High Risk Sign-Ins Shall Be Blocked
Last updated
Last updated
Azure AD Identity Protection uses various signals to detect the risk level for each user sign-in. Sign-ins detected as high risk are to be blocked via Conditional Access.
Sign-Ins detected as high risk shall be blocked.
Notifications will be sent to admins when high-risk sign-ins are detected.
Azure AD P2. Can be purchased standalone or part of the following bundles:
EMS + E5
Microsoft 365 E3
Microsoft 365 E5
Create a conditional access policy for Sign-In risk:
Under Access Controls> Grant, select Block Access
To Create notifications for admins:
Once a respective conditional access policy is implemented, if a high-risk user attempts to login, the user will receive an error message with instructions to contact the administrator to re-enable their access.
• None Currently
Identity Protection Overview:
If after implementing this, it is observed that numerous legitimate user sign-ins are consistently being blocked due to their location being interpreted as suspicious and this creates an operational burden on the agency, then a can be configured in the Conditional Access blade for each of the legitimate sign-in locations. Azure AD Identity Protection considers the Trusted Location data when it calculates sign-in risk, and this may help to prevent users signing in from legitimate locations from being flagged as high risk.
Investigate the risk event following these steps: