Thank you for posting this in Microsoft Q&A.
As I understand you want to configure MFA for users based on risky sign-in attempts to Azure resources.
In Azure there is a feature called as Identity protection. Microsoft Entra ID Protection helps organizations detect, investigate, and remediate identity-based risks. These identity-based risks can be further fed into tools like Conditional Access to make access decisions or fed back to a security information and event management (SIEM) tool for further investigation and correlation.
In Identity protection, User and Sign-in risks are already defined and they are differentiated in multiple categories.
You can follow below article to know more about the risks definitions,
Now there are 2 types of detections,
- Real time detections.
- Offline detections.
ID Protection utilizes techniques to increase the precision of user and sign-in risk detections by calculating some risks in real-time or offline after authentication. Detecting risk in real-time at sign-in gives the advantage of identifying risk early so that customers can quickly investigate the potential compromise. On detections that calculate risk offline, they can provide more insight as to how the threat actor gained access to the account and the impact on the legitimate user. Some detections can be triggered both offline and during sign-in, which increases confidence in being precise on the compromise.
Detections triggered in real-time take 5-10 minutes to surface details in the reports. Offline detections take up to 48 hours to surface in the reports, as it takes time to evaluate properties of the potential risk.
Yes, you can configure triggering alert and also sending notifications, when there is user risk or sign-in detected.
To configure risk policies, you can refer below article,
Let me know if you have any further questions.
Please "Accept the answer" if the information helped you. This will help us and others in the community as well.