory (Azure AD), part
of Microsoft Entra. They configure and manage authentication and authorization of identities for…
Configure and enable risk policies
Article • 02/23/2023 • 5 minutes to read
As we learned in the previous article, Risk-based access policies, there are two types of
risk policies in Azure Active Directory (Azure AD) Conditional Access you can set up to
automate the response to risks and allow users to self-remediate when risk is detected:
Configured trusted network locations are used by Identity Protection in some risk
detections to reduce false positives.
Risk remediation
Organizations can choose to block access when risk is detected. Blocking sometimes
stops legitimate users from doing what they need to. A better solution is to allow self-
remediation using Azure AD multifactor authentication (MFA) and secure password
change.
2 Warning
Users must register for Azure AD MFA before they face a situation requiring
remediation. For hybrid users that are synced from on-premises to cloud, password
writeback must have been enabled on them. Users not registered are blocked and
require administrator intervention.
Microsoft's recommendation
Microsoft recommends the below risk policy configurations to protect your
organization:
Exclusions
Policies allow for excluding users such as your emergency access or break-glass
administrator accounts. Organizations may need to exclude other accounts from specific
policies based on the way the accounts are used. Exclusions should be reviewed
regularly to see if they're still applicable.
Enable policies
Organizations can choose to deploy risk-based policies in Conditional Access using the
steps outlined below or using the Conditional Access templates (Preview).
Before organizations enable remediation policies, they may want to investigate and
remediate any active risks.
After confirming your settings using report-only mode, an administrator can move the
Enable policy toggle from Report-only to On.
If you already have risk policies enabled in Identity Protection, we highly recommend
that you migrate them to Conditional Access:
Next steps
Enable Azure AD multifactor authentication registration policy
What is risk
Investigate risk detections
Simulate risk detections
Require reauthentication every time
Additional resources
Documentation
Show 5 more
Training
This article provides you with steps for simulating the following risk detection types:
More information about each risk detection can be found in the article, What is risk for
user and workload identity.
Anonymous IP address
Completing the following procedure requires you to use:
The Tor Browser to simulate anonymous IP addresses. You might need to use a
virtual machine if your organization restricts using the Tor browser.
A test account that isn't yet registered for Azure AD multifactor authentication.
Completing the following procedure requires you to use a user account that has:
1. When signing in with your test account, fail the multifactor authentication (MFA)
challenge by not passing the MFA challenge.
2. Using your new VPN, navigate to https://myapps.microsoft.com and enter the
credentials of your test account.
Atypical travel
Simulating the atypical travel condition is difficult because the algorithm uses machine
learning to weed out false-positives such as atypical travel from familiar devices, or sign-
ins from VPNs that are used by other users in the directory. Additionally, the algorithm
requires a sign-in history of 14 days and 10 logins of the user before it begins
generating risk detections. Because of the complex machine learning models and above
rules, there's a chance that the following steps won't lead to a risk detection. You might
want to replicate these steps for multiple Azure AD accounts to simulate this detection.
4. Select Certificates & Secrets > New client Secret , add a description of your client
secret and set an expiration for the secret or specify a custom lifetime and select
Add. Record the secret's value for later use for your GitHub Commit.
7 Note
You can not retrieve the secret again after you leave this page.
6. Ensure you disable the application via Azure Active Directory > Enterprise
Application > Properties > Set Enabled for users to sign-in to No.
7. Create a public GitHub Repository, add the following config and commit the
change as a file with the .txt extension.
GitHub
"AadClientId": "XXXX-2dd4-4645-98c2-960cf76a4357",
"AadSecret": "p3n7Q~XXXX",
"AadTenantDomain": "XXXX.onmicrosoft.com",
"AadTenantId": "99d4947b-XXX-XXXX-9ace-abceab54bcd4",
8. In about 8 hours, you'll be able to view a leaked credential detection under Azure
Active Directory > Security > Risk Detection > Workload identity detections
where the additional info will contain the URL of your GitHub commit.
Next steps
What is risk?
Additional resources
Documentation
Provide risk feedback in Azure Active Directory Identity Protection - Microsoft Entra
How and why should you provide feedback on Identity Protection risk detections.
Show 5 more
How To: Investigate risk
Article • 11/16/2022 • 4 minutes to read
Identity Protection provides organizations with three reports they can use to investigate
identity risks in their environment. These reports are the risky users, risky sign-ins, and
risk detections. Investigation of events is key to better understanding and identifying
any weak points in your security strategy.
All three reports allow for downloading of events in .CSV format for further analysis
outside of the Azure portal. The risky users and risky sign-ins reports allow for
downloading the most recent 2500 entries, while the risk detections report allows for
downloading the most recent 5000 records.
Organizations can take advantage of the Microsoft Graph API integrations to aggregate
data with other sources they may have access to as an organization.
The three reports are found in the Azure portal > Azure Active Directory > Security.
Selecting individual entries may enable more entries at the top of the report such as the
ability to confirm a sign-in as compromised or safe, confirm a user as compromised, or
dismiss user risk.
Selecting individual entries expands a details window below the detections. The details
view allows administrators to investigate and take action on each detection.
Risky users
With the information provided by the risky users report, administrators can find:
Which users are at risk, have had risk remediated, or have had risk dismissed?
Details about detections
History of all risky sign-ins
Risk history
Administrators can then choose to take action on these events. Administrators can
choose to:
Risky sign-ins
The risky sign-ins report contains filterable data for up to the past 30 days (one month).
With the information provided by the risky sign-ins report, administrators can find:
Administrators can then choose to take action on these events. Administrators can
choose to:
7 Note
The risk detections report contains filterable data for up to the past 90 days (three
months).
With the information provided by the risk detections report, administrators can find:
Administrators can then choose to return to the user's risk or sign-ins report to take
actions based on information gathered.
7 Note
Our system may detect that the risk event that contributed to the risk user risk
score was a false positives or the user risk was remediated with policy enforcement
such as completing an MFA prompt or secure password change. Therefore our
system will dismiss the risk state and a risk detail of “AI confirmed sign-in safe” will
surface and it will no longer contribute to the user’s risk.
Investigation framework
Organizations may use the following frameworks to begin their investigation into any
suspicious activity. Investigations may require having a conversation with the user in
question, review of the sign-in logs, or review of the audit logs to name a few.
1. Check the logs and validate whether the suspicious activity is normal for the given
user.
a. Look at the user’s past activities including at least the following properties to
see if they're normal for the given user.
i. Application
ii. Device - Is the device registered or compliant?
iii. Location - Is the user traveling to a different location or accessing devices
from multiple locations?
iv. IP address
v. User agent string
b. If you have access to other security tools like Microsoft Sentinel, check for
corresponding alerts that might indicate a larger issue.
2. Reach out to the user to confirm if they recognize the sign-in. Methods such as
email or Teams may be compromised.
a. Confirm the information you have such as:
i. Application
ii. Device
iii. Location
iv. IP address
Next steps
Remediate and unblock users
Additional resources
Documentation
Provide risk feedback in Azure Active Directory Identity Protection - Microsoft Entra
How and why should you provide feedback on Identity Protection risk detections.
