Entra ID (Azure AD) Risk Events

Cloud & SaaSAuthentication & AccessCloud Control Plane

Location

Azure Portal > Entra ID > Security > Risk detections (or Microsoft Graph API /identityProtection/riskDetections)

Description

Machine-learning-generated risk detections including anonymous IP usage, impossible travel, malware-linked IPs, password spray detection, leaked credential matches, token anomalies, and suspicious inbox manipulation rules.

Forensic Value

Risk events provide Microsoft threat intelligence context that is not available in raw sign-in logs. A "leaked credentials" detection confirms the user password was found in a breach database. "Anomalous token" detections flag token theft and replay scenarios. Correlating risk event timestamps with sign-in log entries creates a high-confidence timeline of exactly when the identity was compromised and from which infrastructure.

Tools Required

Azure PortalMicrosoft Graph API (/identityProtection/riskDetections)PowerShell

Collection Commands

Graph API

GET https://graph.microsoft.com/v1.0/identityProtection/riskDetections?$filter=detectedDateTime ge 2024-01-01T00:00:00Z&$top=999

Graph API

GET https://graph.microsoft.com/v1.0/identityProtection/riskyUsers?$filter=riskLevel eq 'high'&$top=999

KQL

AADUserRiskEvents | where TimeGenerated > ago(30d) | where RiskLevel == "high" | project TimeGenerated, UserPrincipalName, RiskDetail, RiskEventType, IpAddress, Location

MITRE ATT&CK Techniques

T1078.004T1110T1110.003T1550.001T1556