Part 39 – AAD Identity Protection & Access Review

Loading

Azure AD Identity Protection is part of AAD and it helps us to understand and remediate identity-based risks associated with a user sign-in process. This service understands the usage pattern of a user’s login on a daily basis such as the IP Details, the device he chooses to log in, and location and suggests to admins the course of action to take when an odd behaviour is spotted.

Azure review is part of Azure governance and it helps us to periodically validate user’s access that are part of an administrative unit or group when the user’s role has changed in an organization.

Licensing Requirements for Identity Protection

We will need an Azure AD P2 license to configure Identity Protection

Risks Associated with AAD

There are two risks AD Identity tries to address

  • User-Risks – That can be fixed with a password change.
  • Sign-in Leaks – That can be fixed with an MFA enabled.

Permissions Associated with AAD

Global AdminFull access to identity protection
Security Adminsame as above but can’t reset the user’s password
Security OperatorCan view Identity protection reports and take action on user risks
Security Readera monitoring account

Under the Azure portal, search for Azure AD Identity Protection

User risk policy is based on leaked user credentials

User risk policy is based on leaked user credentials so we will choose default risk control as “Low and Above”

If the policy gets enforced, let’s ensure the user changes their password on login.

Sign-risk policy, as this is based on sign-leak it will enforce MFA

Finally, verify if the MFA registration policy is enabled.

This will ensure sign-in and user-related risks are captured successfully.

Performing Access Reviews of AD Groups and Users

Access reviews are useful when a user leaves a department and moves on to a new role wherein he no longers needs the super admin elevated permissions.

In this short demo, the following members are part of my law school admins group and we will attempt to one member from this group who has recently left the department.

We will need an Azure AD P2 license to configure Acces reviews so we will assign this to an administrator user poweradm

Under the Azure portal, search for Identity Governance

Select Acess Reviews > Create New Access Review

Select the group we created

Under the reviewers tab, we will now select the poweradm user that has the Azure P2 license

Click on Review and Create.

Give the review a name as Law-School-Admins

Our access review is now ready.

Under the Identity Governance, we can see the status of our access review.

Login to https://myacccess.microsoft.com as poweradm user and we can see review waiting under Acces reviews

Our entire list of users is listed so we will pick the user that needs to be kept in the group and revoke access to users who no longer need to be part of the group.

We will revoke access to “testuser100” as shown by clicking the Deny button.

All other users are valid admins so we will just click on Approve button.

Finally back in the governance, we can see the current status.

Under Access review settings, we will now auto-apply results to resources to ensure the denied users are removed automatically

The access review policy is applied

Our testuser102 user is finally removed from our Groups.

The results pane will show the status of the removal.

Azure AD password protection

Another useful feature we can turn on that will prevent users from using common passwords out there.

(Visited 28 times, 1 visits today)

By Ash Thomas

Ash Thomas is a seasoned IT professional with extensive experience as a technical expert, complemented by a keen interest in blockchain technology.