Show 5 more
Remediate risks and unblock users
Article • 02/28/2023 • 6 minutes to read
After completing your investigation, you need to take action to remediate the risky users
or unblock them. Organizations can enable automated remediation by setting up risk-
based policies. Organizations should try to investigate and remediate all risky users in a
time period that your organization is comfortable with. Microsoft recommends acting
quickly, because time matters when working with risks.
Risk remediation
All active risk detections contribute to the calculation of the user's risk level. The user
risk level is an indicator (low, medium, high) of the probability that the user's account
has been compromised. As an administrator, after thorough investigation on the risky
users and the corresponding risky sign-ins and detections, you want to remediate the
risky users so that they're no longer at risk and won't be blocked.
Some risk detections and the corresponding risky sign-ins may be marked by Identity
Protection as dismissed with risk state "Dismissed" and risk detail "Azure AD Identity
Protection assessed sign-in safe" because those events were no longer determined to
be risky.
Here are the prerequisites on users before risk-based policies can be applied to them to
allow self-remediation of risks:
If a risk-based policy is applied to a user during sign-in before the above prerequisites
are met, then the user will be blocked because they aren't able to perform the required
access control, and admin intervention will be required to unblock the user.
Risk-based policies are configured based on risk levels and will only apply if the risk
level of the sign-in or user matches the configured level. Some detections may not raise
risk to the level where the policy will apply, and administrators will need to handle those
risky users manually. Administrators may determine that extra measures are necessary
like blocking access from locations or lowering the acceptable risk in their policies.
Administrators are given two options when resetting a password for their users:
Require the user to reset password - Requiring the users to reset passwords
enables self-recovery without contacting help desk or an administrator. This
method only applies to users that are registered for Azure AD MFA and SSPR. For
users that haven't been registered, this option isn't available.
When you select Dismiss user risk, the user will no longer be at risk, and all the risky
sign-ins of this user and corresponding risk detections will be dismissed as well.
Because this method doesn't have an impact on the user's existing password, it doesn't
bring their identity back into a safe state.
1. Select the event or user in the Risky sign-ins or Risky users reports and choose
"Confirm compromised".
2. If a risk-based policy wasn't triggered, and the risk wasn't self-remediated, then do
one or more of the followings:
a. Request a password reset.
b. Block the user if you suspect the attacker can reset the password or do
multifactor authentication for the user.
c. Revoke refresh tokens.
d. Disable any devices that are considered compromised.
e. If using continuous access evaluation, revoke all access tokens.
For more information about what happens when confirming compromise, see the
section How should I give risk feedback and what happens under the hood?.
Deleted users
It isn't possible for administrators to dismiss risk for users who have been deleted from
the directory. To remove deleted users, open a Microsoft support case.
Unblocking users
An administrator may choose to block a sign-in based on their risk policy or
investigations. A block may occur based on either sign-in or user risk.
1. Reset password - You can reset the user's password. If a user has been
compromised or is at risk of being compromised, the user's password should be
reset to protect their account and your organization.
2. Dismiss user risk - The user risk policy blocks a user if the configured user risk level
for blocking access has been reached. If after investigation you're confident that
the user isn't at risk of being compromised, and it's safe to allow their access, then
you can reduce a user's risk level by dismissing their user risk.
3. Exclude the user from policy - If you think that the current configuration of your
sign-in policy is causing issues for specific users, and it's safe to grant access to
these users without applying this policy to them, then you can exclude them from
this policy. For more information, see the section Exclusions in the article How To:
Configure and enable risk policies.
4. Disable policy - If you think that your policy configuration is causing issues for all
your users, you can disable the policy. For more information, see the article How
To: Configure and enable risk policies.
Next steps
To get an overview of Azure AD Identity Protection, see the Azure AD Identity Protection
overview.
Additional resources
Documentation
View and manage risky users in Microsoft 365 Lighthouse - Microsoft 365 Lighthouse
For Managed Service Providers (MSPs) using Microsoft 365 Lighthouse, learn how to view and
manage risky users.
Configure the MFA registration policy - Azure Active Directory Identity Protection -
Microsoft Entra
Learn how to configure the Azure AD Identity Protection multifactor authentication registration
policy.
Show 5 more
Training
Azure AD stores reports and security signals for a defined period of time. When it comes
to risk information that period may not be long enough.
Organizations can choose to store data for longer periods by changing diagnostic
settings in Azure AD to send RiskyUsers, UserRiskEvents, RiskyServicePrincipals, and
ServicePrincipalRiskEvents data to a Log Analytics workspace, archive data to a storage
account, stream data to an event hub, or send data to a partner solution. Find these
options in the Azure portal > Azure Active Directory, Diagnostic settings > Edit
setting. If you don't have a diagnostic setting, follow the instructions in the article
Create diagnostic settings to send platform logs and metrics to different destinations to
create one.
Log Analytics
Log Analytics allows organizations to query data using built in queries or custom
created Kusto queries, for more information, see Get started with log queries in Azure
Monitor.
Once enabled you'll find access to Log Analytics in the Azure portal > Azure AD > Log
Analytics. The following tables are of most interest to Identity Protection administrators:
AADRiskyUsers - Provides data like the Risky users report in Identity Protection.
AADUserRiskEvents - Provides data like the Risk detections report in Identity
Protection.
RiskyServicePrincipals - Provides data like the Risky workload identities report in
Identity Protection.
ServicePrincipalRiskEvents - Provides data like the Workload identity detections
report in Identity Protection.
In the previous image, the following query was run to show the most recent five risk
detections triggered.
Kusto
AADUserRiskEvents
| take 5
Another option is to query the AADRiskyUsers table to see all risky users.
Kusto
AADRiskyUsers
7 Note
Log Analytics only has visibility into data as it is streamed. Events prior to enabling
the sending of events from Azure AD do not appear.
Storage account
By routing logs to an Azure storage account, you can keep it for longer than the default
retention period. For more information, see the article Tutorial: Archive Azure AD logs to
an Azure storage account.
Other options
Organizations can choose to connect Azure AD data to Microsoft Sentinel as well for
further processing.
Organizations can use the Microsoft Graph API to programatically interact with risk
events.
Next steps
What is Azure Active Directory monitoring?
Install and use the log analytics views for Azure Active Directory
Connect data from Azure Active Directory (Azure AD) Identity Protection
Azure Active Directory Identity Protection and the Microsoft Graph PowerShell SDK
Tutorial: Stream Azure Active Directory logs to an Azure event hub
Additional resources
Documentation
Azure Active Directory security operations for user accounts - Microsoft Entra
Guidance to establish baselines and how to monitor and alert on potential security issues with user
accounts.
Security operations for privileged accounts in Azure Active Directory - Microsoft Entra
Learn about baselines, and how to monitor and alert on potential security issues with privileged
accounts in Azure Active Directory.
Show 5 more
Training
Module
Protect your identities with Azure AD Identity Protection - Training
Use the advanced detection and remediation of identity-based threats to protect your Azure Active
Directory identities and applications from compromise.
