1.1.10 Enable Azure AD Identity Protection user risk policies

Information

Azure Active Directory Identity Protection user risk policies detect the probability that a user account has been compromised.

Rationale:

With the user risk policy turned on, Azure AD detects the probability that a user account has been compromised. As an administrator, you can configure a user risk conditional access policy to automatically respond to a specific user risk level. For example, you can block access to your resources or require a password change to get a user account back into a clean state.

Impact:

When the policy triggers, access to the account will either be blocked or the user would be required to use multi-factor authentication and change their password. Users who haven't registered MFA on their account will be blocked from accessing it. If account access is blocked, an admin would need to recover the account. It is therefore recommended that the MFA registration policy be configured for all users who are a part of the User Risk policy.

Solution

To configure a User risk policy, use the following steps:

Sign-on to your Azure portal as global administrator by going to https://portal.azure.com

In the Azure portal, click Services and search for and click on Azure AD Identity Protection.

Under Configure click on User risk policy.

Under Assignments ensure that policy is applied to All users or the scope of users appropriate

Under Assignments choose Conditions and the appropriate User risk level

Under Controls, select Access and choose Allow access and Require password change

Ensure that Enforce Policy is set to On

See Also

https://workbench.cisecurity.org/files/3433