Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

There is nothing here that connects risk events with the risk level #63555

Closed
D-Moonesinghe opened this issue Sep 30, 2020 · 13 comments
Closed

Comments

@D-Moonesinghe
Copy link

How do we figure out the risk event and the risk level. I couldn't find a link in this document to any list like that.

Only thing I found is in this blog post here: https://www.rebeladmin.com/2018/09/step-step-guide-configure-risk-based-azure-conditional-access-policies/. But how can I trust that?

image

[Enter feedback here]


Document Details

Do not edit this section. It is required for docs.microsoft.com ➟ GitHub issue linking.

@JamesTran-MSFT
Copy link
Contributor

@D-Moonesinghe
Thanks for your feedback! We will investigate and update as appropriate.

@JamesTran-MSFT
Copy link
Contributor

@D-Moonesinghe
Here's a list of different Risk types and detection

When it comes to figuring out risk levels/events, Microsoft does not provide specific details about how risk is calculated, we will say that each level brings higher confidence that the user or sign-in is compromised.
FAQ - Risk levels

@D-Moonesinghe
Copy link
Author

D-Moonesinghe commented Sep 30, 2020 via email

@JamesTran-MSFT
Copy link
Contributor

@D-Moonesinghe
Thanks for the quick follow up! I'll reach out to my team regarding this issue.

@JamesTran-MSFT
Copy link
Contributor

@D-Moonesinghe
Thanks for following up on this and providing the extra details!

I reached out to my team and we weren't able to find the table as seen here. However, we did see something similar under the portal within Identity Protection/Risk detections:
image

I'll assign this issue to the author to investigate and update as needed.

Thank you again for pointing this out and for your time!

@MicrosoftGuyJFlo
Copy link
Contributor

@D-Moonesinghe The calculations have changed since that blog post was written.

As I mention in the article we don't disclose the exact calculation methods. The higher the risk the more confident we are in the signal providing the risk information.

This statement went back and forth through the product group multiple times before we published. If you would like to open product feedback for them to add more clarity please open a product feedback item at the bottom of the document.

@MicrosoftGuyJFlo
Copy link
Contributor

#please-close

@D-Moonesinghe
Copy link
Author

D-Moonesinghe commented Oct 1, 2020 via email

@MicrosoftGuyJFlo
Copy link
Contributor

MicrosoftGuyJFlo commented Oct 2, 2020

@D-Moonesinghe I did read the article you mentioned. As I said the way we make calculations has changed.

We don't have a list of each detection and what level that detection sits at because they are all high, medium, and low depending on the confidence in the signal its accuracy.

If I had a chart it would be all the risks on one side and they would all say high, medium, and low on the other. Just because you trigger one detection doesn't always mean it is mapped directly to high, medium, or low.

As you review and investigate risks in your organization the reports do provide you risk levels for each user and all triggered detections.

If you would like to have a further technical conversation I am happy to do so and my email address is published in my profile. Otherwise I will consider this issue closed and resolved as is.

@D-Moonesinghe
Copy link
Author

D-Moonesinghe commented Oct 3, 2020 via email

@azsec
Copy link

azsec commented May 11, 2021

Static-based risk calculation in the world of security is no longer valid. You couldn't just say the risk level of login from unfamiliar location is lower than leaked credential to be honest even we know credential leakage sounds very dangerous. Well just imagine an administrator (global admin) is found logged in from an unfamiliar location versus a normal user (with less privilege/read-only permission) is compromised? I don't think we could just still base on the risk level that was defined in the past.

That is why Microsoft removed the table of Risk level and stated as follows (ref)

While Microsoft does not provide specific details about how risk is calculated, we will say that each level brings higher confidence that the user or sign-in is compromised. For example, something like one instance of unfamiliar sign-in properties for a user might not be as threatening as leaked credentials for another user.

Az-500 exam still has a question related to risk level. This should be removed out of question bank IMO.

Updated: if you still see such a question and would like to learn by heard from Microsoft check the image below

https://docs.microsoft.com/en-us/azure/active-directory/reports-monitoring/media/concept-risk-events/91.png

@D-Moonesinghe
Copy link
Author

D-Moonesinghe commented May 12, 2021 via email

@D-Moonesinghe
Copy link
Author

D-Moonesinghe commented May 12, 2021 via email

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

6 participants