Certification
Microsoft Certified: Identity and Access Administrator Associate - Certifications
The Microsoft identity and access administrator designs, implements, and operates an organization’s
identity and access management systems by using Microsoft Azure Active Directory (Azure AD), part
of Microsoft Entra. They configure and manage authentication and authorization of identities for…
Azure Active Directory Identity
Protection and the Microsoft Graph
PowerShell
Article • 09/14/2022 • 2 minutes to read
Microsoft Graph is the Microsoft unified API endpoint and the home of Azure Active
Directory Identity Protection APIs. This article will show you how to use the Microsoft
Graph PowerShell SDK to manage risky users using PowerShell. Organizations that want
to query the Microsoft Graph APIs directly can use the article, Tutorial: Identify and
remediate risks using Microsoft Graph APIs to begin that journey.
To successfully complete this tutorial, make sure you have the required prerequisites:
Microsoft Graph PowerShell SDK is installed. For more information, see the article
Install the Microsoft Graph PowerShell SDK.
PowerShell
Microsoft Graph PowerShell using a global administrator role and the appropriate
permissions. The IdentityRiskEvent.Read.All, IdentityRiskyUser.ReadWrite.All Or
IdentityRiskyUser.ReadWrite.All delegated permissions are required. To set the
permissions to IdentityRiskEvent.Read.All and IdentityRiskyUser.ReadWrite.All, run:
PowerShell
Connect-MgGraph -Scopes
"IdentityRiskEvent.Read.All","IdentityRiskyUser.ReadWrite.All"
If you use app-only authentication, see the article Use app-only authentication with the
Microsoft Graph PowerShell SDK. To register an application with the required application
permissions, prepare a certificate and run:
PowerShell
Connect-MgGraph -ClientID YOUR_APP_ID -TenantId YOUR_TENANT_ID -
CertificateName YOUR_CERT_SUBJECT ## Or -CertificateThumbprint instead of -
CertificateName
PowerShell
PowerShell
PowerShell
# Confirm Compromised on two users
PowerShell
# Get a list of high risky users which are more than 90 days old
Next steps
Get started with the Microsoft Graph PowerShell SDK
Tutorial: Identify and remediate risks using Microsoft Graph APIs
Overview of Microsoft Graph
Azure Active Directory Identity Protection
Additional resources
Documentation
Export and use Azure Active Directory Identity Protection data - Microsoft Entra
Learn how to investigate using long-term data in Azure Active Directory Identity Protection
Show 5 more
Training
Module
Introduction to Microsoft Graph PowerShell - Training
Evaluate whether Microsoft Graph PowerShell is appropriate to automate your business processes
How To: Give risk feedback in Azure AD
Identity Protection
Article • 08/23/2022 • 4 minutes to read
Azure AD Identity Protection allows you to give feedback on its risk assessment. The
following document lists the scenarios where you would like to give feedback on Azure
AD Identity Protection’s risk assessment and how we incorporate it.
What is a detection?
An Identity Protection detection is an indicator of suspicious activity from an identity risk
perspective. These suspicious activities are called risk detections. These identity-based
detections can be based on heuristics, machine learning or can come from partner
products. These detections are used to determine sign-in risk and user risk,
You found Azure AD’s user or sign-in risk assessment incorrect. For example, a
sign-in shown in ‘Risky sign-ins’ report was benign and all the detections on that
sign-in were false positives.
You validated that Azure AD’s user or sign-in risk assessment was correct. For
example, a sign-in shown in ‘Risky sign-ins’ report was indeed malicious and you
want Azure AD to know that all the detections on that sign-in were true positives.
You remediated the risk on that user outside of Azure AD Identity Protection and
you want the user’s risk level to be updated.
Sign-in not Select the sign-in Azure AD will move Currently, the ‘Confirm sign-in
compromised and then the sign-in’s safe’ option is only available in
(False positive)
‘Confirm sign-in aggregate risk to ‘Risky sign-ins’ report.
‘Risky sign-ins’ safe’. none [Risk state =
report shows an at- Confirmed safe; Risk
risk sign-in [Risk level (Aggregate) = -]
state = At risk] but and will reverse its
that sign-in wasn't impact on the user
compromised. risk.
Sign-in Select the sign-in Azure AD will move Currently, the ‘Confirm sign-in
compromised and then the sign-in’s compromised’ option is only
(True positive)
‘Confirm sign-in aggregate risk and available in ‘Risky sign-ins’
‘Risky sign-ins’ compromised’. the user risk to High report.
report shows an at- [Risk state =
risk sign-in [Risk Confirmed
state = At risk] with compromised; Risk
low risk [Risk level level = High].
(Aggregate) = Low]
and that sign-in
was indeed
compromised.
User compromised Select the user Azure AD will move Currently, the ‘Confirm user
(True positive)
and then the user risk to High compromised’ option is only
‘Risky users’ report ‘Confirm user [Risk state = available in ‘Risky users’ report.
User remediated 1. Select the user Azure AD moves the Clicking ‘Dismiss user risk’ will
outside of Azure and then user risk to none close all risk on the user and
AD Identity ‘Confirm user [Risk state = past sign-ins. This action can't
Protection (True compromised’. Dismissed; Risk level be undone.
positive + (This process = -] and closes the
Remediated)
confirms to risk on all existing
‘Risky users’ report Azure AD that sign-ins having
shows an at-risk the user was active risk.
user and I've then indeed
remediated the compromised.)
User not Select the user Azure AD moves the Clicking ‘Dismiss user risk’ will
compromised and then user risk to none close all risk on the user and
(False positive)
‘Dismiss user [Risk state = past sign-ins. This action can't
‘Risky users’ report risk’. (This Dismissed; Risk level be undone.
shows at at-risk process confirms = -].
user but the user to Azure AD that
isn't compromised. the user isn't
compromised.)
Scenario How to give What happens Notes
feedback? under the hood?
I want to close the Select the user Azure AD moves the Clicking ‘Dismiss user risk’ will
user risk but I'm and then user risk to none close all risk on the user and
not sure whether ‘Dismiss user [Risk state = past sign-ins. This action can't
the user is risk’. (This Dismissed; Risk level be undone. We recommend
compromised / process confirms = -]. you remediate the user by
safe. to Azure AD that clicking on ‘Reset password’ or
the user is no request the user to securely
longer reset/change their credentials.
compromised.)
Feedback on user risk detections in Identity Protection is processed offline and may take
some time to update. The risk processing state column will provide the current state of
feedback processing.
Next steps
Azure Active Directory Identity Protection risk detections reference
Additional resources
Documentation
Show 5 more
Training
Module
Understand Microsoft 365 risk management - Training
Learn how Microsoft 365 identifies, assesses, responds to, and manages risks to protect customers
and the Microsoft 365 environment.
Frequently asked questions
Identity Protection in Azure Active
Directory
FAQ
Dismiss user risk in Identity Protection sets the actor in the user’s risk history in Identity
Protection to <Admin’s name with a hyperlink pointing to user’s blade>.
There's a current known issue causing latency in the user risk dismissal flow. If you have
a "User risk policy", this policy will stop applying to dismissed users within minutes of
clicking on "Dismiss user risk". However, there are known delays with the UX refreshing
the "Risk state" of dismissed users. As a workaround, refresh the page on the browser
level to see the latest user "Risk state".
