Note
Access to this page requires authorization. You can try signing in or changing directories.
Access to this page requires authorization. You can try changing directories.
The proof-of-concept (PoC) guidance in this series of articles helps you to learn, deploy, and test Microsoft Entra ID Protection to detect, investigate, and remediate identity-based risks.
An overview of the guidance begins with Introduction to Microsoft Entra ID Protection proof-of-concept guidance.
Detailed guidance continues with these scenarios:
- Master risk analysis for effective remediation
- Bring identity risk-related telemetry into security investigations
- Allow users to self-remediate identity risk for enterprise-managed resources
This article helps identity administrators use real-time risk detection features in Microsoft Entra ID Protection to grant user access to protected resources. To set up your PoC for this scenario, begin with Introduction to Microsoft Entra ID Protection proof-of-concept guidance. Then follow the detailed guidance in this article.
Perform the following steps for real-time risk detection with Microsoft Entra ID Protection:
Configure risk policies
To configure and enable risk policies, factor Sign-in risk and User risk policies in Microsoft Entra Conditional Access. If you enabled legacy risk policies in Microsoft Entra ID Protection, plan to migrate them to Conditional Access.
Set up the following key foundational policies.
- User risk policy: Trigger actions such as require a secure password change for high-risk users.
- Sign-in risk policy: Evaluate each sign-in attempt and enforce controls such as multifactor authentication (MFA) or block access.
- MFA registration policy: Ensure user enrollment in MFA before they become risky.
Test policies with nonadmin test users before you fully deploy your solution.
Automate your solution with Conditional Access and Microsoft-managed Conditional Access policies. Automation is critical for scaling protection across large environments.
Risk signals from Microsoft Entra ID Protection feed into Conditional Access policies and Microsoft-managed Conditional Access policies. Consider these options for your scenario:
- Require MFA for sign-in risk or secure password reset for user risk based on risk level.
- To prevent lockouts, exclude emergency access accounts.
- Apply policies to workload identities like service principals.
Investigate and remediate risks
To investigate and remediate risks, use the Microsoft Entra ID Protection dashboards and reports.
- Review reports for risky users, risky sign-ins, and risk detections.
- To immediately view impact in sign-in logs, use the Impact analysis of risk-based access policies workbook. It helps you understand your environment before you enable policies that might block your users from signing in, require MFA, or perform a secure password change. It also provides you with a breakdown for the date range of the sign-ins that you select.
- Begin initial triage of your findings. Take manual actions such as dismissing false positives or confirming compromise.
- Make decisions based on the investigation and risk remediation framework.
- Use Microsoft Graph PowerShell or APIs for bulk actions.
For deeper analysis, export risk data to security information and event management (SIEM) tools such as Microsoft Sentinel or Log Analytics.
Monitor and tune policies
Monitor the impact of policies using these features:
- Use the Impact analysis of risk-based access policies workbook for trend analysis.
- To simulate policy effects, enable report-only mode in Conditional Access.
- To manage user risk and risk detections, configure automated Microsoft Entra ID Protection notifications, such as the users at risk detected email or weekly digest email.
- To reduce false positives and improve the accuracy of Microsoft Entra ID Protection risk calculations for a specific tenant, configure named locations such as VPN IP ranges.
Next steps
- Introduction to Microsoft Entra ID Protection proof-of-concept guidance
- Use real-time risk detection to grant access to protected resources
- Master risk analysis for effective remediation
- Bring identity risk-related telemetry into security investigations
- Allow users to self-remediate identity risk for enterprise-managed resources