Risky User Alert Feature

With the security reports in the Microsoft Entra ID, you can gauge the probability of compromised user accounts in your environment. A user flagged for risk is an indicator for a user account that might have been compromised. The risky user represents the probability that a given identity or account is compromised. These risks are calculated offline using Microsoft's internal and external threat intelligence sources including security researchers, law enforcement professionals, security teams at Microsoft, and other trusted sources.

This feature supports the following operations:

  • Account Aggregation

  • Get Object

Note
By default, this feature is enabled for new connectors. If your Microsoft Entra ID instance doesn't require or support the Risky User Alert feature, you must disable the feature by removing attributes from the schema.

Prerequisite

The tenant must have a Microsoft Entra ID P2 license.

Administrator Permissions

To fetch risky user details using MS Graph APIs, the following API permissions must be assigned:

OAuth2.0 Authentication

Type

Permission

Purpose

Client Credentials

Application

IdentityRiskEvent.Read.All

IdentityRiskyUser.Read.All

Aggregate or Get Risky user related information

SAML Bearer Assertion

Refresh Token / AuthCode

JWT Certificate Credentials

Delegated

IdentityRiskEvent.Read.All

IdentityRiskyUser.Read.All

Aggregate or Get Risky user related information

Note
For SAML Bearer Assertion the authenticated user must have the Security Operator role.

Supported Schema Attributes

To manage the risky user alert feature, ensure that the Risky User Alert Supported Attributes are present in the account schema.

Note
Only the default schema attributes are supported. The Account schema cannot be extended for other risk related attributes.