Eric Mark

My feedback

  1. 9 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    4 comments  ·  (General Feedback) » azure.microsoft.com  ·  Flag idea as inappropriate…  ·  Admin →
    Eric Mark shared this idea  · 
    An error occurred while saving the comment
    Eric Mark commented  · 
    An error occurred while saving the comment
    Eric Mark commented  · 

    It appears that the adding the IP address into Conditional Access > Named Location and marking the location as a Trust IP will resolve the issue of the IP being a trusted IP for Sign-In Risk. We have not tested this yet and requires validation.

    However, we have been advised the the EXCLUDE APP feature from the Sign-In Risk Policy has not been added and is a feature request.

    As a result we would like to have a FEATURE REQUEST to have an APP EXCLUSION for Sign-In Risk Policy and User Risk Policy

  2. 4 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    1 comment  ·  (General Feedback) » Availability  ·  Flag idea as inappropriate…  ·  Admin →
    Eric Mark supported this idea  · 
    An error occurred while saving the comment
    Eric Mark commented  · 

    In addition, could we enable Fraud Alert reporting through SMS. We have many users who use SMS authentication and it's very difficult in our organization to cover the user to the authenticator app.

    Also, if "force change password" is not an option, could you add this to a user's risk? Example: User click MFA Fraud, user's risk should increase to medium risk.

  3. 2 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  Azure Active Directory » Other  ·  Flag idea as inappropriate…  ·  Admin →
    Eric Mark shared this idea  · 
  4. 299 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    48 comments  ·  Azure Active Directory » B2C  ·  Flag idea as inappropriate…  ·  Admin →

    We have started the planning for this feature and hope to have a preview by the end of the calendar year. In the meantime, could you respond to aadb2cpreview@microsoft.com with the answers to the following questions:
    - In which scenarios do you plan to force the user to change his/her password?
    - What kind of information (if any) would you like to get back if the user goes through the reset flow?
    - Do you currently or plan to track which users have reset their password?

    Eric Mark supported this idea  · 
  5. 36 votes
    Sign in
    (thinking…)
    Sign in with: Microsoft
    Signed in as (Sign out)

    We’ll send you updates on this idea

    6 comments  ·  Azure Active Directory » Domain Join  ·  Flag idea as inappropriate…  ·  Admin →
    Eric Mark supported this idea  · 

Feedback and Knowledge Base