


The Azure AD Premium P2 license is bundled with Enterprise Mobility & Security E5 licenses as well. Sign-in risk policies and User risk policies require an Azure AD Premium P2 license for each user. The machine learning system takes into account the sign-in time slot, among other things. Atypical travel: This machine learning method recognizes two sign-ins that originated from geographically different locations, one of which may be uncommon for the individual, based on previous behavior.Activity from anonymous IP address: When a user logs in from an anonymous IP address.Microsoft 365 has a number of built-in sign-in risk policies. Sign-in risk policies show when a suspicious login happens in your Microsoft 365 environment. then ten minutes later logs in from Russia. For example, the user logs in from the U.S.A. Impossible travel: Detected by Microsoft Defender for Cloud Apps this detection type is detected when the user logs in or performs another activity from two geographically distant locations.Typically, the rule will automatically delete or hide messages. Suspicious inbox manipulation rules: Detected by Microsoft Defender for Cloud Apps this detection is triggered when a suspicious rule is created in the user’s inbox.Malicious IP address: A public IP address is considered malicious when there is a high failure rate of logins from that IP address.Atypical travel: This user risk is flagged when a user signs in from a location that is different from the other recent sign-ins.Unfamiliar sign-in properties: This is typically flagged when the user attempts to log in from a new device, location, or another behavior that is new to the user.Anonymous IP address: These can come from users trying to log in to your tenant using a TOR browser or anonymous VPN.Some of the things that can be detected are the following: The risk level is determined based on threat intelligence by reviewing normal behavior for the user. User risk is a calculation of the risk level that a user account has been compromised in Microsoft 365.
