Skip to content

Commit 1c3185b

Browse files
Merge pull request #12264 from MicrosoftDocs/main
Auto Publish – main to live - 2026-03-26 05:00 UTC
2 parents 4de39b4 + 51f5ca3 commit 1c3185b

28 files changed

+337
-65
lines changed

docs/fundamentals/configure-security.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -61,7 +61,9 @@ Reduce credential-related risk by implementing modern identity standards.
6161
| [Use cloud authentication](zero-trust-protect-identities.md#use-cloud-authentication) | Microsoft Entra ID P1 |
6262
| [All users are required to register for MFA](zero-trust-protect-identities.md#all-users-are-required-to-register-for-mfa) | Microsoft Entra ID P2 |
6363
| [Users have strong authentication methods configured](zero-trust-protect-identities.md#users-have-strong-authentication-methods-configured) | Microsoft Entra ID P1 |
64+
| [Reduce the user-visible password surface area](zero-trust-protect-identities.md#reduce-the-user-visible-password-surface-area) | Microsoft Entra ID P1 |
6465
| [User sign-in activity uses token protection](zero-trust-protect-identities.md#user-sign-in-activity-uses-token-protection) | Microsoft Entra ID P1 |
66+
| [Token protection policies are configured](zero-trust-protect-identities.md#token-protection-policies-are-configured) | Microsoft Entra ID P1 |
6567
| [All user sign-in activity uses phishing-resistant authentication methods](zero-trust-protect-identities.md#all-user-sign-in-activity-uses-phishing-resistant-authentication-methods) | Microsoft Entra ID P1 |
6668
| [All sign-in activity comes from managed devices](zero-trust-protect-identities.md#all-sign-in-activity-comes-from-managed-devices) | Microsoft Entra ID P1 |
6769
| [Security key authentication method enabled](zero-trust-protect-identities.md#security-key-authentication-method-enabled) | None (included with Microsoft Entra ID) |
@@ -75,6 +77,7 @@ Reduce credential-related risk by implementing modern identity standards.
7577
| [Require multifactor authentication for device join and device registration using user action](zero-trust-protect-identities.md#require-multifactor-authentication-for-device-join-and-device-registration-using-user-action) | Microsoft Entra ID P1 |
7678
| [Local Admin Password Solution is deployed](zero-trust-protect-identities.md#local-admin-password-solution-is-deployed) | Microsoft Entra ID P1 |
7779
| [Entra Connect Sync is configured with Service Principal Credentials](zero-trust-protect-identities.md#entra-connect-sync-is-configured-with-service-principal-credentials) | None (included with Microsoft Entra ID) |
80+
| [Directory sync account is locked down to specific named location](zero-trust-protect-identities.md#directory-sync-account-is-locked-down-to-specific-named-location) | Microsoft Entra ID P1 |
7881
| [No usage of ADAL in the tenant](zero-trust-protect-identities.md#no-usage-of-adal-in-the-tenant) | None (included with Microsoft Entra ID) |
7982
| [Block legacy Azure AD PowerShell module](zero-trust-protect-identities.md#block-legacy-azure-ad-powershell-module) | None (included with Microsoft Entra ID) |
8083
| [Enable Microsoft Entra ID security defaults for free tenants](zero-trust-protect-identities.md#enable-microsoft-entra-id-security-defaults-for-free-tenants) | None (included with Microsoft Entra ID) |

docs/fundamentals/zero-trust-protect-identities.md

Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -119,9 +119,15 @@ The recommendations and Zero Trust checks that are part of this pillar help redu
119119
### Users have strong authentication methods configured
120120
[!INCLUDE [21801](../includes/secure-recommendations/21801.md)]
121121

122+
### Reduce the user-visible password surface area
123+
[!INCLUDE [21889](../includes/secure-recommendations/21889.md)]
124+
122125
### User sign-in activity uses token protection
123126
[!INCLUDE [21786](../includes/secure-recommendations/21786.md)]
124127

128+
### Token protection policies are configured
129+
[!INCLUDE [21941](../includes/secure-recommendations/21941.md)]
130+
125131
### All user sign-in activity uses phishing-resistant authentication methods
126132
[!INCLUDE [21784](../includes/secure-recommendations/21784.md)]
127133

