View risky users
On the risky user list, search and filter to find a specific risky user, risk state, risk level and more, and use the available actions to Manage risky users.
To view and manage your customer's risky users in Cloud Commander, your customer must have a user in the tenant with Microsoft Entra ID P2 license. Microsoft requires a P2 license to access the risky users API, which Cloud Commander uses to gather the data.
Requirements
- You must be assigned the Identity Protection Writer or Reader role scoped to the tenant.
View risky users
- In the , select Security > Risky Users.
- Use the global customer selector to choose the customers you want to view data for.
- Filter or search to find users at risk. For example, use the Risk state or Risk level column filters to quickly see users at risk.
The list of risky users displays. You can filter and search the data, choose the columns you want to display, and export to Microsoft Excel. See Navigation and tools for table options.
Risk column descriptions
Column | Description | |||
---|---|---|---|---|
Risk state | State of the user's risk. The possible values are:
|
|||
Risk level | An indicator of the probability that the user's account is compromised. The possible values are low, medium, high, hidden, none. | |||
Risk detail | Details that contributed to the risk level. The possible values are:
|
|||
Risk updated | The date and time the risky user was last updated. |
Next steps
Related articles
Updated: Nov 21, 2024