Risk Detections Overview
Risk detections in Microsoft Entra ID Protection include any identified suspicious actions related to user accounts in the directory. Risk detections (both user and sign-in linked) contribute to the overall user risk score that is found in the Risky Users report. ID Protection provides organizations access to powerful resources to see and respond quickly to these suspicious actions. ID Protection generates risk detections only when the correct credentials are used. If incorrect credentials are used on a sign-in, it does not represent risk of credential compromise.
PLEASE NOTE: These detections are only available to tenants with a Microsoft Entra ID P2 license. Please note that this license level is NOT required for a SaaS Alerts Tenant to properly generate regular events.
Risk types and detection
Risk can be detected at the User and Sign-in level and two types of detection or calculation Real-time and Offline. Access to all risks are considered premium and is available to Microsoft Entra ID P2 customers only. A few of these events are available to Free and Microsoft Entra ID P1 customers and is reflected in the UI in the organization connection modal.
Why is a user at risk?
A user becomes a risky user when:
- They have one or more risky sign-ins.
- There are one or more risks detected on the user’s account, like Leaked Credentials.
A sign-in risk represents the probability that a given authentication request isn't the authorized identity owner. Risky activity can be detected for a user that isn't linked to a specific malicious sign-in but to the user itself. Real-time detections may not show up in reporting for 5 to 10 minutes. Offline detections may not show up in reporting for 48 hours.
The Microsoft system may detect that the risk event that contributed to the risky user risk score was either:
- A false positive
- The user risk was remediated by policy by either:
- Completing multifactor authentication
- Secure password change
The Microsoft system will dismiss the risk state and a risk detail of “AI confirmed sign-in safe” will show and no longer contribute to the user’s overall risk.
Sign-in risk detections
Risk detection | Detection type | Type |
Atypical travel | Offline | Premium |
Anomalous Token | Offline | Premium |
Anomalous Token | Real-time or Offline | Premium |
Malware linked IP address | Offline | Premium This detection has been deprecated. |
Suspicious browser | Offline | Premium |
Unfamiliar sign-in properties | Real-time | Premium |
Malicious IP address | Offline | Premium |
Suspicious inbox manipulation rules | Offline | Premium |
Password spray | Offline | Premium |
Impossible travel | Offline | Premium |
New country | Offline | Premium |
Activity from anonymous IP address | Offline | Premium |
Suspicious inbox forwarding | Offline | Premium |
Mass Access to Sensitive Files | Offline | Premium |
Verified threat actor IP | Real-time | Premium |
Additional risk detected | Real-time or Offline | Nonpremium |
Anonymous IP address | Real-time | Nonpremium |
Admin confirmed user compromised | Offline | Nonpremium |
Microsoft Entra threat intelligence | Real-time or Offline | Nonpremium |
User risk detections
Risk detection | Detection type | Type |
Possible attempt to access Primary Refresh Token (PRT) | Offline | Premium |
Anomalous user activity | Offline | Premium |
User reported suspicious activity | Offline | Premium |
Additional risk detected | Real-time or Offline | Nonpremium |
Leaked credentials | Offline | Nonpremium |
Microsoft Entra threat intelligence | Offline | Nonpremium |
Full Microsoft article here: https://learn.microsoft.com/en-us/entra/id-protection/concept-identity-protection-risks
Comments
0 comments
Please sign in to leave a comment.