Why can’t I set my own risk levels for each risk detection?
Risk levels in Identity Protection are based on the precision of the detection and
powered by our supervised machine learning. To customize what experience users are
presented, administrator can include/exclude certain users/groups from the User Risk
and Sign-In Risk Policies.
Upon receiving this feedback, we move the sign-in and user risk state to
Confirmed compromised and risk level to High.
In addition, we provide the information to our machine learning systems for future
improvements in risk assessment.
7 Note
Confirm safe (on a sign-in) – Informs Azure AD Identity Protection that the sign-in was
performed by the identity owner and doesn't indicate a compromise.
Upon receiving this feedback, we move the sign-in (not the user) risk state to
Confirmed safe and the risk level to None.
In addition, we provide the information to our machine learning systems for future
improvements in risk assessment.
7 Note
Today, selecting confirm safe on a sign-in doesn't by itself prevent future sign-
ins with the same properties from being flagged as risky. The best way to train
the system to learn a user's properties is to use the risky sign-in policy with
MFA. When a risky sign-in is prompted for MFA and the user successfully
responds to the request, the sign-in can succeed, and help to train the system
on the legitimate user's behavior.
If you believe the user isn't compromised, use Dismiss user risk on the user
level instead of using Confirmed safe on the sign-in level. A Dismiss user risk
on the user level closes the user risk and all past risky sign-ins and risk
detections.
Namespace: microsoft.graph
Azure AD continually evaluates user risks and app or user sign-in risks based on various
signals and machine learning. This API provides programmatic access to all risk
detections in your Azure AD environment.
For more information about risk events, see Azure Active Directory Identity Protection.
7 Note
Methods
Method Return type Description
Properties
Property Type Description
activityDateTime DateTimeOffset Date and time that the risky activity occurred. The
DateTimeOffset type represents date and time
information using ISO 8601 format and is always
in UTC time. For example, midnight UTC on Jan 1,
2014 is look like this: 2014-01-01T00:00:00Z
detectedDateTime DateTimeOffset Date and time that the risk was detected. The
DateTimeOffset type represents date and time
information using ISO 8601 format and is always
in UTC time. For example, midnight UTC on Jan 1,
2014 looks like this: 2014-01-01T00:00:00Z
lastUpdatedDateTime DateTimeOffset Date and time that the risk detection was last
updated. The DateTimeOffset type represents
date and time information using ISO 8601 format
and is always in UTC time. For example, midnight
UTC on Jan 1, 2014 is look like this: 2014-01-
01T00:00:00Z
Property Type Description
tokenIssuerType tokenIssuerType Indicates the type of token issuer for the detected
sign-in risk. Possible values are: AzureAD ,
ADFederationServices , UnknownFutureValue .
riskEventType values
anomalousUserActivity Indicates a
suspicious pattern
of behavior for a
user that is
anomalous to past
behavioral patterns.
riskReasons values
Relationships
None.
JSON representation
The following is a JSON representation of the resource.
JSON
"@odata.type": "#microsoft.graph.riskDetection",
"requestId": "String",
"correlationId": "String",
"riskEventType": "String",
"riskState": "String",
"riskLevel": "String",
"riskDetail": "String",
"source": "String",
"detectionTimingType": "String",
"activity": "String",
"tokenIssuerType": "String",
"ipAddress": "String",
"location": {
"@odata.type": "microsoft.graph.signInLocation"
},
"userId": "String",
"userDisplayName": "String",
"userPrincipalName": "String",
"additionalInfo": "String"
Namespace: microsoft.graph
Represents Azure AD users who are at risk. Azure AD continually evaluates user risk
based on various signals and machine learning. This API provides programmatic access
to all at-risk users in your Azure AD.
For more information about risk events, see Azure Active Directory Identity Protection.
7 Note
Methods
Method Return type Description
List riskyUsers riskyUser collection Get a list of the riskyUser objects and their
properties.
Properties
Property Type Description
Property Type Description
riskLastUpdatedDateTime DateTimeOffset The date and time that the risky user was last
updated. The DateTimeOffset type represents date
and time information using ISO 8601 format and is
always in UTC time. For example, midnight UTC on
Jan 1, 2014 is 2014-01-01T00:00:00Z .
riskLevel riskLevel Level of the detected risky user. Possible values are:
low , medium , high , hidden , none ,
unknownFutureValue .
riskState riskState State of the user's risk. Possible values are: none ,
confirmedSafe , remediated , dismissed , atRisk ,
confirmedCompromised , unknownFutureValue .
Relationships
Relationship Type Description
history riskyUserHistoryItem collection The activity related to user risk level change
JSON representation
The following is a JSON representation of the resource.
JSON
"@odata.type": "#microsoft.graph.riskyUser",
"isDeleted": "Boolean",
"isProcessing": "Boolean",
"riskLevel": "String",
"riskState": "String",
"riskDetail": "String",
"userDisplayName": "String",
"userPrincipalName": "String"
Namespace: microsoft.graph
Details user and application sign-in activity for a tenant (directory). You must have an Azure
AD Premium P1 or P2 license to download sign-in logs using the Microsoft Graph API.
The availability of sign-in logs is governed by the Azure AD data retention policies.
Methods
Method Return Type Description
Properties
Property Type Description
JSON representation
Here is a JSON representation of the resource.
JSON
"appDisplayName": "String",
"appId": "String",
"ipAddress": "String",
"clientAppUsed": "String",
"correlationId": "String",
"conditionalAccessStatus": "string",
"appliedConditionalAccessPolicy": [{"@odata.type":
"microsoft.graph.appliedConditionalAccessPolicy"}],
"isInteractive": true,
"riskDetail": "string",
"riskLevelAggregated": "string",
"riskLevelDuringSignIn": "string",
"riskState": "string",
"riskEventTypes": ["string"],
"riskEventTypes_v2": ["String"],
"resourceDisplayName": "string",
"resourceId": "string",
"userDisplayName": "string",
"userId": "string",
"userPrincipalName": "string"
servicePrincipalRiskDetection resource
type
Article • 12/06/2022 • 3 minutes to read
Namespace: microsoft.graph
For more information about risk events, see Azure Active Directory Identity Protection.
Note: You must have an Entra Workload Identity Premium license to use the
servicePrincipalRiskDetection API.
Methods
Method Return type Description
Properties
Property Type Description
detectedDateTime DateTimeOffset Date and time when the risk was detected.
The DateTimeOffset type represents date
and time information using ISO 8601 format
and is always in UTC time. For example,
midnight UTC on Jan 1, 2014 is 2014-01-
01T00:00:00Z .
keyIds String collection The unique identifier for the key credential
associated with the risk detection.
lastUpdatedDateTime DateTimeOffset Date and time when the risk detection was
last updated.
Relationships
None.
JSON representation
The following is a JSON representation of the resource.
