First published on CloudBlogs on Jun, 02 2016
Howdy folks, Azure AD Identity Protection has been generating a TON of customer interest, especially with recent news about hackers selling huge lists of leaked user credentials. So today I'm excited to let you know that Azure AD Identity Protection has just turned on support for federated identities. This means that our largest customers, most of who use Active Directory Federation Server with Azure AD, can now get the benefit of this powerful security service. To give you a quick walk through of how to get this set up and working, I've asked Salah Ahmed one of the PMs in our Identity Security and Protection team to write up a blog post. You'll find it below. I hope you'll try out it today. Azure AD Identity Protection is undoubtedly the fastest and easiest way available to substantially improve your company's security posture. If your company is using Azure AD, you'd have to be crazy to not give it a try! And as always, we'd love to receive any feedback or suggestions you have. Best Regards, Alex Simons (Twitter: @Alex_A_Simons ) Director of Program Management Microsoft Identity Division ------------------------------- Hi all! My name is Salah Ahmed and I am a Program Manager in the Identity Security and Protection team in Microsoft's Identity Division. Today we are pleased to announce an update to the public preview of Azure Active Directory Identity Protection that extends risk-based conditional access to federated identities. For the benefit of those who missed the original public preview announcement , you can think of Identity Protection as a gatekeeper to the cloud, analyzing and securing sign-ins to all of the applications Azure AD manages, including Office 365 and Azure, third-party applications like ServiceNow, Salesforce.com, Google Apps, and DropBox, and on-premises apps connected using the Azure AD App Proxy.
Howdy folks, Azure AD Identity Protection has been generating a TON of customer interest, especially with recent news about hackers selling huge lists of leaked user credentials. So today I'm excited to let you know that Azure AD Identity Protection has just turned on support for federated identities. This means that our largest customers, most of who use Active Directory Federation Server with Azure AD, can now get the benefit of this powerful security service. To give you a quick walk through of how to get this set up and working, I've asked Salah Ahmed one of the PMs in our Identity Security and Protection team to write up a blog post. You'll find it below. I hope you'll try out it today. Azure AD Identity Protection is undoubtedly the fastest and easiest way available to substantially improve your company's security posture. If your company is using Azure AD, you'd have to be crazy to not give it a try! And as always, we'd love to receive any feedback or suggestions you have. Best Regards, Alex Simons (Twitter: @Alex_A_Simons ) Director of Program Management Microsoft Identity Division ------------------------------- Hi all! My name is Salah Ahmed and I am a Program Manager in the Identity Security and Protection team in Microsoft's Identity Division. Today we are pleased to announce an update to the public preview of Azure Active Directory Identity Protection that extends risk-based conditional access to federated identities. For the benefit of those who missed the original public preview announcement , you can think of Identity Protection as a gatekeeper to the cloud, analyzing and securing sign-ins to all of the applications Azure AD manages, including Office 365 and Azure, third-party applications like ServiceNow, Salesforce.com, Google Apps, and DropBox, and on-premises apps connected using the Azure AD App Proxy.
Detection
Identity Protection detects risk events involving identities in an Azure Active Directory that indicate that the identities may have been compromised. For details on risk detection, see Types of risk events detected by Azure Active Directory Identity Protection .
Risk based Conditional Access
Identity Protection allows admins to respond to risky sign-ins by- Enforcing multi factor authentication (MFA)
- Blocking them completely
Set-MsolDomainFederationSettings -DomainName contoso.com -SupportsMFA $true
In addition to setting this flag, the federated tenant AD FS instance must be configured to perform multi-factor authentication. You can revisit the instructions for deploying Azure Multi-Factor Authentication on-premises . Note: Only Sign-in risk policy is included in this announcement. User risk policy is currently not supported for federated domains. It is coming soon though!Try it out!
So what are you waiting for? Identity Protection's capabilities are a must-have in today's world of persistent bad actors and frequent security breaches. Setting up Identity Protection takes less than a minute ! You need an Azure AD Premium license to try out the full capabilities in this public preview. If you would like to see Identity Protection's detection capabilities in action and would like to test its detection, mitigation and remediation capabilities, check out our Playbook for step-by-step instructions. I hope you'll find this new capability useful! Regards, Salah Ahmed Program Manager Microsoft Identity DivisionPublished Sep 07, 2018
Version 1.0Alex Simons (AZURE)
Microsoft
Joined May 01, 2017
Microsoft Entra Blog
Stay informed on how to secure access for employees, customers, and non-human identities, from anywhere, to multicloud and on-premises resources, with comprehensive identity and network access solutions powered by AI.