
User accounts are the most targeted entry point in Microsoft 365. Attackers sign in using stolen credentials, accessed accounts, or unusual sign-in activity that may go unnoticed without proper controls.
Microsoft Entra ID Protection monitors every sign-in and user account, evaluates activity based on threat signals, and takes action before access is allowed.
This guide covers setup steps and how to detect and block account-related threats in Microsoft 365.
Contents
- 1 Microsoft Entra ID Protection in Microsoft 365
- 2 Microsoft Entra ID Protection in Microsoft 365 Common Risk Signals Tracked by Entra ID Protection
- 3 Step 1: Access the Entra ID Protection Dashboard
- 4 Step 2: Sign-In Risk Policy Setup
- 5 Step 3: User Risk Policy Setup
- 6 Step 4: Enable Self-Service Password Reset (SSPR)
- 7 Step 5: Review Identity Protection Reports
- 8 How Entra ID Protection Connects With Conditional Access
- 9 Microsoft 365 Identity Security with Netstager Technologies
Microsoft Entra ID Protection in Microsoft 365
Microsoft Entra ID Protection is a security feature available in Microsoft 365 E5 and Entra ID P2 plans. It monitors sign-in activity and user behaviour, using Microsoft’s threat data and analysis to identify suspicious patterns early.
MFA confirms a user’s identity during sign-in. Entra ID Protection adds further checks by reviewing how and where the sign-in happens, and whether the account shows signs of being accessed by someone else over time.
It tracks two types of risk:
| Risk Type | What it detects | Example |
|---|---|---|
| Sign-In Risk | A specific sign-in attempt appears unusual | Login from an anonymous IP or an unfamiliar location |
| User Risk | A user account shows signs of unauthorized access over time | Credentials found in a known data leak |
Licensing Requirements
Microsoft Entra ID Protection is available with Microsoft 365 E5 or Entra ID P2. Organizations using Business Premium or E3 do not have access to risk-based policies.
If you are on Business Premium, you can still use location-based and device-based Conditional Access Policies, as covered in How to Restrict Microsoft 365 Access by Location, Device and Risk Using Conditional Access Policies. However, automatic detection of sign-in and user risk requires upgrading to E5.
Microsoft Entra ID Protection in Microsoft 365 Common Risk Signals Tracked by Entra ID Protection
| Risk Signal | Details |
|---|---|
| Leaked credentials | User password found in a known breach database or dark web source |
| Impossible travel | Sign-in from India, then from the US within a short time |
| Anonymous IP address | Sign-in from a known VPN, proxy, or Tor exit node |
| Malware-linked IP | Sign-in from an IP connected to botnet or malware activity |
| Password spray | Multiple failed attempts across many accounts from a single IP |
| Unfamiliar sign-in properties | Sign-in from a new device, browser, or location not seen before for the account |
Step 1: Access the Entra ID Protection Dashboard
Go to:entra.microsoft.com → Protection → Identity Protection
- Number of users marked as risky
- Recent risky sign-ins
- Active risk detections
- Recommendations based on your tenant activity
Step 2: Sign-In Risk Policy Setup
A sign-in risk policy responds to suspicious individual sign-in attempts. When a sign-in is marked as medium or high risk, the policy requires MFA or blocks access before the session starts.
| Setting | Details |
|---|---|
| Users | All users (exclude emergency access account) |
| Sign-in risk level | Medium and above |
| Access control | Require multi-factor authentication |
| Policy enforcement | Enabled |
Step 3: User Risk Policy Setup
User risk is different from sign-in risk. It is based on activity linked to the account, such as leaked credentials or repeated suspicious actions. A high user risk means the account may be used by someone else, not just a single unusual sign-in.
| Setting | Details |
|---|---|
| Users | All users (exclude emergency access account) |
| User risk level | High |
| Access control | Allow access, require password change |
| Policy enforcement | Enabled |
Step 4: Enable Self-Service Password Reset (SSPR)
| Setting | Details |
|---|---|
| SSPR enabled for | All users |
| Authentication methods | Mobile app notification, email, mobile phone |
| Registration | Require users to register at next sign-in |
| Re-confirm authentication info | Every 180 days |
Step 5: Review Identity Protection Reports
After enabling these policies, review the following reports regularly.
Go to:entra.microsoft.com → Protection → Identity Protection
• Risky sign-ins report – Shows sign-ins marked with a risk level and the reason. Use this to confirm your sign-in risk policy is triggering correctly and to review individual events. For email-related threats, review this along with your Mail Flow Rules to identify patterns.
• Risky users report – Shows user accounts currently marked as at risk. From here, you can dismiss the risk, confirm account misuse, or require a password reset if needed.
• Risk detections report – Shows each signal detected, such as leaked credentials or unusual travel events. This provides a detailed view of detected activity.
How Entra ID Protection Connects With Conditional Access
| Tool | Purpose |
|---|---|
| Entra ID Protection | Identifies risk signals and assigns risk levels to sign-ins and users |
| Conditional Access | Uses those risk levels to require MFA, block access, or require a password reset |
Microsoft 365 Identity Security with Netstager Technologies
Entra ID Protection needs correct setup and regular review. Missing SSPR setup, incorrect risk levels, or unreviewed risky user reports can leave gaps even when policies are active.
Netstager Technologies, an authorized Microsoft 365 partner in Kerala, manages identity protection setup including Entra ID Protection configuration, risk policy setup, SSPR setup, Conditional Access connection, and ongoing report review.
Our Identity Protection Services Include
|
Identity Security Assessment
Review of your Microsoft 365 tenant, licensing, existing policies, and gaps before new policies are created.
|
|
Entra ID Protection Setup
Setup of sign-in risk and user risk policies based on your user groups and Microsoft 365 plan.
|
|
SSPR Setup
Setup and testing of Self-Service Password Reset to support password reset during risk events.
|
|
Conditional Access Connection
Make sure risk-based Conditional Access Policies use Entra ID Protection signals correctly.
|
|
Ongoing Monitoring
Regular review of risky sign-ins, risky users, and risk detection reports, with action based on findings.
|
To start, migrate, or maintain your Microsoft 365 setup, connect with Netstager Technologies.


