High Risk Users Shall Be Blocked
Last updated
Last updated
Azure AD Identity Protection uses various signals to detect the risk level for each user and determine if an account has likely been compromised. Users who are determined to be high risk are to be blocked from accessing the system via Conditional Access until an administrator remediates their account.
Users detected as high risk shall be blocked.
Notifications will be sent to admins when high-risk users are detected.
Azure AD P2. Can be purchased standalone or part of the following bundles:
EMS + E5
Microsoft 365 E3
Microsoft 365 E5
Create a conditional access policy for Sign-In risk:
Under Access Controls> Grant, select Block Access
To Create notifications for admins:
Once a respective conditional access policy is implemented, if a high-risk user attempts to login, the user will receive an error message with instructions to contact the administrator to re-enable their access.
Identity Protection Overview:
Investigate the risk event following these steps:
Conditional Access Policies as Code: