Conditional Access: User risk-based Conditional Access

Microsoft works with researchers, law enforcement, various security teams at Microsoft, and other trusted sources to find leaked username and password pairs. Organizations with Azure AD Premium P2 licenses can create Conditional Access policies incorporating Azure AD Identity Protection user risk detections.

There are two locations where this policy may be assigned. Organizations should choose one of the following options to enable a user risk-based Conditional Access policy requiring a secure password change.

Enable with Conditional Access policy

  1. Sign in to the Azure portal as a global administrator, security administrator, or Conditional Access administrator.
  2. Browse to Azure Active Directory > Security > Conditional Access.
  3. Select New policy.
  4. Give your policy a name. We recommend that organizations create a meaningful standard for the names of their policies. For more info, set naming standards for your policies.
  5. Under Assignments, select Users and groups.
    1. Under Include, select All users.
    2. Under Exclude, select Users and groups and choose your organization's emergency access or break-glass accounts.
    3. Select Done.
  6. Under Cloud apps or actions > Include, select All cloud apps.
  7. Under Conditions > User risk, set Configure to Yes. Under Configure user risk levels needed for policy to be enforced select High, then select Done.
  8. Under Access controls > Grant, select Grant access, Require password change, and select Select.
  9. Confirm your settings, and set Enable policy to On.
  10. Select Create to create to enable your policy.

Enable through Identity Protection

  1. Sign in to the Azure portal.
  2. Select All services, then browse to Azure AD Identity Protection.
  3. Select User risk policy.
  4. Under Assignments, select Users.
    1. Under Include, select All users.
    2. Under Exclude, select Select excluded users, choose your organization's emergency access or break-glass accounts, and select Select.
    3. Select Done.
  5. Under Conditions, select User risk, then choose High.
    1. Select Select, then Done.
  6. Under Controls > Access, choose Allow access, and then select Require password change.
    1. Select Select.
  7. Set Enforce Policy to On.
  8. Select Save.

Next steps

Conditional Access common policies

risk-based Conditional Access

Determine impact using Conditional Access report-only mode

Simulate sign in behavior using the Conditional Access What If tool

What is Azure Active Directory Identity Protection?