JSON
"@odata.type": "#microsoft.graph.servicePrincipalRiskDetection",
"id": "String (identifier)",
"requestId": "String",
"correlationId": "String",
"riskEventType": "String",
"riskState": "String",
"riskLevel": "String",
"riskDetail": "String",
"source": "String",
"detectionTimingType": "String",
"activity": "String",
"tokenIssuerType": "String",
"ipAddress": "String",
"location": {
"@odata.type": "microsoft.graph.signInLocation"
},
"servicePrincipalId": "String",
"servicePrincipalDisplayName": "String",
"appId": "String",
"keyIds": [
"String"
],
"additionalInfo": "String"
Namespace: microsoft.graph
Represents Azure AD service principals that are at-risk. Azure AD continually evaluates
service principal risk based on various signals and machine learning. This API provides
programmatic access to all at-risk service principals in your Azure AD tenant.
Methods
Method Return type Description
Properties
Property Type Description
riskLastUpdatedDateTime DateTimeOffset The date and time that the risk state was last
updated. The DateTimeOffset type represents date
and time information using ISO 8601 format and is
always in UTC time. For example, midnight UTC on
Jan 1, 2021 is 2021-01-01T00:00:00Z . Supports
$filter ( eq ).
Relationships
Relationship Type Description
Relationship Type Description
JSON representation
The following is a JSON representation of the resource.
JSON
"@odata.type": "#microsoft.graph.riskyServicePrincipal",
"isEnabled": "Boolean",
"isProcessing": "Boolean",
"riskLevel": "String",
"riskState": "String",
"riskDetail": "String",
"displayName": "String",
"appId": "String",
"servicePrincipalType": "String"
At risk (User)
A user with one or more active risk detections.
Conditional Access
A policy for securing access to resources. Conditional Access rules are stored in the
Azure Active Directory and are evaluated by Azure AD before granting access to the
resource. Example rules include restricting access based on user location, device health,
or user authentication method.
Credentials
Information that includes identification and proof of identification that is used to gain
access to local and network resources. Examples of credentials are user names and
passwords, smart cards, and certificates.
Event
A record of an activity in Azure Active Directory.
Identity
A person or entity that must be verified by means of authentication, based on criteria
such as password or a certificate.
Investigation
The process of reviewing the activities, logs, and other relevant information related to a
risk detection to decide whether remediation or mitigation steps are necessary,
understand if and how the identity was compromised, and understand how the
compromised identity was used.
Leaked credentials
A risk detection triggered when current user credentials (user name and password) are
found posted publicly in the Dark web by our researchers.
Mitigation
An action to limit or eliminate the ability of an attacker to exploit a compromised
identity or device without restoring the identity or device to a safe state. A mitigation
does not resolve previous risk detections associated with the identity or device.
Multifactor authentication
An authentication method that requires two or more authentication methods, which
may include something the user has, such a certificate; something the user knows, such
as user names, passwords, or pass phrases; physical attributes, such as a thumbprint;
and personal attributes, such as a personal signature.
Offline detection
The detection of anomalies and evaluation of the risk of an event such as sign-in
attempt after the fact, for an event that has already happened.
Policy condition
A part of a security policy, which defines the entities (groups, users, apps, device
platforms, Device states, IP ranges, client types) included in the policy or excluded from
it.
Policy rule
The part of a security policy that describes the circumstances that would trigger the
policy, and the actions taken when the policy is triggered.
Prevention
An action to prevent damage to the organization through abuse of an identity or device
suspected or know to be compromised. A prevention action does not secure the device
or identity, and does not resolve previous risk detections.
Privileged (user)
A user that at the time of a risk detection, had permanent or temporary admin
permissions to one or more resources in Azure Active Directory, such as a Global
Administrator, Billing Administrator, Service Administrator, User administrator, and
Password Administrator.
Real-time
See Real-time detection.
Real-time detection
The detection of anomalies and evaluation of the risk of an event such as sign-in
attempt before the event is allowed to proceed.
Remediation
An action to secure an identity or a device that were previously suspected or known to
be compromised. A remediation action restores the identity or device to a safe state,
and resolves previous risk detections associated with the identity or device.
Secure (identity)
Take remediation action such as a password change or machine reimaging to restore a
potentially compromised identity to an uncompromised state.
Security policy
A collection of policy rules and condition. A policy can be applied to entities such as
users, groups, apps, devices, device platforms, device states, IP ranges, and Auth2.0
client types. When a policy is enabled, it is evaluated whenever an entity included in the
policy is issued a token for a resource.
Sign in (v)
To authenticate to an identity in Azure Active Directory.
Sign-in (n)
The process or action of authenticating an identity in Azure Active Directory, and the
event that captures this operation.
Sign in from anonymous IP address
A risk detection triggered after a successful sign-in from IP address that has been
identified as an anonymous proxy IP address.
Sign-in risk
See Risk level (sign-in)
User risk
See Risk level (user compromise).
Vulnerability
A configuration or condition in Azure Active Directory, which makes the directory
susceptible to exploits or threats.
See also
Azure Active Directory Identity Protection
Additional resources
Documentation
Quickstart: Accessing the Microsoft Defender Threat Intelligence (Defender TI) Portal
In this quickstart, learn how to configure your profile and preferences and access Defender TI’s help
resources using Microsoft Defender Threat Intelligence (Defender TI).
Azure Active Directory Identity Protection integration - Microsoft Defender for Cloud
Apps
This article provides information about how to leverage Identity Protection alerts in Defender for
Cloud Apps for hybrid risk detection.
Show 5 more
Training
Learning certificate
Microsoft Certified: Identity and Access Administrator Associate - Certifications
The Microsoft identity and access administrator designs, implements, and operates an organization’s
identity and access management systems by using Microsoft Azure Active Directory (Azure AD), part
of Microsoft Entra. They configure and manage authentication and authorization of identities for…
What's new in Azure Active Directory?
Article • 03/30/2023 • 36 minutes to read
Get notified about when to revisit this page for updates by copying and pasting this
URL: https://learn.microsoft.com/api/search/rss?search=%22Release+notes+-
+Azure+Active+Directory%22&locale=en-us into your feed reader.
Azure AD receives improvements on an ongoing basis. To stay up to date with the most
recent developments, this article provides you with information about:
This page updates monthly, so revisit it regularly. If you're looking for items older than
six months, you can find them in Archive for What's new in Azure Active Directory.
March 2023
We've added the following new applications in our App gallery with Provisioning
support. You can now automate creating, updating, and deleting of user accounts for
these newly integrated apps:
Acunetix 360
Akamai Enterprise Application Access
Ardoq
Torii
For more information about how to better secure your organization by using automated
user account provisioning, see: Automate user provisioning to SaaS applications with
Azure AD.
General Availability - Workload identity Federation for
Managed Identities
Type: New feature
Workload Identity Federation enables developers to use managed identities for their
software workloads running anywhere and access Azure resources without needing
secrets. Key scenarios include:
Accessing Azure resources from Kubernetes pods running in any cloud or on-
premises
GitHub workflows to deploy to Azure, no secrets necessary
Accessing Azure resources from other cloud platforms that support OIDC, such as
Google Cloud Platform.
For more information, see: Update your Groups info in the My Apps portal .
Public preview - Customize tokens with Custom Claims
Providers
Type: New feature
A custom claims provider lets you call an API and map custom claims into the token
during the authentication flow. The API call is made after the user has completed all
their authentication challenges, and a token is about to be issued to the app. For more
information, see: Custom authentication extensions (preview).