@@ -167,6 +173,9 @@ The recommendations and Zero Trust checks that are part of this pillar help redu
167173
### Entra Connect Sync is configured with Service Principal Credentials
168174
[!INCLUDE [24570](../includes/secure-recommendations/24570.md)]
169175

176+
### Directory sync account is locked down to specific named location
177+
[!INCLUDE [21834](../includes/secure-recommendations/21834.md)]
178+
170179
### No usage of ADAL in the tenant
171180
[!INCLUDE [21780](../includes/secure-recommendations/21780.md)]
172181

docs/id-protection/concept-identity-protection-risks.md

Lines changed: 7 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -3,8 +3,8 @@ title: What are risk detections?
33
description: Explore the full list of risk detections and their corresponding risk event types, along with a description of each risk event type.
44
ms.service: entra-id-protection
55
ms.topic: reference
6-
ms.date: 01/07/2026
7-
ms.reviewer: cokoopma
6+
ms.date: 03/17/2026
7+
ms.reviewer: lvandenende
88
---
99

1010
# What are risk detections?
@@ -146,7 +146,7 @@ This detection is discovered using information provided by [Microsoft Defender
146146

147147
### Microsoft Entra threat intelligence (sign-in)
148148

149-
Microsoft Entra threat intelligence indicates user activity that is unusual for the user or consistent with known attack patterns. This detection is based on Microsoft's internal and external threat intelligence sources. These detections show up as "Microsoft Entra threat intelligence" in logs and ID Protection reports.
149+
Microsoft Entra threat intelligence indicates user activity that is unusual for the user or consistent with known attack patterns. This detection is based on Microsoft's internal and external threat intelligence research, including data from the Microsoft Threat Intelligence Center (MSTIC) and other Microsoft security teams. These detections show up as "Microsoft Entra threat intelligence" in logs and ID Protection reports.
150150

151151
- Calculated in real-time or offline
152152
- License requirement: Microsoft Entra ID Free or Microsoft Entra ID P1
@@ -163,7 +163,7 @@ This detection is discovered using information provided by [Microsoft Defender
163163

164164
### Password spray
165165

166-
A password spray attack is where multiple identities are attacked using common passwords in a unified brute force manner. The risk detection is triggered when an account's password is valid and has an attempted sign in. This detection signals that the user's password was correctly identified through a password spray attack, not that the attacker was able to access any resources.
166+
A password spray attack is where multiple identities are attacked using common passwords in a unified brute force manner. Microsoft monitors password spray patterns across IP addresses and other identifiers to detect these attacks across all Microsoft Entra tenants. The risk detection is only triggered when an attacker successfully validates a user's password. Unsuccessful spray attempts against your users don't generate a detection. When the detection fires in your tenant, it means Microsoft observed a spray attack and confirmed that the attacker achieved a successful credential validation against a user in your tenant. This detection signals that the user's password was correctly identified, not that the attacker was able to access any resources.
167167

168168
- Calculated in real-time or offline
169169
- License requirement: Microsoft Entra ID P2
@@ -259,15 +259,16 @@ Also referred to as Adversary in the Middle, this high precision detection is tr
259259

260260
### Leaked credentials
261261

262-
This risk detection type indicates that the user's valid credentials leaked. When cybercriminals compromise valid passwords of legitimate users, they often share these gathered credentials. This sharing is typically done by posting publicly on the dark web, paste sites, or by trading and selling the credentials on the black market. When the Microsoft leaked credentials service acquires user credentials from the dark web, paste sites, or other sources, they're checked against Microsoft Entra users' current valid credentials to find valid matches. For more information about leaked credentials, see [FAQs](id-protection-faq.yml).
262+
This risk detection indicates that a user's valid credentials appeared in a known credential breach. Microsoft operates a large-scale credential scanning pipeline that continuously monitors dark web forums, breach dump repositories, paste sites, law enforcement seizure data, and other sources through partnerships with the Microsoft Threat Intelligence Center (MSTIC), Microsoft Digital Crimes Unit (DCU), and industry partners. When discovered credentials are found, the service validates the actual credential material against your tenant's current valid password hashes. A detection is only emitted when a confirmed match is found. This detection is always as **high** risk because it represents verified credential exposure, not a heuristic signal. A cloud-based password reset through Microsoft Entra remediates the user risk for this detection for cloud and on-premises passwords, as long as password hash synchronization (PHS) is enabled for on-premises passwords. For more information about on-premises password protection, see [Microsoft Defender for Identity accounts security posture assessments](/defender-for-identity/security-posture-assessments/accounts#change-password-for-on-premises-account-with-potentially-leaked-credentials-preview).
263263

264264
- Calculated offline
265265
- License requirement: Microsoft Entra ID Free or Microsoft Entra ID P1
266+
- Requires [password hash synchronization (PHS)](../identity/hybrid/connect/how-to-connect-password-hash-synchronization.md) for on-premises passwords
266267
- [Tips for investigating leaked credentials detections.](howto-identity-protection-investigate-risk.md#leaked-credentials-detections)
267268

268269
### Microsoft Entra threat intelligence (user)
269270

270-
This risk detection type indicates user activity that is unusual for the user or consistent with known attack patterns. This detection is based on Microsoft's internal and external threat intelligence sources.
271+
This risk detection type indicates user activity that is unusual for the user or consistent with known attack patterns. This detection is based on Microsoft's internal and external threat intelligence research, including data from the Microsoft Threat Intelligence Center (MSTIC) and other Microsoft security teams.
271272

272273
- Calculated offline
273274
- License requirement: Microsoft Entra ID Free or Microsoft Entra ID P1

docs/id-protection/concept-workload-identity-risk.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -47,7 +47,7 @@ We detect risk on workload identities across sign-in behavior and offline indica
4747

4848
| Detection name | Detection type | Description | riskEventType |
4949
| --- | --- | --- | --- |
50-
| Microsoft Entra threat intelligence | Offline | This risk detection indicates some activity that is consistent with known attack patterns based on Microsoft's internal and external threat intelligence sources. | investigationsThreatIntelligence |
50+
| Microsoft Entra threat intelligence | Offline | This risk detection indicates some activity that is consistent with known attack patterns based on Microsoft's internal and external threat intelligence research. | investigationsThreatIntelligence |
5151
| Suspicious Sign-ins | Offline | This risk detection indicates sign-in properties or patterns that are unusual for this service principal. The detection learns the baselines sign-in behavior for workload identities in your tenant. This detection takes between 2 and 60 days, and fires if one or more of the following unfamiliar properties appear during a later sign-in: IP address / ASN, target resource, user agent, hosting/non-hosting IP change, IP country, credential type. Because of the programmatic nature of workload identity sign-ins, we provide a timestamp for the suspicious activity instead of flagging a specific sign-in event. Sign-ins that are initiated after an authorized configuration change might trigger this detection. | suspiciousSignins |
5252
| Admin confirmed service principal compromised | Offline | This detection indicates an admin selected 'Confirm compromised' in the Risky Workload Identities UI or using riskyServicePrincipals API. To see which admin confirmed this account compromised, check the account’s risk history (via UI or API). | adminConfirmedServicePrincipalCompromised |
5353
| Leaked Credentials | Offline | This risk detection indicates that the account's valid credentials leaked. This leak can occur when someone checks in the credentials in public code artifact on GitHub, or when the credentials are leaked through a data breach. When the Microsoft leaked credentials service acquires credentials from GitHub, the dark web, paste sites, or other sources, they're checked against current valid credentials in Microsoft Entra ID to find valid matches. | leakedCredentials |

docs/id-protection/howto-identity-protection-investigate-risk.md

Lines changed: 13 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -2,8 +2,8 @@
22
title: Investigate risk with Microsoft Entra ID Protection
33
description: Learn how to investigate risky users, detections, and sign-ins in Microsoft Entra ID Protection.
44
ms.topic: how-to
5-
ms.date: 01/07/2026
6-
ms.reviewer: cokoopma
5+
ms.date: 03/17/2026
6+
ms.reviewer: lvandenende
77
ms.custom: sfi-image-nochange
88
---
99
# How to investigate risk
@@ -95,7 +95,7 @@ To investigate a Microsoft Entra threat intelligence risk detection, follow thes
9595

