2 min read
New Premium Features for July
{% video_player "embed_player" overrideable=False, type='hsvideo2', hide_playlist=True, viral_sharing=False, embed_button=False, autoplay=False,...
Risky user detections are one of the leading indicators of account compromise in Microsoft 365. By default, you will not get alerted as an MSP for a new risky user. I just talked to an MSP last week who had a client that wired 500k to a fraudulent bank account after the user account was compromised. If they had received and responded to the risk detection, this might have been avoided. In this article, I will walk you though:
Microsoft is watching for signs that something might be wrong with a user’s account. They check billions of logins every day to look for danger.
This danger could come from things like:
Bad guys using stolen passwords
A login coming from a place that doesn’t make sense
Someone using a fake Microsoft page to trick a user
Microsoft uses machine learning to look at things like:
Where the person is logging in from
What kind of device or browser they are using
If they’ve done this before or if it looks strange
When we talk about likelihood, this is how they are going to classify a detection as Low, Medium, or High Risk. Lets say we have this company, Stark Industries and normally users are all signing in to their Microsoft account from Denver, CO. If a user, Tony, goes on vacation for a week and signs in from Boise, Idaho but it is 8 hours after his last sign-in, this may not really signal any risk. On the other hand, if Tony signs in to Tokyo, Japan an hour after signing in from San Diego, that should cause a higher risk to be flagged as that is impossible travel.
A company got tricked and lost $500,000.
Here’s how it happened:
The CEO got a phishing email — a fake message that looked real.
The email had a link to a fake Microsoft page.
The CEO entered their username, password, and MFA code.
The bad guy used this to steal their token (this is called token theft).
Now the attacker:
Logged into the account
Set up inbox rules to hide what they were doing
Added a sneaky app called eM Client to download all the emails
Registered their own MFA so they could stay in the account
Found the person who handles money and pretended to be a vendor
Said: “Hey, our bank info has changed. Send money here.”
And just like that, $500,000 was gone.
What action is taken by default even if the user is detected with high risk? In most cases (especially if you are just on licensing like Business Premium)…nothing. Thats right. The user will be detected and the rest of the compromise will play out.
This is what brings us to the Microsoft paywall problem. In order to get better risk detections and automated responses to risk, we need to be on higher levels of licensing. Aka Entra P2 or an E5 plan. In these events, one of the first things you would want to do is either block the user sign in or reset their password. In doing so you can stop or mitigate things going on with the account until you ensure the breach has been mitigated.
As MSPs without automated detection and response, we have both a scalability problem (i.e. we can’t potentially monitor all of the alerts being generated across all clients) and we increase risk of damages by not being able to respond fast enough. This is why people turn to purchasing 3rd party tools to layer on like Huntress, Blackpoint, and SaaS alerts which solve for this gap.
If you do have E2 or E5 (or the E5 add-on that can be bolted on to business plans) you can configure the following:
Imagine a world where you weren’t reactively responding to account breaches and instead, had proper policies in place to prevent them altogether? While it sounds very “perfect world”, there are a few policies that you can put into place that could stop a majority of these attacks in their tracks. Today I will talk about one of my favorites that is very achievable for most organizations. Its a conditional access policy to Require a Managed Device. This policy actually prevents things like token theft via AiTM phishing and would prevent use cases where an attacker is maintaining persistence by doing something such as registering another MFA method and trying to resign back in.
Prerequisites:
Conditional Access Policy Settings
If Hybrid:
If Cloud Only:
Risky Users in Microsoft 365 aren’t just a dashboard — they’re your early warning system. Configure these alerts for your security team to review and consider placing more advanced protections in place.
2 min read
{% video_player "embed_player" overrideable=False, type='hsvideo2', hide_playlist=True, viral_sharing=False, embed_button=False, autoplay=False,...
19 min read
Microsoft Updates for July 2025 Microsoft released a number of updates during July, including Teams, Outlook, Entra, Intune, Copilot, and...
9 min read
Risky user detections are one of the leading indicators of account compromise in Microsoft 365. By default, you will not get alerted as an...