Final answer:
To use sign-in risk detections from a conditional access policy with a Microsoft 365 E3 subscription, the first step is to enable Azure AD Identity Protection. This enables the creation of a sign-in risk policy which evaluates risk in real-time.
Step-by-step explanation:
To use sign-in risk detections from a conditional access policy with your Microsoft 365 E3 subscription, you should first enable Azure AD Identity Protection. This feature allows you to create a sign-in risk policy, which evaluates the risk associated with each sign-in attempt in real-time.
After enabling Azure AD Identity Protection, you can configure a conditional access policy that utilizes the sign-in risk detections. In the policy, you can specify actions to take based on the risk level, such as requiring multi-factor authentication or blocking access entirely.
By following these steps, you can enhance the security of your organization's Microsoft 365 E3 subscription and protect against potential security risks.
If your company has a Microsoft 365 E3 subscription and you need to use sign-in risk detections from a conditional access policy, the first step is to ensure that you have Azure Active Directory (Azure AD) Premium P2 licenses. This is because sign-in risk policies are a feature of Azure AD Identity Protection, which requires Azure AD Premium P2.
If you do not have the required licenses, you will need to acquire them. After confirming the licensing, you can configure sign-in risk policies within the Azure portal. Here, you'll define what constitutes a risk, set your desired risk levels, and determine the corresponding access controls or actions for users.