Edit

Share via


What is Microsoft Entra ID Protection?

Microsoft Entra ID Protection helps organizations detect, investigate, and remediate identity-based risks. These risks can be fed into tools like Conditional Access to make access decisions or sent to a security information and event management (SIEM) tool for further investigation and correlation.

Diagram showing how ID Protection works at a high level.

Detect risks

Microsoft continually adds and updates detections in our catalog to protect organizations. These detections come from our learnings based on the analysis of trillions of signals each day from Active Directory, Microsoft Accounts, and in gaming with Xbox. This broad range of signals helps ID Protection detect risky behaviors like:

  • Anonymous IP address usage
  • Password spray attacks
  • Leaked credentials
  • and more...

During each sign-in, ID Protection runs all real-time sign-in detections, generating a sign-in session risk level that indicates how likely the sign-in is compromised. Based on this risk level, policies are applied to protect the user and the organization.

For a full listing of risks and how they're detected, see the article What is risk.

Investigate

Any risks detected on an identity are tracked with reporting. ID Protection provides three key reports for administrators to investigate risks and take action:

  • Risk detections: Each risk detected is reported as a risk detection.
  • Risky sign-ins: A risky sign-in is reported when there are one or more risk detections reported for that sign-in.
  • Risky users: A Risky user is reported when either or both of the following are true:
    • The user has one or more Risky sign-ins.
    • One or more risk detections are reported.

For more information about how to use the reports, see the article How To: Investigate risk.

Remediate risks

Automation is critical in security because the scale of signals and attacks requires automation to keep up.

The Microsoft Digital Defense Report 2024 provides the following statistics:

78 trillion security signals analyzed per day, an increase of 13 trillion from the previous year

600 million attacks on Microsoft customers per day

2.75x increase year over year in human-operated ransomware attacks

These statistics continue to trend upwards, with no sign of slowing down. In this environment, automation is the key to identifying and remediating risk so IT organizations can focus on the right priorities.

Automatic remediation

Risk-based Conditional Access policies can be enabled to require access controls such as providing a strong authentication method, perform multifactor authentication, or perform a secure password reset based on the detected risk level. If the user successfully completes the access control, the risk is automatically remediated.

Manual remediation

When user remediation isn't enabled, an admin must manually review them in the reports in the portal, through the API, or in Microsoft Defender XDR. Admins can perform manual actions to dismiss, confirm safe, or confirm compromise on the risks.

Making use of the data

Data from ID Protection can be exported to other tools for archive, further investigation, and correlation. The Microsoft Graph based APIs allow organizations to collect this data for further processing in a tool such as their SIEM. Information about how to access the ID Protection API can be found in the article, Get started with Microsoft Entra ID Protection and Microsoft Graph

Information about integrating ID Protection information with Microsoft Sentinel can be found in the article, Connect data from Microsoft Entra ID Protection.

Organizations might store data for longer periods by changing the diagnostic settings in Microsoft Entra ID. They can choose to send data to a Log Analytics workspace, archive data to a storage account, stream data to Event Hubs, or send data to another solution. Detailed information about how to do so can be found in the article, How To: Export risk data.

Required roles

ID Protection requires users to be assigned one or more of the following roles.

Role Can do Can't do
Global Reader Read-only access to ID Protection Write access to ID Protection
User Administrator Reset user passwords Read or write to ID Protection
Conditional Access Administrator Create policies that factor in user or sign-in risk as a condition Read or write to legacy ID Protection policies
Security Reader View all ID Protection reports and Overview Configure or change policies

Reset password for a user

Configure alerts

Give feedback on detections
Security Operator View all ID Protection reports and Overview

Dismiss user risk, confirm safe sign-in, confirm compromise
Configure or change policies

Reset password for a user

Configure alerts
Security Administrator Full access to ID Protection Reset password for a user

License requirements

Using this feature requires Microsoft Entra ID P2 licenses. To find the right license for your requirements, see Microsoft Entra plans and pricing. The following table describes the key capabilities of Microsoft Entra ID Protection and the licensing requirements for each capability. Refer to the Microsoft Entra plans and pricing page for pricing details.

Capability Details Microsoft Entra ID Free / Microsoft 365 Apps Microsoft Entra ID P1 Microsoft Entra ID P2 / Microsoft Entra Suite
Risk policies Sign-in and user risk policies (via ID Protection or Conditional Access) No No Yes
Security reports Overview No No Yes
Security reports Risky users Limited Information. Only users with medium and high risk are shown. No details drawer or risk history. Limited Information. Only users with medium and high risk are shown. No details drawer or risk history. Full access
Security reports Risky sign-ins Limited Information. No risk detail or risk level is shown. Limited Information. No risk detail or risk level is shown. Full access
Security reports Risk detections No Limited Information. No details drawer. Full access
Notifications Users at risk detected alerts No No Yes
Notifications Weekly digest No No Yes
MFA registration policy Require MFA (via Conditional Access) No No Yes
Microsoft Graph All risk reports No No Yes

To view the Risky workload identities report and the Workload identity detections tab in the Risk detections report, you need Workload Identities Premium licensing. For more information, see Securing workload identities.

Microsoft Defender

Microsoft Entra ID Protection receives signals from Microsoft Defender products for several risk detections, so you also need the appropriate license for the Microsoft Defender product that owns the signal you're interested in.

Microsoft 365 E5 covers all of the following signals:

  • Microsoft Defender for Cloud Apps

    • Activity from anonymous IP address
    • Impossible travel
    • Mass access to sensitive files
    • New country
  • Microsoft Defender for Office 365

    • Suspicious inbox rules
  • Microsoft Defender for Endpoint

    • Possible attempt to access Primary Refresh Token

Next steps