title | description | services | keywords | documentationcenter | author | manager | ms.assetid | ms.service | ms.component | ms.workload | ms.tgt_pltfrm | ms.devlang | ms.topic | ms.date | ms.author | ms.reviewer |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Azure Active Directory Identity Protection playbook | Microsoft Docs |
Learn how Azure AD Identity Protection enables you to limit the ability of an attacker to exploit a compromised identity or device and to secure an identity or a device that was previously suspected or known to be compromised. |
active-directory |
azure active directory identity protection, cloud discovery, managing applications, security, risk, risk level, vulnerability, security policy |
MarkusVi |
mtillman |
60836abf-f0e9-459d-b344-8e06b8341d25 |
active-directory |
conditional-access |
identity |
na |
na |
article |
06/27/2018 |
markvi |
nigu |
This playbook helps you to:
- Populate data in the Identity Protection environment by simulating risk events and vulnerabilities
- Set up risk-based conditional access policies and test the impact of these policies
This section provides you with steps for simulating the following risk event types:
- Sign-ins from anonymous IP addresses (easy)
- Sign-ins from unfamiliar locations (moderate)
- Impossible travel to atypical locations (difficult)
Other risk events cannot be simulated in a secure manner.
For more information about this risk event, see Sign-ins from anonymous IP addresses.
Completing the following procedure requires you to use:
- The Tor Browser to simulate anonymous IP addresses. You might need to use a virtual machine if your organization restricts using the Tor browser.
- A test account that is not yet registered for multi-factor authentication.
To simulate a sign-in from an anonymous IP, perform the following steps:
- Using the Tor Browser, navigate to https://myapps.microsoft.com.
- Enter the credentials of the account you want to appear in the Sign-ins from anonymous IP addresses report.
The sign-in shows up on the Identity Protection dashboard within 10 - 15 minutes.
For more information about this risk event, see Sign-ins from unfamiliar locations.
To simulate unfamiliar locations, you have to sign in from a location and device your test account has not signed in from before.
The procedure below uses a newly created:
-
VPN connection, to simulate new location.
-
Virtual machine, to simulate a new device.
Completing the following procedure requires you to use a user account that has:
- At least a 30-day sign-in history.
- Multi-factor authentication enabled.
To simulate a sign-in from an unfamiliar location, perform the following steps:
- When signing in with your test account, fail the MFA challenge by not passing the MFA challenge.
- Using your new VPN, navigate to https://myapps.microsoft.com and enter the credentials of your test account.
The sign-in shows up on the Identity Protection dashboard within 10 - 15 minutes.
For more information about this risk event, see Impossible travel to atypical location.
Simulating the impossible travel condition is difficult because the algorithm uses machine learning to weed out false-positives such as impossible travel from familiar devices, or sign-ins from VPNs that are used by other users in the directory. Additionally, the algorithm requires a sign-in history of 14 days and 10 logins of the user before it begins generating risk events. Because of the complex machine learning models and above rules, there is a chance that the following steps will not lead to a risk event. You might want to replicate these steps for multiple Azure AD accounts to publish this risk event.
To simulate an impossible travel to atypical location, perform the following steps:
- Using your standard browser, navigate to https://myapps.microsoft.com.
- Enter the credentials of the account you want to generate an impossible travel risk event for.
- Change your user agent. You can change user agent in Internet Explorer from Developer Tools, or change your user agent in Firefox or Chrome using a user-agent switcher add-on.
- Change your IP address. You can change your IP address by using a VPN, a Tor add-on, or spinning up a new machine in Azure in a different data center.
- Sign-in to https://myapps.microsoft.com using the same credentials as before and within a few minutes after the previous sign-in.
The sign-in shows up in the Identity Protection dashboard within 2-4 hours.
Vulnerabilities are weaknesses in an Azure AD environment that can be exploited by a bad actor. Currently 3 types of vulnerabilities are surfaced in Azure AD Identity Protection that leverage other features of Azure AD. These Vulnerabilities will be displayed on the Identity Protection dashboard automatically once these features are set up.
- Azure AD Multi-Factor Authentication
- Azure AD Cloud Discovery.
- Azure AD Privileged Identity Management.
This section provides you with steps for testing the user risk and the sign-in risk security policy.
For more information, see How to configure the user risk policy.
To test a user risk security policy, perform the following steps:
-
Sign-in to https://portal.azure.com with global administrator credentials for your tenant.
-
Navigate to Identity Protection.
-
On the Azure AD Identity Protection page, click User risk policy.
-
In the Assignments section, select the desired users (and groups) and user risk level.
-
In the Controls section, select the desired Access control (e.g. Require password change).
-
As Enforce Policy, select Off.
-
Elevate the user risk of a test account by, for example, simulating one of the risk events a few times.
-
Wait a few minutes, and then verify that user level for your user is Medium. If not, simulate more risk events for the user.
-
As Enforce Policy, select On.
-
You can now test user risk-based conditional access by signing in using a user with an elevated risk level.
For more information, see How to configure the sign-in risk policy.
To test a sign in risk policy, perform the following steps:
-
Sign-in to https://portal.azure.com with global administrator credentials for your tenant.
-
Navigate to Azure AD Identity Protection.
-
On the main Azure AD Identity Protection page, click Sign-in risk policy.
-
In the Assignments section, select the desired users (and groups) and sign-in risk level.
-
In the Controls section, select the desired Access control (for example, Require multi-factor authentication).
-
As Enforce Policy, select On.
-
Click Save.
-
You can now test Sign-in Risk-based conditional access by signing in using a risky session (for example, by using the Tor browser).