May 2017
Intermediate to advanced
518 pages
10h 6m
English
This phase is basically about automatically classifying suspicious sign-in or user activity. It uses user defined sign-in risk and user risk policies. These policies are described later.
Another feature of this part is the automatic security recommendations (vulnerabilities) based on Azure provided rules.