Information
Entra ID tracks the behavior of sign-in events. If the Entra ID domain is licensed with P2, the sign-in behavior can be used as a detection mechanism for additional scrutiny during the sign-in event. If this policy is set up, then Risky Sign-in events will prompt users to use multi-factor authentication (MFA) tokens on login for additional verification.
Enabling multi-factor authentication is a recommended setting to limit the potential of accounts being compromised and limiting access to authenticated personnel. Enabling this policy allows Entra ID's risk-detection mechanisms to force additional scrutiny on the login event, providing a deterrent response to potentially malicious sign-in events, and adding an additional authentication layer as a reaction to potentially malicious behavior.
NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.
Solution
Remediate from Azure Portal
- From Azure Home select the Portal Menu in the top left and select Microsoft Entra ID
- Select Security
- Select Conditional Access
- Select Policies
- Click + New policy
- Enter a name for the policy.
- Click the blue text under Users
- Under Include select All users
- Under Exclude check Users and groups
- Select users this policy should not apply to and click Select
- Click the blue text under Target resources
- Select All cloud apps
- Click the blue text under Conditions
- Select Sign-in risk
- Update the Configure toggle to Yes
- Check the sign-in risk level this policy should apply to, e.g. High and Medium
- Select Done
- Click the blue text under Grant and check Require multifactor authentication then click the Select button.
- Click the blue text under Session then check Sign-in frequency and select Every time and click the Select button.
- Set Enable policy to Report-only
- Click Create
After testing the policy in report-only mode, update the Enable policy setting from Report-only to On
Impact:
Risk Policies for Conditional Access require Microsoft Entra ID P2. Additional overhead to support or maintain these policies may also be required if users lose access to their MFA tokens.