9696
- Detection was triggered by a real-time rule
9797
1. Validate that no other users in your directory are targets of the same attack. This information can be found using the TI_RI_#### number assigned to the rule.
98-
1. Real-time rules protect against novel attacks identified by Microsoft's threat intelligence. If multiple users in your directory were targets of the same attack, investigate unusual patterns in other attributes of the sign in.
98+
1. Real-time rules protect against novel attacks identified by Microsoft's threat intelligence research. If multiple users in your directory were targets of the same attack, investigate unusual patterns in other attributes of the sign in.
9999

100100
### Atypical travel detections
101101

@@ -135,6 +135,8 @@ This detection indicates the user doesn't commonly use the browser or activity w
135135

136136
### Password spray detections
137137

138+
A password spray detection means Microsoft observed an attacker conducting a spray attack and achieving a successful credential validation against a user in your tenant. The spray attack might have targeted users across many tenants — the detection fires only in tenants where a successful password match was confirmed. Unsuccessful spray attempts don't generate a detection.
139+
138140
- If you confirm that the activity was *not* performed by a legitimate user:
139141
1. Mark the sign-in as compromised, and invoke a password reset if not already performed by self-remediation.
140142
1. Block the user if an attacker has access to reset password or perform MFA and reset password and revoke all tokens.
@@ -149,9 +151,15 @@ For further investigation of password spray risk detections, see the article [Pa
149151

150152
### Leaked credentials detections
151153

154+
Leaked credentials detections are always high risk because they represent confirmed credential exposure. When this detection fires, investigate right away.
155+
152156
If this detection identified a leaked credential for a user:
153-
1. Confirm the user as compromised, and invoke a password reset if not already performed by self-remediation.
154-
1. Block the user if an attacker has access to reset password or perform MFA and reset password and revoke all tokens.
157+
158+
1. **Assess the scope of exposure.** Review the user's risk history and sign-in logs to determine if the leaked credential was used for unauthorized access. Look for correlated sign-in risk events such as sign-ins from unfamiliar locations, anonymous IP addresses, or atypical travel.
159+
1. **Check if the password was already changed.** Verify whether the user changed their password after the date the leak was detected. A cloud-based password reset triggered by a [Microsoft Entra Conditional Access policy](howto-identity-protection-configure-risk-policies.md#user-risk-policy-in-conditional-access) fully remediates the user risk for this detection. If the password was changed, the risk might already be self-remediated. If not, confirm the user as compromised and initiate a password reset.
160+
1. **Block access if an attacker is active.** If sign-in logs show unauthorized access, or if an attacker has the ability to reset the password or perform MFA, block the user, reset the password, and revoke all refresh tokens. Revoking sessions is critical when there's evidence of active compromise.
161+
1. **Review for lateral movement.** Check the user's recent activity for signs of privilege escalation, new app registrations, mailbox rule changes, or access to sensitive resources that might indicate post-compromise activity.
162+
1. **Verify connected accounts.** If the user reuses passwords across services, consider the credential compromised beyond your tenant. Advise the user to change passwords on other services where they use the same credential.
155163

156164
## Mitigate future risks
157165

docs/id-protection/howto-identity-protection-remediate-unblock.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -221,14 +221,14 @@ If a user was deleted from the directory that had a risk present, that user stil
221221

222222
## Token theft related detections
223223

224-
With a recent update to our detection architecture, we no longer autoremediate sessions with MFA claims when a token theft related or the Microsoft Threat Intelligence Center (MSTIC) Nation State IP detection triggers during sign-in.
224+
With a recent update to our detection architecture, we no longer autoremediate sessions with MFA claims when a token theft related or the Verified threat actor IP detection triggers during sign-in.
225225

226-
The following ID Protection detections that identify suspicious token activity or the MSTIC Nation State IP detection are no longer auto-remediated:
226+
The following ID Protection detections that identify suspicious token activity or the Verified threat actor IP detection are no longer auto-remediated:
227227

228-
- Microsoft Entra threat intelligence
228+
- Microsoft Entra threat intelligence
229229
- Anomalous token
230230
- Attacker in the Middle
231-
- MSTIC Nation State IP
231+
- Verified threat actor IP
232232
- Token issuer anomaly 
233233

234234
ID Protection now surfaces session details in the Risk Detection Details pane for detections that emit sign-in data. This change ensures we don't close sessions containing detections where there's MFA-related risk. Providing session details with user-level risk details provides valuable information to assist with investigation. This information includes:

0 commit comments

Comments
 (0)