|
1 | | -[Identity Protection](/azure/active-directory/identity-protection/overview-identity-protection) is a tool that allows organizations to accomplish three key tasks: |
| 1 | +[Microsoft Entra ID Protection](/azure/active-directory/identity-protection/overview-identity-protection) helps organizations detect, investigate, and remediate identity-based risks. |
2 | 2 |
|
3 | 3 | - [Automate the detection and remediation of identity-based risks](/azure/active-directory/identity-protection/howto-identity-protection-configure-risk-policies). |
4 | 4 |
|
5 | 5 | - [Investigate risks](/azure/active-directory/identity-protection/howto-identity-protection-investigate-risk) by using data in the Azure portal. |
6 | 6 |
|
7 | | -- [Export risk detection data](/azure/sentinel/connect-azure-ad-identity-protection) to other tools. |
| 7 | +- [Export risk detection data](/azure/sentinel/connect-azure-ad-identity-protection) with Microsoft Sentinel data connector. |
8 | 8 |
|
9 | 9 | The signals that are generated and fed into Identity Protection can be exported to other tools. You learned how the Conditional Access tool can make decisions based on your organization's policies. By using Identity Protection, you can pass this information to a security information and event management (SIEM) tool for more investigation. |
10 | 10 |
|
@@ -34,10 +34,15 @@ As the CTO of Tailwind Traders, you'd like to know how Identity Protection can b |
34 | 34 |
|
35 | 35 | - **Atypical travel**: Two sign-ins from the same user that originate from a geographically distant location. Given past behavior, at least one of the locations might also be atypical for the user. |
36 | 36 |
|
37 | | - - **Malware-linked IP address**: An infected IP address sign-in known to actively communicate with a bot server. |
| 37 | + - **Malicious IP address**: Sign-in from an IP with high failure rates due to invalid credentials or known bad IP reputation. |
38 | 38 |
|
39 | 39 | - **Password spray**: A password spray attack where a bad actor tries to defeat lockout and detection by attempting sign-in with different user names and the same password. |
40 | 40 |
|
| 41 | + - **Anomalous token**: Abnormal token characteristics, such as unusual lifetime or token played from an unfamiliar location. |
| 42 | + |
| 43 | + - **Verified threat actor IP**: Sign-in from an IP associated with known nation-state or cybercriminal threat actors. |
| 44 | + |
| 45 | + |
41 | 46 | ### Things to consider when using Identity Protection |
42 | 47 |
|
43 | 48 | Tailwind Traders decides to implement Identity Protection into their security solution. Review these options that can enhance your strategy. |
|
0 commit comments