Quickstart: Block access when a session risk is detected with Azure Active Directory Identity Protection
To keep your environment protected, you might want to block suspicious users from signing in. Azure Active Directory (Azure AD) Identity Protection analyzes each sign-in and calculates the likelihood that a sign-in attempt was not performed by the legitimate owner of a user account. The likelihood (low, medium, high) is indicated in form of a calculated value called sign-in risk level. By setting the sign-in risk condition, you can configure a sign-in risk conditional access policy to respond to specific sign-in risk levels.
This quickstart shows how to configure a sign-in risk conditional access policy that blocks a sign-in when a medium and above sign-in risk level has been detected.
If you don't have an Azure subscription, create a free account before you begin.
To complete the scenario in this tutorial, you need:
Access to an Azure AD Premium P2 edition - Azure AD Identity Protection is an Azure AD Premium P2 feature.
Identity Protection - The scenario in this quickstart requires Identity Protection to be enabled. If you don't know how to enable Identity Protection, see Enabling Azure Active Directory Identity Protection.
Tor Browser - The Tor Browser is designed to help you preserve your privacy online. Identity Protection detects a sign-in from a Tor Browser as sign-ins from anonymous IP addresses, which has a medium risk level. For more information, see Azure Active Directory risk events.
A test account called Alain Charon - If you don't know how to create a test account, see Add a new user.
Test your sign-in
The goal of this step is to make sure that your test account can access your tenant using the Tor Browser.
To test your sign-in:
Sign in to your Azure portal as Alain Charon.
Create your conditional access policy
The scenario in this quickstart uses a sign-in from a Tor Browser to generate a detected Sign-ins from anonymous IP addresses risk event. The risk level of this risk event is medium. To respond to this risk event, you set the sign-in risk condition to medium.
This section shows how to create the required sign-in risk conditional access policy. In your policy, set:
|Conditions||Sign-in risk, Medium and above|
To configure your conditional access policy:
Sign in to your Azure portal as global administrator.
Go to the Azure AD Identity Protection page.
On the Azure AD Identity Protection page, in the Configure section, click Sign-in risk policy.
On the policy page, in the Assignments section, click Users.
On the Users page, click Select users.
On the Select users page, select Alain Charon, and then click Select.
On the Users page, click Done.
On the policy page, in the Assignments section, click Conditions.
On the Conditions page, click Sign-in risk.
On the Sign-in risk page, select Medium and above, and then click Select.
On the Conditions page, click Done.
On the policy page, in the Controls section, click Access.
On the Access page, click Allow access, select Require multi-factor authentication, and then click Select.
On the policy page, click Save.
Test your conditional access policy
To test your policy, try to sign-in to your Azure portal as Alan Charon using the Tor Browser. Your sign-in attempt should be blocked by your conditional access policy.
Clean up resources
When no longer needed, delete the test user, the Tor Browser and disable the sign-in risk conditional access policy:
Send feedback about: