1.1.8 Enable Identity Protection to identify anomalous logon behavior

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Azure Active Directory Identity Protection monitors account behaviors and enables organizations to configure automated responses to detected suspicious actions related to user identities.

Rationale:

Azure Active Directory Identity Protection helps to discover at risk or compromised accounts in your environment. Identity based attacks continue to be a top source for breaches. Enabling Identity Protection not only helps to monitor and provide reporting, but also helps to automatically respond to identity based risks.

Impact:

The impacts associated with implementation of this setting are highly dependent upon the specific response actions configured in Identity Protection.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

To setup Azure Active Directory Identity Protection, use the following steps:

Sign-on to your Azure portal as global administrator by going to https://portal.azure.com

In the search enter Azure AD Identity Protection, then click on the result.

Select the User risk policy followed by the Sign-in risk policy and enable each.

At the bottom of the page will be a toggle for Enforce policy, also set this to On.

See Also

https://workbench.cisecurity.org/files/3433