Harley-Davidson is recalling 16,994 Softail motorcycles in the United States after discovering that a rear brake hose can rub against the rear tire, creating a risk of brake fluid leaks and reduced ... Learn how to configure user self-remediation and manually remediate risky users in Microsoft Entra ID Protection. In this tutorial, you learn how to enable Microsoft Entra ID Protection to protect users when risky sign-in behavior is detected on their account.

Understanding the Context

Learn about risk detections and risk levels, including the difference between real-time and offline detections. This control uses adaptive risk remediation to let you author a Conditional Access risk policy that accommodates all authentication methods, including password-based and passwordless. This means that when you select "Require risk remediation" in your policy's grant controls, Microsoft Entra ID Protection manages the appropriate remediation flow based on the threat observed and the user's ... The risk management process starts with identifying all possible risks to all key control areas, internal and external threats, and vulnerabilities in the Microsoft 365 environment.

Key Insights

The information guiding this process comes from multiple sources including interviews, vulnerability scans, attack simulation exercises, audit findings, and incident management activities. The Trust team interviews ... Learn how to access, filter, and use the Microsoft Entra ID Protection risk reports to mark users and sign-ins as risky or confirmed compromised. Organizations with Microsoft Entra ID P2 licenses can create Conditional Access policies incorporating Microsoft Entra ID Protection user risk detections. This policy enables end users to self-remediate and unblock themselves, increasing their productivity while reducing incidents sent to your help desk or security operations teams.

Final Thoughts