The Converged Authentication Methods Policy enables you to manage all authentication
methods used for MFA and SSPR in one policy, migrate off the legacy MFA and SSPR
policies, and target authentication methods to groups of users instead of enabling them
for all users in your tenant. For more information, see: Manage authentication methods.
This new workbook makes it easier to investigate and gain insights into your
provisioning workflows in a given tenant. This includes HR-driven provisioning, cloud
sync, app provisioning, and cross-tenant sync.
Microsoft Authenticator app’s number matching feature has been Generally Available
since Nov 2022! If you haven't already used the rollout controls (via Azure portal Admin
UX and MSGraph APIs) to smoothly deploy number matching for users of Microsoft
Authenticator push notifications, we highly encourage you to do so. We previously
announced that we'll remove the admin controls and enforce the number match
experience tenant-wide for all users of Microsoft Authenticator push notifications
starting February 27, 2023. After listening to customers, we'll extend the availability of
the rollout controls for a few more weeks. Organizations can continue to use the
existing rollout controls until May 8, 2023, to deploy number matching in their
organizations. Microsoft services will start enforcing the number matching experience
for all users of Microsoft Authenticator push notifications after May 8, 2023. We'll also
remove the rollout controls for number matching after that date.
If customers don’t enable number match for all Microsoft Authenticator push
notifications prior to May 8, 2023, Authenticator users may experience inconsistent sign-
ins while the services are rolling out this change. To ensure consistent behavior for all
users, we highly recommend you enable number match for Microsoft Authenticator
push notifications in advance.
For more information, see: How to use number matching in multifactor authentication
(MFA) notifications - Authentication methods policy
Earlier, we announced our plan to bring IPv6 support to Microsoft Azure Active Directory
(Azure AD), enabling our customers to reach the Azure AD services over IPv4, IPv6 or
dual stack endpoints. This is just a reminder that we have started introducing IPv6
support into Azure AD services in a phased approach in late March 2023.
If you utilize Conditional Access or Identity Protection, and have IPv6 enabled on any of
your devices, you likely must take action to avoid impacting your users. For most
customers, IPv4 won't completely disappear from their digital landscape, so we aren't
planning to require IPv6 or to deprioritize IPv4 in any Azure AD features or services.
We'll continue to share additional guidance on IPv6 enablement in Azure AD at this link:
IPv6 support in Azure Active Directory
Microsoft cloud settings let you collaborate with organizations from different Microsoft
Azure clouds. With Microsoft cloud settings, you can establish mutual B2B collaboration
between the following clouds:
For more information about Microsoft cloud settings for B2B collaboration., see:
Microsoft cloud settings.
Starting July 2023, we're modernizing the following Terms of Use end user experiences
with an updated PDF viewer, and moving the experiences from
https://account.activedirectory.windowsazure.com to
https://myaccount.microsoft.com :
No functionalities will be removed. The new PDF viewer adds functionality and the
limited visual changes in the end-user experiences will be communicated in a future
update. If your organization has allow-listed only certain domains, you must ensure your
allowlist includes the domains ‘myaccount.microsoft.com’ and
‘*.myaccount.microsoft.com’ for Terms of Use to continue working as expected.
February 2023
Privileged Identity Management (PIM) role activation has been expanded to the Billing
and AD extensions in the Azure portal. Shortcuts have been added to Subscriptions
(billing) and Access Control (AD) to allow users to activate PIM roles directly from these
blades. From the Subscriptions blade, select View eligible subscriptions in the
horizontal command menu to check your eligible, active, and expired assignments. From
there, you can activate an eligible assignment in the same pane. In Access control (IAM)
for a resource, you can now select View my access to see your currently active and
eligible role assignments and activate directly. By integrating PIM capabilities into
different Azure portal blades, this new feature allows users to gain temporary access to
view or edit subscriptions and resources more easily.
For more information Microsoft cloud settings, see: Activate my Azure resource roles in
Privileged Identity Management.
Now you can require users who are eligible for a role to satisfy Conditional Access policy
requirements for activation: use specific authentication method enforced through
Authentication Strengths, activate from Intune compliant device, comply with Terms of
Use, and use 3rd party MFA and satisfy location requirements.
For more information, see: Configure Azure AD role settings in Privileged Identity
Management.
Unfamiliar sign-in properties risk detection now provides risk reasons as to which
properties are unfamiliar for customers to better investigate that risk.
Identity Protection now surfaces the unfamiliar properties in the Azure portal on UX and
in API as Additional Info with a user-friendly description explaining that the following
properties are unfamiliar for this sign-in of the given user.
There's no additional work to enable this feature, the unfamiliar properties are shown by
default. For more information, see: Sign-in risk.
General Availability - New Federated Apps available in
Azure AD Application gallery - February 2023
Type: New feature
In February 2023 we've added the following 10 new applications in our App gallery with
Federation support:
You can also find the documentation of all the applications from here
https://aka.ms/AppsTutorial .
For listing your application in the Azure AD app gallery, read the details here
https://aka.ms/AzureADAppRequest
We've added the following new applications in our App gallery with Provisioning
support. You can now automate creating, updating, and deleting of user accounts for
these newly integrated apps:
Atmos
For more information about how to better secure your organization by using automated
user account provisioning, see: Automate user provisioning to SaaS applications with
Azure AD.
January 2023
Public Preview - Cross-tenant synchronization
Type: New feature
Cross-tenant synchronization allows you to set up a scalable and automated solution for
users to access applications across tenants in your organization. It builds upon the Azure
AD B2B functionality and automates creating, updating, and deleting B2B users. For
more information, see: What is cross-tenant synchronization? (preview).
In the All Devices options under the registered column, you can now select any pending
devices you have, and it opens a context pane to help troubleshoot why the device may
be pending. You can also offer feedback on if the summarized information is helpful or
not. For more information, see: Pending devices in Azure Active Directory.
In the January 2023 release of Authenticator for iOS, there's no companion app for
watchOS due to it being incompatible with Authenticator security features, meaning you
aren't able to install or use Authenticator on Apple Watch. This change only impacts
Apple Watch, so you can still use Authenticator on your other devices. For more
information, see: Common questions about the Microsoft Authenticator app .
In January 2023 we've added the following 10 new applications in our App gallery with
Federation support:
MINT TMS, Exterro Legal GRC Software Platform, SIX.ONE Identity Access Manager ,
Lusha, Descartes, Travel Management System , Pinpoint (SAML), my.sdworx.com, itopia
Labs , Better Stack .
You can also find the documentation of all the applications from here
https://aka.ms/AppsTutorial .
For listing your application in the Azure AD app gallery, read the details here
https://aka.ms/AzureADAppRequest
We've added the following new applications in our App gallery with Provisioning
support. You can now automate creating, updating, and deleting of user accounts for
these newly integrated apps:
SurveyMonkey Enterprise
For more information about how to better secure your organization by using automated
user account provisioning, see: Automate user provisioning to SaaS applications with
Azure AD.
Try out the new guided experience for syncing objects from AD to Azure AD using Azure
AD Cloud Sync in Azure portal. With this new experience, Hybrid Identity Administrators
can easily determine which sync engine to use for their scenarios and learn more about
the various options they have with our sync solutions. With a rich set of tutorials and
videos, customers are able to learn everything about Azure AD cloud sync in one single
place.
