-
Book Overview & Buying
-
Table Of Contents
-
Feedback & Rating

Microsoft 365 Administrator MS-102 Exam Guide
By :

Identity Protection has three policy configuration nodes on the Identity Protection blade:
The Identity Protection User risk policy pane, depicted in Figure 6.5, is used to scope the Identity Protection features and enable the settings to control access enforcement:
Figure 6.5 – User risk policy
The term user risk represents the likelihood that an identity (user account, service, or workload identity) is somehow compromised. User risk is determined based on all available signal data.
Sign-in risk, while similar to user risk, is a more restricted view of the signal data. Sign-in risk assertions are used to represent the likelihood that a sign-in or authentication request wasn’t authorized by the identity owner. The Sign-in risk policy pane features similar scoping and control policy...
Change the font size
Change margin width
Change background colour