Skip to content

Commit b28618e

Browse files
committed
Fix remaining Best practice/Detail format in identity article
Convert monitoring section to bullet format for consistency
1 parent 491e377 commit b28618e

1 file changed

Lines changed: 1 addition & 11 deletions

File tree

articles/security/fundamentals/identity-management-best-practices.md

Lines changed: 1 addition & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -279,24 +279,14 @@ You can use [Azure Resource Manager](../../azure-resource-manager/management/ove
279279

280280
> [!NOTE]
281281
> Security policies are not the same as Azure RBAC. They actually use Azure RBAC to authorize users to create those resources.
282-
>
283-
>
284282
285283
Organizations that are not controlling how resources are created are more susceptible to users who might abuse the service by creating more resources than they need. Hardening the resource creation process is an important step to securing a multitenant scenario.
286284

287285
## Actively monitor for suspicious activities
288286

289287
An active identity monitoring system can quickly detect suspicious behavior and trigger an alert for further investigation. The following table lists Microsoft Entra capabilities that can help organizations monitor their identities:
290288

291-
**Best practice**: Have a method to identify:
292-
293-
- Attempts to sign in [without being traced](/entra/identity/monitoring-health/howto-access-activity-logs).
294-
- [Brute force](/entra/identity/monitoring-health/howto-access-activity-logs) attacks against a particular account.
295-
- Attempts to sign in from multiple locations.
296-
- Sign-ins from [infected devices](/entra/identity/monitoring-health/howto-access-activity-logs).
297-
- Suspicious IP addresses.
298-
299-
**Detail**: Use Microsoft Entra ID P1 or P2 [anomaly reports](/entra/identity/monitoring-health/howto-access-activity-logs). Have processes and procedures in place for IT admins to run these reports on a daily basis or on demand (usually in an incident response scenario).
289+
- **Have a method to identify suspicious sign-in activities**: Monitor for attempts to sign in [without being traced](/entra/identity/monitoring-health/howto-access-activity-logs), [brute force](/entra/identity/monitoring-health/howto-access-activity-logs) attacks against a particular account, attempts to sign in from multiple locations, sign-ins from [infected devices](/entra/identity/monitoring-health/howto-access-activity-logs), and suspicious IP addresses. Use Microsoft Entra ID P1 or P2 [anomaly reports](/entra/identity/monitoring-health/howto-access-activity-logs). Have processes and procedures in place for IT admins to run these reports on a daily basis or on demand (usually in an incident response scenario).
300290

301291
- **Have an active monitoring system that notifies you of risks and can adjust risk level (high, medium, or low) to your business requirements.**: Use [Microsoft Entra ID Protection](/entra/id-protection/overview-identity-protection), which flags the current risks on its own dashboard and sends daily summary notifications via email. To help protect your organization's identities, you can configure risk-based policies that automatically respond to detected issues when a specified risk level is reached.
302292

0 commit comments

Comments
 (0)