This experience helps administrators walk through the different steps involved in setting
up a cloud sync configuration and an intuitive experience to help them easily manage it.
Admins can also get insights into their sync configuration by using the "Insights" option,
which integrates with Azure Monitor and Workbooks.
Hybrid IT Admins now can sync both Active Directory and Azure AD Directory Extensions
using Azure AD Cloud Sync. This new capability adds the ability to dynamically discover
the schema for both Active Directory and Azure AD, allowing customers to map the
needed attributes using Cloud Sync's attribute mapping experience.
For more information on how to enable this feature, see: Cloud Sync directory
extensions and custom attribute mapping
December 2022
This feature analyzes uploaded client-side logs, also known as diagnostic logs, from a
Windows 10+ device that is having an issue(s) and suggests remediation steps to
resolve the issue(s). Admins can work with end user to collect client-side logs, and then
upload them to this troubleshooter in the Entra Portal. For more information, see:
Troubleshooting Windows devices in Azure AD.
End users can now enable password-less phone sign-in for multiple accounts in the
Authenticator App on any supported iOS device. Consultants, students, and others with
multiple accounts in Azure AD can add each account to Microsoft Authenticator and use
password-less phone sign-in for all of them from the same iOS device. The Azure AD
accounts can be in the same tenant or different tenants. Guest accounts aren't
supported for multiple account sign-ins from one device.
End users aren't required to enable the optional telemetry setting in the Authenticator
App. For more information, see: Enable passwordless sign-in with Microsoft
Authenticator.
In this Public Preview refresh, we've enhanced the user experience with an updated
design and added four new improvements:
The ability for users to create tenants from the Manage Tenant overview has been
present in Azure AD since almost the beginning of the Azure portal. This new capability
in the User Settings option allows admins to restrict their users from being able to
create new tenants. There's also a new Tenant Creator role to allow specific users to
create tenants. For more information, see Default user permissions.
We have consolidated relevant app launcher settings in a new App launchers section in
the Azure and Entra portals. The entry point can be found under Enterprise applications,
where Collections used to be. You can find the Collections option by selecting App
launchers. In addition, we've added a new App launchers Settings option. This option
has some settings you may already be familiar with like the Microsoft 365 settings. The
new Settings options also have controls for previews. As an admin, you can choose to
try out new app launcher features while they are in preview. Enabling a preview feature
means that the feature turns on for your organization. This enabled feature reflects in
the My Apps portal, and other app launchers for all of your users. To learn more about
the preview settings, see: End-user experiences for applications.
The Converged Authentication Methods Policy enables you to manage all authentication
methods used for MFA and SSPR in one policy. You can migrate off the legacy MFA and
SSPR policies, and target authentication methods to groups of users instead of enabling
them for all users in the tenant. For more information, see: Manage authentication
methods for Azure AD.
You can now use administrative units to delegate management of specified devices in
your tenant by adding devices to an administrative unit. You're also able to assign built-
in, and custom device management roles, scoped to that administrative unit. For more
information, see: Device management.
Companies often provide mobile devices to frontline workers that need are shared
between shifts. Microsoft’s shared device mode allows frontline workers to easily
authenticate by automatically signing users in and out of all the apps that have enabled
this feature. In addition to Microsoft Teams and Managed Home Screen being generally
available, we're excited to announce that Microsoft Edge and Yammer apps on Android
are now in Public Preview.
For more information on shared-device mode, see: Azure Active Directory Shared Device
Mode documentation.
For steps to set up shared device mode with Intune, see: Intune setup blog .
We've added the following new applications in our App gallery with Provisioning
support. You can now automate creating, updating, and deleting of user accounts for
these newly integrated apps:
GHAE
For more information about how to better secure your organization by using automated
user account provisioning, see: Automate user provisioning to SaaS applications with
Azure AD.
In December 2022 we've added the following 44 new applications in our App gallery
with Federation support:
Bionexo IDM , SMART Meeting Pro , Venafi Control Plane – Datacenter, HighQ,
Drawboard PDF , ETU Skillsims, TencentCloud IDaaS, TeamHeadquarters Email Agent
OAuth , Verizon MDM , QRadar SOAR, Tripwire Enterprise, Cisco Unified
Communications Manager, Howspace , Flipsnack SAML, Albert , Altinget.no , Coveo
Hosted Services, Cybozu(cybozu.com), BombBomb , VMware Identity Service,
HexaSync , Trifecta Teams , VerosoftDesign , Mazepay , Wistia, Begin.AI , WebCE,
Dream Broker Studio , PKSHA Chatbot, PGM-BCP , ChartDesk SSO, Elsevier SP,
GreenCommerce IdentityServer , Fullview , Aqua Platform, SpedTrack, Pinpoint ,
Darzin Outlook Add-in , Simply Stakeholders Outlook Add-in , tesma, Parkable, Unite
Us
You can also find the documentation of all the applications from here
https://aka.ms/AppsTutorial ,
For listing your application in the Azure AD app gallery, read the details here
https://aka.ms/AzureADAppRequest
As part of our ongoing initiative to improve the developer experience, service reliability,
and security of customer applications, we'll end support for the Azure Active Directory
Authentication Library (ADAL). The final deadline to migrate your applications to Azure
Active Directory Authentication Library (MSAL) has been extended to June 30, 2023.
What happens?
We recognize that changing libraries isn't an easy task, and can't be accomplished
quickly. We're committed to helping customers plan their migrations to Microsoft
Authentication Library and execute them with minimal disruption.
In June 2020, we announced the 2-year end of support timeline for ADAL .
In December 2022, we’ve decided to extend the Azure Active Directory
Authentication Library end of support to June 2023.
Through the next six months (January 2023 – June 2023) we continue informing
customers about the upcoming end of support along with providing guidance on
migration.
On June 2023 we'll officially sunset Azure Active Directory Authentication Library,
removing library documentation and archiving all GitHub repositories related to
the project.
How to migrate?
To make the migration process easier, we published a comprehensive guide that
documents the migration paths across different platforms and programming languages.
November 2022
The Temporary Access Pass can now be used to recover Azure AD-joined PCs when the
EnableWebSignIn policy is enabled on the device. This is useful for when your users
don't know, or have, a password. For more information, see:
Authentication/EnableWebSignIn.
Authenticator version 6.6.8 and higher on iOS will be FIPS 140 compliant for all Azure
AD authentications using push multi-factor authentications (MFA), Password-less Phone
Sign-In (PSI), and time-based one-time pass-codes (TOTP). No changes in configuration
are required in the Authenticator app or Azure portal to enable this capability. For more
information, see: FIPS 140 compliant for Azure AD authentication.
