Azure Identity Protection - Clarity about the report options

%3CLINGO-SUB%20id%3D%22lingo-sub-1993350%22%20slang%3D%22en-US%22%3EAzure%20Identity%20Protection%20-%20Clarity%20about%20the%20report%20options%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1993350%22%20slang%3D%22en-US%22%3E%3CP%3EHi%20everyone%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3ECurrently%2C%20I%20am%20trying%20to%20better%20understand%20Azure%20AD%20Identity%20Protection.%20To%20be%20honest%2C%20despite%20the%20documentation%20it%20is%20still%20not%20totally%20clear%20for%20me%20what%20is%20the%20difference%20between%20the%20%22Risk%20detections%22%20and%20the%20risky%20users%20and%20risky%20sign-igns%20within%20the%20Report%20blade.%20I%20thought%20that%20risk%20detection%20is%20a%20kind%20of%20summary%20of%20risky%20users%20and%20risky%20sign-ins.%20This%20opinion%20I%20had%20after%20I%20saw%20that%20a%20filter%20%22Activity%22%20is%20available%20that%20can%20filter%20by%20%22users%22%20and%20%22Sign-ins%22%20-%20but%20in%20that%20case%20all%20the%20detections%20disappear.%20That%20is%20why%20i%20was%20confused%20about%20the%20relationship%20between%20them.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EA%20second%20thing%20that%20is%20not%20clear%20is%20if%20I%20really%20understood%20the%20concept%20of%20risky%20users%20%26amp%3B%20Risky%20sign-ins%3A%20Risky%20users%20are%20calculated%20as%20a%20consequence%20of%20detected%20sign-in%20risks%3F%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EThe%20last%20thing%20is%3A%20When%20i%20get%20a%20%22unfamiliar%20sign-in%20properties%22%20risk%2C%20where%20I%20can%20see%20what%20actually%20was%20the%20reason%20to%20alert%20resp.%20what%20was%20the%20risk%20parameter%20the%20algorithm%20detected%20as%20unfamiliar%3F%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EThank%20you%20in%20advance%2C%3CBR%20%2F%3ECheers%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-LABS%20id%3D%22lingo-labs-1993350%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EAzure%20AD%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EIdentity%20Management%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EIdentity%20Protection%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1995816%22%20slang%3D%22en-US%22%3ERe%3A%20Azure%20Identity%20Protection%20-%20Clarity%20about%20the%20report%20options%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1995816%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F748777%22%20target%3D%22_blank%22%3E%40GlavniArhivator%3C%2FA%3E%26nbsp%3B%3CBR%20%2F%3EI%20would%20suggest%20you%20to%20have%20a%20look%20on%20the%20ignite%20session%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fmyignite.microsoft.com%2Fsessions%2F2c1d5ca9-3e73-4107-af81-02ea5bb8d734%22%20target%3D%22_self%22%20rel%3D%22noopener%20noreferrer%22%3EThe%20science%20behind%20Azure%20Active%20Directory%20Identity%20Protection%3C%2FA%3E%3CBR%20%2F%3EThis%20will%20answers%20a%20couple%20of%20questions%20that%20might%20not%20be%20included%20in%20the%20documentation%20for%20Identity%20Protection.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1996558%22%20slang%3D%22en-US%22%3ERe%3A%20Azure%20Identity%20Protection%20-%20Clarity%20about%20the%20report%20options%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1996558%22%20slang%3D%22en-US%22%3E%3CP%3EHi%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F97603%22%20target%3D%22_blank%22%3E%40Pontus%20Sj%C3%A4lander%3C%2FA%3E%26nbsp%3B%C2%A8%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EUnfortunatley%2C%20it%20does%20not%20answer%20my%20questions.%20Can%20anyone%20give%20some%20more%20hints%3F%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EThanks%3C%2FP%3E%3C%2FLINGO-BODY%3E
Occasional Contributor

Hi everyone

 

Currently, I am trying to better understand Azure AD Identity Protection. To be honest, despite the documentation it is still not totally clear for me what is the difference between the "Risk detections" and the risky users and risky sign-igns within the Report blade. I thought that risk detection is a kind of summary of risky users and risky sign-ins. This opinion I had after I saw that a filter "Activity" is available that can filter by "users" and "Sign-ins" - but in that case all the detections disappear. That is why i was confused about the relationship between them.

 

A second thing that is not clear is if I really understood the concept of risky users & Risky sign-ins: Risky users are calculated as a consequence of detected sign-in risks? 

 

The last thing is: When i get a "unfamiliar sign-in properties" risk, where I can see what actually was the reason to alert resp. what was the risk parameter the algorithm detected as unfamiliar?

 

Thank you in advance,
Cheers

3 Replies

@GlavniArhivator 
I would suggest you to have a look on the ignite session The science behind Azure Active Directory Identity Protection
This will answers a couple of questions that might not be included in the documentation for Identity Protection.

Hi @Pontus Själander ¨

 

Unfortunatley, it does not answer my questions. Can anyone give some more hints?

 

Thanks

A risk detection is when a user does something risky. Like logging in from a 'Malware Linked IP'. The moment the user logs in from a malware linked IP, this will be a risky sign-in. The reason for this risky sign-in will be the risk detection will be 'Malware linked IP'.
A sign-in can have a score (low/medium/high), but a user can also have risk score. These are calculated from the multiple risky signins (simply put 2 low sign-ins create a medium risky user). A admin can also confirm a user as confirmed, then the user risk is also increased.

For the unfamiliar sign-ins: Microsoft does not publish why the alert is exactly triggered. Most of the time this is because of a new IP or new device. So these are the two things I look into.