Risky Users
Azure AD Identity Protection identifies users whose accounts may be compromised. Risky users have risk detections associated with their account that indicate potential credential theft or account takeover.
Warning: Identity Protection features including Risky Users require Azure AD Premium P2 or Microsoft 365 E5 licenses. Risk data is retained for 90 days.
Risk Dashboard
- 12 — High Risk
- 34 — Medium Risk
- 89 — Low Risk
- 2,341 — No Risk
Risky Users List
| Column | Description |
|---|---|
| User | Display name and UPN |
| Risk Level | High, Medium, Low, or None |
| Risk State | At risk, Confirmed, Dismissed, Remediated |
| Risk Detections | Number of active detections |
| Last Risk Update | When risk was last calculated |
| User Type | Member or Guest |
Risk Detections
Types of suspicious activity that contribute to user risk:
Leaked Credentials (High)
User’s credentials were found in a data breach on the dark web. Microsoft’s threat intelligence detected the leaked password hash.
Impossible Travel (Medium)
User signed in from two geographically distant locations in a time period that makes physical travel impossible (e.g., NYC to Tokyo in 1 hour).
Anonymous IP Address (Medium)
Sign-in from IP address associated with anonymous proxy, Tor, or VPN commonly used to hide attacker location.
Malware-Linked IP (High)
Sign-in from IP address known to be associated with malware or botnet command-and-control infrastructure.
Unfamiliar Sign-in Properties (Low)
Sign-in with properties (device, browser, location) not seen before for this user based on learned patterns.
Password Spray (High)
User account targeted in password spray attack. Multiple failed attempts using common passwords across many accounts.
Suspicious Inbox Manipulation (Medium)
Rules created that forward, delete, or hide incoming emails. Common post-compromise technique.
Risk States
At Risk
Active risk detections. User may be compromised. Requires investigation.
Confirmed Compromised
Admin confirmed the account is compromised. Full remediation required.
Remediated
User completed password reset and MFA re-registration. Risk cleared.
Dismissed
Admin determined detections were false positives. Risk cleared.
Remediation Actions
Self-Remediation (User)
If CA policy requires risk remediation, user can self-remediate by:
- Completing MFA challenge (for sign-in risk)
- Performing password change (for user risk)
Admin Remediation
Admin can force remediation:
- Reset user password
- Revoke all sessions
- Block sign-in temporarily
- Require MFA re-registration
- Confirm user compromised (highest risk)
Dismiss Risk
If detections are false positives (e.g., VPN causing impossible travel), admin can dismiss the risk to clear the user.
Risk-Based Conditional Access
Automate response to risky users with Conditional Access:
Example Policy: Require password change for risky users
- Target: All users
- Apps: All cloud apps
- Condition: User risk level = High
- Grant: Require password change
Note: Create policies for different risk levels. High risk — block or require immediate remediation. Medium risk — require MFA and password change.
Investigation Workflow
- Review Risk Detections — Understand what triggered the risk. Check detection type and time.
- Check Sign-in Logs — Look for suspicious sign-ins around detection time.
- Review Audit Logs — Check for suspicious actions (mailbox rules, file access).
- Contact User — Verify if activity was legitimate (VPN, travel).
- Take Action — Remediate, confirm compromised, or dismiss based on findings.
API Reference
GET /api/security/risky-users— List risky users with risk detailsGET /api/security/risky-users/:id— Get specific user risk detailsGET /api/security/risky-users/:id/detections— List risk detections for userPOST /api/security/risky-users/:id/dismiss— Dismiss user riskPOST /api/security/risky-users/:id/confirm-compromised— Confirm user is compromised