Skip to content

Commit 80db26c

Browse files
authored
Clarify user and sign-in risk descriptions
Updated the descriptions of user and sign-in risks, improving clarity and consistency. Added a note about unified risk signals from Microsoft Defender.
1 parent 56da964 commit 80db26c

1 file changed

Lines changed: 5 additions & 3 deletions

File tree

learn-pr/wwl-azure/design-authentication-authorization-solutions/includes/7-design-for-identity-protection.md

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -22,21 +22,21 @@ As the CTO of Tailwind Traders, you'd like to know how Identity Protection can b
2222

2323
:::image type="content" source="../media/risk-detections.png" alt-text="Diagram that shows risky users, risky sign-ins, and risk detections." border="false":::
2424

25-
- [**User risk**](/azure/active-directory/identity-protection/concept-identity-protection-risks) represents the probability that a given identity or account is compromised. An example is when a user's valid credentials are leaked. User risks are calculated offline by using Microsoft's internal and external threat intelligence sources. Here are some user risks that can be identified:
25+
- **User risk** represents the probability that a given identity or account is compromised. An example is when a user's valid credentials are leaked. User risks are calculated offline by using Microsoft's internal and external threat intelligence sources. Here are some user risks that can be identified:
2626

2727
- **Leaked credentials**: Microsoft checks for leaked credentials from the dark web, paste sites, or other sources. These leaked credentials are checked against Microsoft Entra users' current valid credentials for valid matches.
2828

2929
- **Microsoft Entra threat intelligence**: This risk detection type indicates user activity that's unusual for the given user or is consistent with known attack patterns.
3030

31-
- [**Sign-in risk**](/azure/active-directory/identity-protection/concept-identity-protection-risks) represents the probability that a given sign-in (authentication request) isn't authorized by the identity owner. Sign-in risk can be calculated in real time or offline. Here are some sign-in risks that can be identified:
31+
- **Sign-in risk** represents the probability that a given sign-in (authentication request) isn't authorized by the identity owner. Sign-in risk can be calculated in real time or offline. Here are some [sign-in risks](/azure/active-directory/identity-protection/concept-identity-protection-risks) that can be identified:
3232

3333
- **Anonymous IP address**: A sign-in attempt from an anonymous IP address like a Tor browser or an anonymized VPN.
3434

3535
- **Atypical travel**: Two sign-ins from the same user that originate from a geographically distant location. Given past behavior, at least one of the locations might also be atypical for the user.
3636

3737
- **Malicious IP address**: Sign-in from an IP with high failure rates due to invalid credentials or known bad IP reputation.
3838

39-
- **Password spray**: A password spray attack where a bad actor tries to defeat lockout and detection by attempting sign-in with different user names and the same password.
39+
- **Password spray**: A password spray attack is where multiple identities are attacked using common passwords in a unified brute force manner.
4040

4141
- **Anomalous token**: Abnormal token characteristics, such as unusual lifetime or token played from an unfamiliar location.
4242

@@ -54,3 +54,5 @@ Tailwind Traders decides to implement Identity Protection into their security so
5454
- **Consider investigating risks in the Azure portal**. Investigate Tailwind Traders risk events in the Azure portal and identify any weak areas in your security implementation. Download the risk events in .CSV format and view the output in the Security section of Microsoft Entra ID. Use the Microsoft Graph API integrations to aggregate your data with other sources.
5555

5656
- **Consider exporting your risk detection data**. Export the risk detection data for Tailwind Traders by using the Microsoft Sentinel data connector for Identity Protection.
57+
58+
- **Consider unified risk signals**: ID Protection can now ingest signals from Microsoft Defender alongside native detections to calculate a unified Identity Risk Score.

0 commit comments

Comments
 (0)