🔒 Guided

Pre-launch preview. Authorised access only.

Incorrect code

Guided by A Guide to Cloud
Explore AB-900 AI-901
Guided SC-300 Domain 2
Domain 2 — Module 6 of 7 86%
14 of 27 overall

SC-300 Study Guide

Domain 1: Implement and Manage User Identities

  • Your Entra Tenant: Branding, Settings & Domains
  • Entra Roles & Administrative Units
  • Managing Users & Groups
  • Device Registration & Licensing
  • External Identities: Guest Access & B2B
  • Cross-Tenant Access & Synchronisation
  • Hybrid Identity: Connect Sync vs Cloud Sync
  • Hybrid Authentication: PHS, PTA & Seamless SSO

Domain 2: Implement Authentication and Access Management

  • Authentication Methods: Plan & Implement
  • Passwordless & Windows Hello for Business
  • MFA, SSPR & Password Protection
  • Conditional Access: Plan & Build Policies
  • Conditional Access: Advanced Controls & Troubleshooting
  • Entra ID Protection: Risk-Based Security
  • Global Secure Access: Zero Trust Networking

Domain 3: Plan and Implement Workload Identities

  • Workload Identities: Managed Identities & Service Principals
  • Enterprise Apps: SSO, App Proxy & Integration
  • Enterprise Apps: Users, Consent & Collections
  • App Registrations: Build & Secure
  • Defender for Cloud Apps: Discover & Control
  • Defender for Cloud Apps: Policies & OAuth Governance

Domain 4: Plan and Automate Identity Governance

  • Entitlement Management: Catalogs & Access Packages Free
  • Access Requests, Terms of Use & External Lifecycle Free
  • Access Reviews: Plan, Create & Monitor Free
  • PIM: Protect Your Privileged Roles Free
  • PIM: Azure Resources, Groups & Audit Free
  • Identity Monitoring: Logs, KQL & Secure Score Free

SC-300 Study Guide

Domain 1: Implement and Manage User Identities

  • Your Entra Tenant: Branding, Settings & Domains
  • Entra Roles & Administrative Units
  • Managing Users & Groups
  • Device Registration & Licensing
  • External Identities: Guest Access & B2B
  • Cross-Tenant Access & Synchronisation
  • Hybrid Identity: Connect Sync vs Cloud Sync
  • Hybrid Authentication: PHS, PTA & Seamless SSO

Domain 2: Implement Authentication and Access Management

  • Authentication Methods: Plan & Implement
  • Passwordless & Windows Hello for Business
  • MFA, SSPR & Password Protection
  • Conditional Access: Plan & Build Policies
  • Conditional Access: Advanced Controls & Troubleshooting
  • Entra ID Protection: Risk-Based Security
  • Global Secure Access: Zero Trust Networking

Domain 3: Plan and Implement Workload Identities

  • Workload Identities: Managed Identities & Service Principals
  • Enterprise Apps: SSO, App Proxy & Integration
  • Enterprise Apps: Users, Consent & Collections
  • App Registrations: Build & Secure
  • Defender for Cloud Apps: Discover & Control
  • Defender for Cloud Apps: Policies & OAuth Governance

Domain 4: Plan and Automate Identity Governance

  • Entitlement Management: Catalogs & Access Packages Free
  • Access Requests, Terms of Use & External Lifecycle Free
  • Access Reviews: Plan, Create & Monitor Free
  • PIM: Protect Your Privileged Roles Free
  • PIM: Azure Resources, Groups & Audit Free
  • Identity Monitoring: Logs, KQL & Secure Score Free
Domain 2: Implement Authentication and Access Management Premium ⏱ ~13 min read

Entra ID Protection: Risk-Based Security

Configure user risk and sign-in risk policies, investigate risky users and sign-ins, run MFA registration campaigns, and manage risky workload identities.

What is ID Protection?

☕ Simple explanation

ID Protection is like a credit card fraud detection system — but for sign-ins.

When you use your credit card in a new country, the bank doesn’t just block it. It flags the transaction as risky and might ask you to confirm it’s really you (a text message, a call). If you don’t confirm, it blocks the charge.

Entra ID Protection does the same thing. It watches every sign-in and asks: “Does this look normal?” If not — unusual location, impossible travel, leaked password — it raises a risk flag. Then your policies decide what happens: ask for MFA, force a password change, or block access entirely.

Microsoft Entra ID Protection uses machine learning and Microsoft’s vast signal network (billions of sign-ins daily) to detect identity-based risks in real time. It feeds into two risk types:

  • Sign-in risk — the probability that a specific sign-in was NOT performed by the account owner
  • User risk — the probability that a user’s identity/credentials have been compromised

Risk levels are Low, Medium, and High. These risks become conditions in Conditional Access policies, allowing automated remediation (require MFA, require password change, block access).

ID Protection requires Entra ID P2 licences.

User risk vs sign-in risk

FeatureUser RiskSign-in Risk
What it measuresProbability the user's identity is compromisedProbability this specific sign-in is illegitimate
ScopePersists across all sign-ins until remediatedPer sign-in — each sign-in has its own risk level
Example detectionsLeaked credentials, anomalous user activity, threat intelUnfamiliar sign-in properties, impossible travel, anonymous IP
Typical remediationRequire secure password changeRequire MFA for this sign-in
Resets automatically?Only after remediation (password change) or admin dismissalAfter each sign-in evaluation — next sign-in gets fresh assessment
Affects future sign-ins?Yes — until risk is cleared, every sign-in is affectedNo — only the risky sign-in itself
LicenceEntra ID P2Entra ID P2

Risk detections explained

Sign-in risk detections

DetectionRisk LevelWhat It Means
Anonymous IP addressLow–MediumSign-in from Tor exit node, anonymous VPN, or proxy
Atypical travelMediumSign-in from a location unusual for this user
Impossible travelMedium–HighSign-ins from two locations too far apart for the time between them
Malware-linked IPMediumSign-in from an IP known to communicate with bot servers
Unfamiliar sign-in propertiesMediumSign-in with properties (device, location, app) never seen before
Password sprayMedium–HighMultiple accounts targeted with common passwords
Token anomalyHighToken characteristics suggest it’s been tampered with or replayed

User risk detections

DetectionRisk LevelWhat It Means
Leaked credentialsHighUser’s credentials found in a breach database
Anomalous user activityMediumUnusual behaviour patterns (mass file access, unusual admin actions)
Threat intelligenceVariesMicrosoft’s threat intelligence links the user to known attacks
Possible attempt to access PRTMedium–HighSuspicious activity around the Primary Refresh Token

Configuring risk policies

Risk policies are implemented as Conditional Access policies with risk-level conditions.

Sign-in risk policy

IF: All users → All cloud apps → Sign-in risk = Medium and above
THEN: Require MFA

This means: if a sign-in looks risky, the user must prove their identity with an extra factor. If the sign-in is legitimate, the user completes MFA and continues. If it’s an attacker, they can’t complete MFA and are blocked.

User risk policy

IF: All users → All cloud apps → User risk = High
THEN: Require password change (which also requires MFA)

This means: if a user’s identity appears compromised (leaked credentials, anomalous activity), they must change their password. Requiring a password change automatically requires MFA first (you can’t change a password without authenticating).

ℹ️ Scenario: Priya configures risk policies for Meridian Health

Priya’s risk policy set for Meridian Health:

Sign-in risk policy:

  • Medium risk → require MFA (self-remediating: user does MFA, risk is cleared)
  • High risk → block access (admin must investigate)

User risk policy:

  • Medium risk → require MFA + password change
  • High risk → block access (admin must investigate and confirm remediation)

She excludes break-glass accounts from both policies. She also enables the policies in report-only mode first to check for false positives (e.g., nurses who sign in from multiple hospital locations might trigger atypical travel).

After 2 weeks of monitoring, she adjusts: the VPN IP ranges are added as trusted named locations in Conditional Access, and she tunes sign-in risk policies to reduce false positives for nurses who legitimately sign in from multiple hospital locations.

💡 Exam tip: self-remediation vs admin remediation

Self-remediation = the risky user resolves the risk themselves:

  • Sign-in risk: user completes MFA → risk cleared for that sign-in
  • User risk: user changes password (after MFA) → user risk resets to none

Admin remediation = an admin manually resolves the risk:

  • Dismiss user risk (when it’s a false positive)
  • Confirm user compromised (escalates risk, blocks user)
  • Reset password manually

Self-remediation requires SSPR to be enabled for password changes. If SSPR is off, user risk can only be resolved by admins.

MFA registration policy

ID Protection includes a dedicated policy to enforce MFA registration:

  • Targets: All users or specific groups
  • Action: Requires users to register for MFA at next sign-in (up to 14-day snooze)
  • Purpose: Ensures users have MFA methods registered BEFORE a risk event occurs

This is separate from the authentication methods registration campaign (which nudges users toward Authenticator specifically). The MFA registration policy is a hard requirement — users must register, they can only delay it.

Investigating risky users and sign-ins

Entra admin center → Protection → Identity Protection → Risky users / Risky sign-ins

Risky users investigation workflow

  1. Open the Risky users report
  2. Filter by risk level (High, Medium, Low)
  3. Select a user → view their risk detections
  4. Check: What triggered the risk? (leaked credentials? anomalous activity?)
  5. Correlate with sign-in logs — was there an actual compromise?
  6. Take action:
    • Confirm compromised — if real. Blocks user and requires admin reset.
    • Dismiss user risk — if false positive. Clears the risk flag.
    • Reset password — force a new password.
    • Block user — if you need time to investigate.
ℹ️ Scenario: Anika investigates a risky sign-in

Anika’s client reports that ID Protection flagged a user with “High” user risk. She investigates:

  1. Opens the Risky users report → finds the user flagged for “Leaked credentials”
  2. Checks sign-in logs → sees two sign-ins:
    • One from the user’s normal location (Auckland) at 9 AM ✅
    • One from Lagos, Nigeria at 9:15 AM ❌
  3. The Lagos sign-in used the correct password (leaked credential was valid)
  4. The sign-in risk policy blocked the Lagos attempt (required MFA, attacker couldn’t complete)
  5. But user risk is still High because the credentials are still compromised

Actions:

  • Reset the user’s password immediately (the leaked password is no longer valid)
  • Revoke all sessions (in case the attacker obtained a valid token before the block)
  • Check the user’s mailbox for suspicious inbox rules (common post-compromise tactic)
  • Risk level resets to “None” after password change

Key insight: The sign-in risk policy stopped the immediate attack, but the user risk policy ensures the underlying issue (leaked password) is fixed.

Risky workload identities

ID Protection also monitors workload identities (service principals and managed identities) — not just human users.

Workload identity risk detections:

  • Suspicious sign-in activity from a service principal
  • Credentials added to a service principal by a suspicious actor
  • Admin confirmed the workload identity as compromised
  • Anomalous activity patterns for the service principal

Why this matters: Attackers increasingly target service principals because they often have broad permissions, don’t use MFA, and are less monitored than user accounts.

Remediation: Investigate compromised workload identities, rotate credentials/secrets, review permissions, and monitor for continued suspicious activity. Workload identity risk requires Entra Workload ID Premium licences.

💡 Exam tip: workload identity protection is separate licensing

Human user risk detection requires Entra ID P2. Workload identity risk detection requires Entra Workload ID Premium — a separate licence. The exam may test which licence covers which scenario. If the question mentions a service principal or app registration being flagged as risky, the answer involves Workload ID Premium.

🎬 Video walkthrough

🎬 Video coming soon

ID Protection: Risk-Based Security — SC-300 Module 14

ID Protection: Risk-Based Security — SC-300 Module 14

~12 min

Flashcards

Question

What is the difference between sign-in risk and user risk?

Click or press Enter to reveal answer

Answer

Sign-in risk measures the probability that a specific sign-in is illegitimate (per-sign-in, resets each time). User risk measures the probability that a user's identity is compromised (persists until remediated — password change or admin dismissal). Sign-in risk → require MFA. User risk → require password change.

Click to flip back

Question

What does 'impossible travel' mean in ID Protection?

Click or press Enter to reveal answer

Answer

Sign-ins from two geographic locations that are too far apart given the time between them. Example: a sign-in from London at 10:00 and from Tokyo at 10:30 — physically impossible. It's flagged as medium-to-high sign-in risk. Can produce false positives with VPNs (mitigate with named locations).

Click to flip back

Question

How does self-remediation work for user risk?

Click or press Enter to reveal answer

Answer

When a user risk policy requires password change, the user must: 1) Complete MFA (prove identity), 2) Change their password (eliminate the compromised credential). After successful password change, user risk resets to None. This requires SSPR to be enabled. Without SSPR, only admins can reset the password.

Click to flip back

Question

What licence is needed for workload identity risk detection?

Click or press Enter to reveal answer

Answer

Entra Workload ID Premium — a separate licence from Entra ID P2. P2 covers human user risk detection. Workload ID Premium covers service principals and managed identities. The exam tests this distinction.

Click to flip back

Question

What are the three admin actions for a risky user?

Click or press Enter to reveal answer

Answer

1) Confirm compromised — blocks user, escalates risk, requires admin reset. 2) Dismiss user risk — clears the flag (use for confirmed false positives). 3) Reset password — forces a new password. You can also block sign-in and revoke sessions for immediate containment.

Click to flip back

Knowledge Check

Knowledge Check

A user's credentials appear in a known breach database. ID Protection flags the user with High user risk. Which remediation automatically clears the user risk?

Knowledge Check

Anika sees a sign-in flagged as 'impossible travel' — the user signed in from Auckland at 9 AM and from Singapore at 9:15 AM. However, the user confirms they were using a VPN with a Singapore exit node. What should Anika do?

Knowledge Check

A service principal used by an automated pipeline is flagged with suspicious sign-in activity. Which licence is required to detect and investigate this workload identity risk?


Next up: Global Secure Access: Zero Trust Networking — deploy GSA clients, Private Access, and Internet Access to replace legacy VPN and secure your network with Zero Trust principles.

← Previous

Conditional Access: Advanced Controls & Troubleshooting

Next →

Global Secure Access: Zero Trust Networking

Guided

I learn, I simplify, I share.

A Guide to Cloud YouTube Feedback

© 2026 Sutheesh. All rights reserved.

Guided is an independent study resource and is not affiliated with, endorsed by, or officially connected to Microsoft. Microsoft, Azure, and related trademarks are property of Microsoft Corporation. Always verify information against Microsoft Learn.