Search icon
Arrow left icon
All Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Newsletters
Free Learning
Arrow right icon
Microsoft Identity and Access Administrator Exam Guide

You're reading from  Microsoft Identity and Access Administrator Exam Guide

Product type Book
Published in Mar 2022
Publisher Packt
ISBN-13 9781801818049
Pages 452 pages
Edition 1st Edition
Languages
Author (1):
Dwayne Natwick Dwayne Natwick
Profile icon Dwayne Natwick

Table of Contents (24) Chapters

Preface Section 1 – Exam Overview and the Evolution of Identity and Access Management
Chapter 1: Preparing for Your Microsoft Exam Chapter 2: Defining Identity and Access Management Section 2 - Implementing an Identity Management Solution
Chapter 3: Implementing and Configuring Azure Active Directory Chapter 4: Creating, Configuring, and Managing Identities Chapter 5: Implementing and Managing External Identities and Guests Chapter 6: Implementing and Managing Hybrid Identities Section 3 – Implementing an Authentication and Access Management Solution
Chapter 7: Planning and Implementing Azure Multi-Factor Authentication (MFA) and Self-Service Password Reset (SSPR) Chapter 8: Planning and Managing Password-Less Authentication Methods Chapter 9: Planning, Implementing, and Administering Conditional Access and Azure Identity Protection Section 4 – Implementing Access Management for Applications
Chapter 10: Planning and Implementing Enterprise Apps for Single Sign-On (SSO) Chapter 11: Monitoring Enterprise Apps with Microsoft Defender for Cloud Apps Section 5 – Planning and Implementing an Identity Governance Strategy
Chapter 12: Planning and Implementing Entitlement Management Chapter 13: Planning and Implementing Privileged Access and Access Reviews Section 6 – Monitoring and Maintaining Azure Active Directory
Chapter 14: Analyzing and Investigating Sign-in Logs and Elevated Risk Users Chapter 15: Enabling and Integrating Azure AD Logs with SIEM Solutions Chapter 16: Mock Test Other Books You May Enjoy

Chapter 9: Planning, Implementing, and Administering Conditional Access and Azure Identity Protection

The previous chapter covered how to take modern authentication a step further by discussing how we can utilize passwordless authentication methods. This chapter will cover Conditional Access policies. This will include planning for and testing these policies to verify that they are working correctly and providing the proper controls. In addition, we will discuss Azure Active Directory (AD) Identity Protection and using sign-in and user risk conditions with policies.

In this chapter, we're going to cover the following main topics:

  • Planning and implementing Conditional Access policies and controls
  • Configuring Smart Lockout thresholds
  • Implementing and managing a user risk policy
  • Monitoring, investigating, and remediating elevated risky users

Technical requirements

In this chapter, we will continue to explore configuring a tenant for use of Microsoft 365 and Azure. There will be exercises that will require access to Azure AD. If you have not yet created trial licenses for Microsoft 365, please follow the directions provided within Chapter 1, Preparing for Your Microsoft Exam.

Planning and implementing Conditional Access policies and controls

Up to this point, the focus has been on planning, configuration, and implementation of the identities within Azure AD and hybrid identity infrastructures. We have discussed how to use multi-factor authentication (MFA) to decrease the amount we rely on passwords as a source of authentication. In this chapter, we discuss advanced capabilities to protect our identities and resources. The first of these solutions is the use of Conditional Access policies. Conditional Access policies enforce additional verification actions based on a signal that a user or device may be potentially compromised. The foundation of Conditional Access policies is the zero-trust methodology. So, before we discuss planning and implementing Conditional Access, let's discuss the main points of zero trust.

Zero-trust methodology

As we have moved as companies to using cloud providers such as Microsoft, the responsibility for securing the...

Configuring Smart Lockout thresholds

In the previous sections, we went through the process of creating Conditional Access policies to protect against unauthorized users accessing applications and data while enforcing the zero-trust model for IAM. This section discusses how you can configure Smart Lockout to assist in preventing identity attacks.

Smart Lockout is a part of Azure AD Password Protection. The following screenshot shows how you can search and access this feature:

Figure 9.48 – Searching for Smart Lockout

Smart Lockout is used to protect users in a company from having their identity compromised through a brute-force dictionary attack. These attacks are executed by using the known username, which is generally an email address, and then automating login attempts with commonly used passwords. These attempts generally happen multiple times per minute in order to find a successful attempt. Smart Lockout is a way to configure the threshold of...

Implementing and managing a user risk policy

In order to implement and manage a user risk policy, your company requires an Azure Active Directory Premium P2 license. This license provides the advanced identity security feature of Azure AD Identity Protection.

Azure AD Identity Protection

Azure AD Identity Protection provides additional capabilities within Azure AD to monitor user activity and recognize, through Microsoft's machine learning (ML) capabilities, anomalous and suspicious activity on user accounts. The following screenshot shows how to search for and access Azure AD Identity Protection within the Azure portal:

Figure 9.50 – Searching for Azure AD Identity Protection

Azure AD Identity Protection provides feedback in two areas: user risk and sign-in risk. Both are related to user behavior, but it is important to understand the differences between them, which are outlined as follows:

  • User risk is concerned with activities...

Monitoring, investigating, and remediating elevated risky users

If you are utilizing resources that are touching the internet, then someone is scanning them and attempting to gain access to them. There is an abundance of bad actors that have automated tools to scan usernames and attempt to authenticate with common passwords. Azure AD Identity Protection utilizes the Microsoft Threat Intelligence database and ML tools to look for these threats, identify the users affected, and identify the type of threat that exists. This information feeds into the Identity Protection overview dashboard shown in the following screenshot:

Figure 9.52 – Identity Protection overview

The Report section of the Identity Protection menu provides additional information on users who are at risk and what their risk level is, and allows you to drill down and investigate potential attacks that may have taken place on those user accounts. The following screenshot shows how you can...

Summary

In this chapter, we discussed advanced solutions to protect identity and enforce the zero-trust model with Conditional Access policies and Azure Identity Protection. We went through the process of creating Conditional Access policies and then tested scenarios of how they would be applied with the What If function. We discussed how to configure Smart Lockout within Password Protection to protect against password brute-force dictionary attacks. Finally, we discussed how to license and use Identity Protection to identify and protect against user-credential leaks and risky sign-ins. In the next chapter, we will discuss the implementation of single sign-on (SSO) for enterprise applications in our hybrid infrastructure.

lock icon The rest of the chapter is locked
You have been reading a chapter from
Microsoft Identity and Access Administrator Exam Guide
Published in: Mar 2022 Publisher: Packt ISBN-13: 9781801818049
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $15.99/month. Cancel anytime}