Azure AD Identity Protection risky user

Set up the azure integration.

このページは日本語には対応しておりません。随時翻訳に取り組んでいます。翻訳に関してご質問やご意見ございましたら、お気軽にご連絡ください。

Goal

Detect when Azure Identity Protection categorizes an Azure Active Directory user as risky.

Strategy

Monitor Azure Active Directory Identity Protection and generate a signal when Azure identifies the user as risky.

Triage and response

  1. Check for other signals and logs generated by the impacted user {{@usr.id}}, and look for deviations in the following properties:
    • Application
    • Device
    • Geolocation
    • IP address
    • User agent
  2. Reach out to the user {{@usr.id}} to confirm if they recognize the activity.
  3. If the activity is not legitimate, block the user from signing in and begin your Incident Response process.
  4. If the activity is legitimate, dismiss the user risk in the Azure portal.
PREVIEWING: esther/docs-9518-update-example-control-sensitive-log-data