Microsoft Entra ID Protection – Risk-Based Conditional Access for Small Businesses in Berlin
Standard Conditional Access policies make binary decisions: does the user have MFA, is the device compliant, is the network trusted. Microsoft Entra ID Protection adds a risk dimension to this model. It continuously analyzes sign-in signals across Microsoft’s global threat intelligence network and assigns a real-time risk score to every authentication event. Your Conditional Access policies can then respond dynamically — requiring step-up verification for a risky sign-in, or automatically blocking access when the risk score crosses a threshold. For Berlin SMBs on Microsoft 365 Business Premium or Entra ID P2, this is the layer that catches compromised credentials before the attacker establishes a persistent foothold.
What Entra ID Protection Detects
ID Protection generates two types of risk signals:
Sign-In Risk
Evaluated per authentication attempt. Risk detections include:
| Detection | Description | Risk Level |
|---|---|---|
| Atypical travel | Sign-in from a location physically impossible given prior sign-in location and time | Medium |
| Anonymous IP address | Sign-in from known Tor exit node or VPN anonymizer | Medium |
| Malware-linked IP address | IP associated with botnet C2 infrastructure | High |
| Unfamiliar sign-in properties | Sign-in properties (location, ASN, device) deviate significantly from user baseline | Medium |
| Admin confirmed user compromised | An administrator has manually confirmed the account is compromised | High |
| Token issuer anomaly | Token refresh behavior inconsistent with normal session lifecycle | High |
User Risk
Accumulated over time for the user account. Elevated by:
- Leaked credentials: Microsoft’s threat intelligence monitors dark web credential dumps and paste sites. When a username/password pair from your tenant appears in a breach dump, the account’s user risk is set to High
- Azure AD threat intelligence: Patterns matching known attack techniques targeting the account
- Unusual user activity: Behavioral patterns inconsistent with the user’s historical baseline
Risk-Based Conditional Access Policies
ID Protection integrates directly with Conditional Access. Two foundational policies every tenant should configure:
Policy 1: Sign-In Risk Policy
| Parameter | Setting |
|---|---|
| Users | All users (exclude emergency access accounts) |
| Sign-in risk level | Medium and above |
| Grant control | Require MFA |
| Session control | Sign-in frequency: every time (disables persistent sessions for risky sign-ins) |
Policy 2: User Risk Policy
| Parameter | Setting |
|---|---|
| Users | All users (exclude emergency access accounts) |
| User risk level | High |
| Grant control | Require password change (combined with MFA to authenticate before the reset) |
| Effect | Forces the user to create a new password, invalidating any stolen credentials |
The user risk policy is particularly important for leaked credential detection. When a password appears in a breach dump, Microsoft sets the user risk to High within hours of discovery. The user risk policy then forces a password change on next sign-in, automatically remediating the compromised credential without requiring admin intervention.
MFA Registration Policy
A prerequisite for risk-based CA to work is that users have MFA registered. If a risky sign-in triggers an MFA requirement but the user has never registered an MFA method, they are blocked. The ID Protection MFA registration policy (Entra ID → Security → Identity Protection → MFA registration policy) enforces MFA registration for all users — it’s separate from the standard CA-based MFA requirement and specifically targets the registration step.
Set to: All users, enforce policy. This ensures every user registers at least one MFA method before a risk event forces it at an inconvenient time.
Investigating Risk Events
Navigation: Entra ID → Security → Identity Protection
Three key report views:
- Risky users: All users currently elevated to Medium or High risk. Actions available: Confirm compromised (escalates to High, triggers immediate remediation) or Dismiss user risk (clears the risk if determined to be a false positive)
- Risky sign-ins: Individual authentication events with risk detections. Filter by date range, risk level, detection type
- Risk detections: Raw detection events with full technical detail — IP address, detection timing, associated user, detection type
When you see a High-risk user in the report, the investigation workflow is: review the sign-in details, check the detection type (leaked credentials is almost always a true positive), contact the user to confirm whether the activity was legitimate, then either confirm compromised (triggers forced password change) or dismiss if it’s a confirmed false positive (e.g., the user was actually traveling).
Licensing Requirements
Entra ID Protection requires Entra ID P2, included in:
- Microsoft 365 Business Premium (included)
- Microsoft 365 E5
- Entra ID P2 standalone
Risk-based CA policies (the integration between ID Protection detections and CA enforcement) require both Entra ID P1 (for CA) and P2 (for ID Protection). Business Premium includes both.
False Positive Management
The most common false positive in SMB environments is atypical travel triggered by users who legitimately travel between offices or work from client sites. Strategies to reduce noise:
- Add trusted named locations for offices and regularly-visited client sites
- For users who frequently travel, consider a sign-in risk policy that requires MFA (rather than blocking) for Medium risk — this allows legitimate users to self-remediate with a second factor rather than being blocked
- Train users to recognize the MFA prompt as a security check rather than a system error, so they complete it rather than abandoning the session
Entra ID Protection shifts your identity security posture from reactive (investigating breaches after they happen) to proactive (detecting and blocking compromised credential use in real time). For Berlin SMBs handling client data, this is the control that prevents a single phished password from becoming a full tenancy compromise.
Related Articles
Related Articles
