Diablo Immortal, everyone is waiting for it, and especially for the turn. But after the last technical alpha in January,…
Microsoft adds an option in Azure to detect fraudulent connectionsPublié le
Always concerned about protecting users’ personal data, Microsoft has added a new feature to Azure Active Directory that allows you to access the list of connections to detect those that are unusual.
The aim is to make it easier to identify fraudulent connection attempts and take action accordingly. Azure AD users will be able to discover this new feature via a new tile called “My Sign-Ins”. The latter will display the following information:
- Unsuccessful login attempts without passwords
- Successful connection attempts with their location
- The applications the person was trying to access
In addition, the user has access to other data on connection attempts such as the operating system or browser used, the approximate location or IP address. It is through this data that a person will be able to easily identify fraudulent connections. An unusual OS or suspicious location will indicate that an attacker has tried to connect to your account.
Robyn Hicock, Senior Program Manager at Microsoft Identity Security, then advises to “change your password immediately and then go to the security information page to update your security settings. ». It is also possible to enable double authentication: “According to our studies, accounts protected by the AMF (Multi-Factor Authentication) are 99.9% less likely to be compromised,” adds Hicock.
People who actively use Azure Active Directory can now benefit from these new features regarding the security of their account.
Autres articles sur le même sujet
The new version of FIFA is coming on October 6th. Usually, EA Sports gives players a preview of the game…