In November 2022, we've added the following 22 new applications in our App gallery
with Federation support
Adstream, Databook, Ecospend IAM , Digital Pigeon, Drawboard Projects, Vellum ,
Veracity , Microsoft OneNote to Bloomberg Note Sync , DX NetOps Portal, itslearning
Outlook integration , Tranxfer, Occupop , Nialli Workspace , Tideways , SOWELL ,
Prewise Learning , CAPTOR for Intune , wayCloud Platform , Nura Space Meeting
Room , Flexopus Exchange Integration , Ren Systems , Nudge Security
You can also find the documentation of all the applications from here
https://aka.ms/AppsTutorial ,
For listing your application in the Azure AD app gallery, read the details here
https://aka.ms/AzureADAppRequest
We've added the following new applications in our App gallery with Provisioning
support. You can now automate creating, updating, and deleting of user accounts for
these newly integrated apps:
Keepabl
Uber
For more information about how to better secure your organization by using automated
user account provisioning, see: Automate user provisioning to SaaS applications with
Azure AD.
Admins can now pause, and resume, the processing of individual dynamic groups in the
Entra Admin Center. For more information, see: Create or update a dynamic group in
Azure Active Directory.
Update the Azure AD and Microsoft 365 sign-in experience with new company branding
capabilities. You can apply your company’s brand guidance to authentication
experiences with pre-defined templates. For more information, see: Configure your
company branding.
Update the company branding functionality on the Azure AD/Microsoft 365 sign-in
experience to allow customizing Self Service Password Reset (SSPR) hyperlinks, footer
hyperlinks and browser icon. For more information, see: Configure your company
branding.
Administrative Units now support soft deletion. Admins can now list, view properties of,
or restore deleted Administrative Units using the Microsoft Graph. This functionality
restores all configuration for the Administrative Unit when restored from soft delete,
including memberships, admin roles, processing rules, and processing rules state.
With the growing adoption and support of IPv6 across enterprise networks, service
providers, and devices, many customers are wondering if their users can continue to
access their services and applications from IPv6 clients and networks. Today, we’re
excited to announce our plan to bring IPv6 support to Microsoft Azure Active Directory
(Azure AD). This allows customers to reach the Azure AD services over both IPv4 and
IPv6 network protocols (dual stack).
For most customers, IPv4 won't completely
disappear from their digital landscape, so we aren't planning to require IPv6 or to de-
prioritize IPv4 in any Azure Active Directory features or services.
We'll begin introducing
IPv6 support into Azure AD services in a phased approach, beginning March 31, 2023.
We have guidance that is specifically for Azure AD customers who use IPv6 addresses
and also use Named Locations in their Conditional Access policies.
Customers who use named locations to identify specific network boundaries in their
organization need to:
Customers who use Conditional Access location based policies to restrict and secure
access to their apps from specific networks need to:
October 2022
Microsoft stops support for Azure AD provisioning agent with versions 1.1.818.0 and
below starting Feb 1,2023. If you're using Azure AD cloud sync, make sure you have the
latest version of the agent. You can view info about the agent release history here. You
can download the latest version here
You can find out which version of the agent you're using as follows:
1. Going to the domain server that you have the agent installed
2. Right-click on the Microsoft Azure AD Connect Provisioning Agent app
3. Select on “Details” tab and you can find the version number there
7 Note
Azure Active Directory (AD) Connect follows the Modern Lifecycle Policy. Changes
for products and services under the Modern Lifecycle Policy may be more frequent
and require customers to be alert for forthcoming modifications to their product or
service.
Product governed by the Modern Policy follow a continuous support and
servicing model. Customers must take the latest update to remain supported. For
products and services governed by the Modern Lifecycle Policy, Microsoft's policy is
to provide a minimum 30 days' notification when customers are required to take
action in order to avoid significant degradation to the normal use of the product or
service.
An IT admin can now add multiple domains to a single SAML/WS-Fed identity provider
configuration to invite users from multiple domains to authenticate from the same
identity provider endpoint. For more information, see: Federation with SAML/WS-Fed
identity providers for guest users.
General Availability - Limits on the number of configured
API permissions for an application registration enforced
starting in October 2022
Type: Plan for change
In the end of October, the total number of required permissions for any single
application registration must not exceed 400 permissions across all APIs. Applications
exceeding the limit are unable to increase the number of permissions configured for.
The existing limit on the number of distinct APIs for permissions required remains
unchanged and may not exceed 50 APIs.
In the Azure portal, the required permissions list is under API Permissions within specific
applications in the application registration menu. When using Microsoft Graph or
Microsoft Graph PowerShell, the required permissions list is in the
requiredResourceAccess property of an application entity. For more information, see:
Validation differences by supported account types (signInAudience).
We're excited to announce the general availability of hybrid cloud Kerberos trust, a new
Windows Hello for Business deployment model to enable a password-less sign-in
experience. With this new model, we’ve made Windows Hello for Business easier to
deploy than the existing key trust and certificate trust deployment models by removing
the need for maintaining complicated public key infrastructure (PKI), and Azure Active
Directory (AD) Connect synchronization wait times. For more information, see: Hybrid
Cloud Kerberos Trust Deployment.
This feature empowers users on Linux clients to register their devices with Azure AD,
enroll into Intune management, and satisfy device-based Conditional Access policies
when accessing their corporate resources.
We're excited to announce the public preview of Lifecycle Workflows, a new Identity
Governance capability that allows customers to extend the user provisioning process,
and adds enterprise grade user lifecycle management capabilities, in Azure AD to
modernize your identity lifecycle management process. With Lifecycle Workflows, you
can:
For more information, see: What are Lifecycle Workflows? (Public Preview).
To prevent accidental notification approvals, admins can now require users to enter the
number displayed on the sign-in screen when approving an MFA notification in the
Microsoft Authenticator app. We've also refreshed the Azure portal admin UX and
Microsoft Graph APIs to make it easier for customers to manage Authenticator app
feature roll-outs. As part of this update we have also added the highly requested ability
for admins to exclude user groups from each feature.
The number matching feature greatly up-levels the security posture of the Microsoft
Authenticator app and protects organizations from MFA fatigue attacks. We highly
encourage our customers to adopt this feature applying the rollout controls we have
built. Number Matching will begin to be enabled for all users of the Microsoft
Authenticator app starting February 27 2023.
For more information, see: How to use number matching in multifactor authentication
(MFA) notifications - Authentication methods policy.
Application Context: This feature shows users which application they're signing
into.
Geographic Location Context: This feature shows users their sign-in location based
on the IP address of the device they're signing into.
The feature is available for both MFA and Password-less Phone Sign-in notifications and
greatly increases the security posture of the Microsoft Authenticator app. We've also
refreshed the Azure portal Admin UX and Microsoft Graph APIs to make it easier for
customers to manage Authenticator app feature roll-outs. As part of this update, we've
also added the highly requested ability for admins to exclude user groups from certain
features.
We highly encourage our customers to adopt these critical security features to reduce
accidental approvals of Authenticator notifications by end users.
For more information, see: How to use additional context in Microsoft Authenticator
notifications - Authentication methods policy.
You can also find the documentation of all the applications from here
https://aka.ms/AppsTutorial ,
For listing your application in the Azure AD app gallery, read the details here
https://aka.ms/AzureADAppRequest
You can now automate creating, updating, and deleting user accounts for these newly
integrated apps:
LawVu
For more information about how to better secure your organization by using automated
user account provisioning, see: Automate user provisioning to SaaS applications with
Azure AD.