How to check risky sign-ins in Azure AD?
+
As a security admin, it is important to monitor Azure risky sign-ins to prevent unauthorized access and potential compromise of user accounts. Identifying and responding to suspicious activities allows you to take proactive measures to secure user accounts in the future.
Follow the below to get a risky sign-ins report that helps you to detect and remediate risky sign-ins.
- Using Microsoft Entra Admin Center Navigate to the Risky activities tab under Identity»Protection. Select the Risky sign-ins tab under the Report section to view the risky sign-ins of your Microsoft 365 environment.
- Microsoft PowerShell Run the below cmdlet in MS Graph PowerShell to find the high-risk users in Azure AD.
Get-MgRiskyUser -Filter "RiskLevel eq 'high'" | Format-Table UserDisplayName, RiskDetail, RiskLevel, RiskLastUpdatedDateTime
Unfortunately, it is not possible to view the sign-in details of these risky users using PowerShell cmdlets. Although the Microsoft Entra admin center offers comprehensive details on risky sign-ins, it lacks a dedicated report for sign-ins that are at risk.
Using AdminDroid, you can find open risky sign-ins in your Microsoft 365 environment and decide to mark them as compromised or safe.
- Here, you can get entire details on the risky sign-ins report such as signed-in user, risk detected time, risk level, risk event type, etc.
- Click on the "Create alert for this report now" icon to create an alert policy to get notified about the risky sign-ins in your organization.
Pro Tip: Configure the "Threshold" property while creating the alert policy. This will trigger notifications if the specified number of risky sign-ins take place within the defined timeframe.