Microsoft adds an option in Azure to detect fraudulent connections

Publié le

Always concerned about protecting users’ personal data, Microsoft has added a new feature to Azure Active Directory that allows you to access the list of connections to detect those that are unusual.

The aim is to make it easier to identify fraudulent connection attempts and take action accordingly. Azure AD users will be able to discover this new feature via a new tile called “My Sign-Ins”. The latter will display the following information:

  • Unsuccessful login attempts without passwords
  • Successful connection attempts with their location
  • The applications the person was trying to access

Azure Active Directory

In addition, the user has access to other data on connection attempts such as the operating system or browser used, the approximate location or IP address. It is through this data that a person will be able to easily identify fraudulent connections. An unusual OS or suspicious location will indicate that an attacker has tried to connect to your account.

Robyn Hicock, Senior Program Manager at Microsoft Identity Security, then advises to “change your password immediately and then go to the security information page to update your security settings. ». It is also possible to enable double authentication: “According to our studies, accounts protected by the AMF (Multi-Factor Authentication) are 99.9% less likely to be compromised,” adds Hicock.

Azure Active Directory

People who actively use Azure Active Directory can now benefit from these new features regarding the security of their account.


Leave a Reply

Your email address will not be published. Required fields are marked *

Autres articles sur le même sujet