Conditional Access: User risk-based Conditional Access

Microsoft works with researchers, law enforcement, various security teams at Microsoft, and other trusted sources to find leaked username and password pairs. Organizations with Azure AD Premium P2 licenses can create Conditional Access policies incorporating Azure AD Identity Protection user risk detections.

There are two locations where this policy may be configured, Conditional Access and Identity Protection. Configuration using a Conditional Access policy is the preferred method providing more context including enhanced diagnostic data, report-only mode integration, Graph API support, and the ability to utilize other Conditional Access attributes in the policy.

Template deployment

Organizations can choose to deploy this policy using the steps outlined below or using the Conditional Access templates (Preview).

Enable with Conditional Access policy

  1. Sign in to the Azure portal as a global administrator, security administrator, or Conditional Access administrator.
  2. Browse to Azure Active Directory > Security > Conditional Access.
  3. Select New policy.
  4. Give your policy a name. We recommend that organizations create a meaningful standard for the names of their policies.
  5. Under Assignments, select Users and groups.
    1. Under Include, select All users.
    2. Under Exclude, select Users and groups and choose your organization's emergency access or break-glass accounts.
    3. Select Done.
  6. Under Cloud apps or actions > Include, select All cloud apps.
  7. Under Conditions > User risk, set Configure to Yes. Under Configure user risk levels needed for policy to be enforced select High, then select Done.
  8. Under Access controls > Grant, select Grant access, Require password change, and select Select.
  9. Confirm your settings and set Enable policy to Report-only.
  10. Select Create to create to enable your policy.

After confirming your settings using report-only mode, an administrator can move the Enable policy toggle from Report-only to On.

Enable through Identity Protection

  1. Sign in to the Azure portal.
  2. Select All services, then browse to Azure AD Identity Protection.
  3. Select User risk policy.
  4. Under Assignments, select Users.
    1. Under Include, select All users.
    2. Under Exclude, select Select excluded users, choose your organization's emergency access or break-glass accounts, and select Select.
    3. Select Done.
  5. Under Conditions, select User risk, then choose High.
    1. Select Select, then Done.
  6. Under Controls > Access, choose Allow access, and then select Require password change.
    1. Select Select.
  7. Set Enforce Policy to On.
  8. Select Save.

Next steps

Conditional Access common policies

Sign-in risk-based Conditional Access

Determine impact using Conditional Access report-only mode

Simulate sign in behavior using the Conditional Access What If tool

What is Azure Active Directory Identity Protection?