Azure Security-AD General Info 2 Flashcards
What do I need to define when a risk is identified with identity protection?
I can define a risk policy to perform tasks when a risk is identified with id protection.
Why do I need to configure a risk policy with identity protection?
a risk policy helps me indicate what should happen when a risk is detected.
Name the two types of risk policies in ID protection?
there is the user and sign in risk policies in ID protection.
How is sign-in risk policy measured in ID protection?
the sign-in risk policy measures if the risk is high,med or low and can request additional info like MFA to grant access etc.
How is user risk policy measured in ID protection?
the user risk policy can measure any anomalies in user access as compared to normal baseline info saved from previous connectivity from this user.
What policy should I use for MFA with ID protection?
the MFA registration policy will allow me to register the users with MFA as a second method to provide authenticity of a user.
With ID protection how can I remediate risks?
I can remediate risks with generating reports and investigating these risks and remediating them thereafter.
What are the remediation methods for ID protection risks that are detected?
We can use self remediation ie reset pwd, or an admin can reset a pwd, and dismiss risks.
Which report with ID protection indicates risk detected devices?
The risky sign in reports provides the details of the devices that are risky with ID Protection.
What is PIM-PRIVILEGE IDENTITY MANAGEMENT?
PIM allows us to control,manage and monitor the access rights of admins to my networks resources.
What is ZERO TRUST?
zero trust allows me to never trust and always verify.
name the four components of a zero trust model?
the device directory, identity provider, policy evaluation service and access proxy.
What should I do to limit the need to give more access than is really required?PIM
with PIM I can give only the access that’s actually required for the admins.
Can PIM provide the ability to give time based access to resources?
Yes PIM can give us the ability to provide time based access.
Why is PIM important?
PIM allows us to monitor the admins and there roles, the access given to people and why do they require a certain level of access.