1.5 Entra ID Protection
Entra ID Protection is arguably the most important component in this entire ecosystem. Identity is the foundation of every investigation scenario in this course. AiTM phishing (Module 13) — you detect it in sign-in logs. BEC (Module 14) — you trace account compromise in sign-in logs. Token replay (Module 16) — you find it in non-interactive sign-in logs. Conditional access is the control that prevents most of these attacks from succeeding in the first place.
Every investigation scenario in this course starts or passes through Entra ID sign-in logs. Conditional access is the control that prevents most attacks from succeeding. If you only read one subsection in depth, make it this one.
Understanding Entra ID Protection is not one subsection among nine — it is the foundation that everything else builds on. Module 4 goes deep on sign-in log investigation. This subsection maps the architecture.
Risk Engine. Continuously evaluates every sign-in and every user for risk indicators. Two types of risk. Sign-in risk: is this specific authentication event suspicious? Detection types include unfamiliar location, anonymous IP, impossible travel, token issuer anomaly, password spray, and AiTM-detected phishing. User risk: has this user’s account been compromised? Detection types include leaked credentials found in dark web dumps, anomalous user activity, and threat intelligence indicators. Risk levels are low, medium, and high.
Conditional Access. The policy engine that evaluates every authentication request against defined conditions — who is signing in, from where, on what device, to which application, at what risk level — and enforces access decisions: allow, block, require MFA, require a compliant device, require a password change, limit the session. This is the primary preventive security control in the M365 ecosystem. Correctly configured conditional access stops most attack chains before any investigation is needed.
Authentication Methods. MFA configuration, passwordless authentication (FIDO2 keys, Windows Hello for Business, Microsoft Authenticator), and authentication strengths. Controls how users prove their identity and how strongly that proof is trusted.
Identity Governance. Access reviews, entitlement management, and Privileged Identity Management (PIM). Controls who has access to what and ensures that access remains appropriate over time.
Sign-In Logs. Every authentication event recorded with: user, application, IP address, location, device, client app, conditional access result, risk level, MFA result, and authentication method. This is the single most queried data source in security investigations.
Audit Logs. Every administrative change in the directory: user creation and deletion, group membership changes, role assignments, policy modifications, application registrations.
Key data tables
SigninLogs — interactive user sign-ins. AADNonInteractiveUserSignInLogs — app-based and token-based sign-ins (critical for token replay detection). AADServicePrincipalSignInLogs — application and service principal authentication. AADManagedIdentitySignInLogs — managed identity authentication. AuditLogs — directory changes.
How it connects
Sign-in risk signals are consumed by conditional access in real time. User risk signals trigger automated remediation (forced password change, MFA re-registration). Risk detections generate alerts in the Defender XDR incident queue. Sign-in and audit logs are ingestible into Sentinel for custom detections and long-term retention. Conditional access integrates with Defender for Cloud Apps (session control) and Intune (device compliance).
Key takeaways
- Identity is the foundation — every investigation starts with sign-in logs
- Two risk types: sign-in risk (is this authentication suspicious?) and user risk (is this account compromised?)
- Conditional access is the primary preventive control in the M365 ecosystem
SigninLogsandAADNonInteractiveUserSignInLogsare the most queried tables in security investigations- Module 4 teaches sign-in log investigation in depth — this subsection maps the architecture
Licensing
Entra ID P1 includes conditional access, basic sign-in logs, and MFA (included in M365 E3 and Business Premium). Entra ID P2 adds risk-based conditional access, risk detections, the identity protection dashboard, PIM, and access reviews (included in M365 E5 or available as an add-on).
Investigation decision: High-risk sign-in detected
Check your understanding
1. What is the difference between sign-in risk and user risk?
2. Why is AADNonInteractiveUserSignInLogs critical for token replay detection?
3. A conditional access policy requires MFA for all users. An AiTM attacker still gains access. Why?
4. Which conditional access condition would most effectively block a stolen token from an unmanaged device?