Clarification on Entra ID P1/P2 Features

Sujit Pochampalli 45 Reputation points
2025-04-08T08:58:03.1266667+00:00

Hello Team,

Could you clarify the following points?

  1. What falls within the scope of risk-based policies? Specifically, in what scenarios do they help provide protection?
  2. Similarly, how do identity protection, privileged identity management, identity governance, and advanced threat detection benefit us?
Microsoft Entra ID
Microsoft Entra ID
A Microsoft Entra identity service that provides identity management and access control capabilities. Replaces Azure Active Directory.
24,188 questions
0 comments No comments
{count} votes

Accepted answer
  1. Rahul Gupta 235 Reputation points Microsoft Employee
    2025-04-08T09:26:11.4533333+00:00

    Hello ,

    Thank you for reaching out Microsoft community.

    PFB answers to your queries as needed

    Risk-based policies are typically used in companies like cybersecurity, financial institutions, healthcare, and more. They assess the risk of an activity or event based on certain factors, such as data sensitivity, threat levels, and access privileges, and then apply mitigation measures.

    here are few of the features that falls under risk based policies

    1. Adaptive Access Control
    2. Sensitive Data Handling
    3. Automated Incident Response
    4. Compliance Management

    how do identity protection, privileged identity management, identity governance, and advanced threat detection benefit us?

    Here is how PIM / Identity Governance / Advance threat detection benefit you as a customer

    all of these are security mechanisms that help protect against unauthorized access, abuse of privileges, and emerging cyber threats by providing advanced monitoring, control, and mitigation strategies.

    1. Privileged Identity Management (PIM):
      • Benefit: PIM manages and controls access for users who have elevated privileges, such as system administrators or root users.
    2. Identity Governance:
      • Benefit: This process ensures that only the right users have access to the right resources at the right time, based on their roles and responsibilities within the organization.
    3. Advanced Threat Detection:
      • Benefit: Advanced threat detection uses machine learning, behavioral analytics, and other sophisticated techniques to detect threats in real-time by identifying unusual patterns of behavior that might indicate malicious activity

    Do net hesitate to request any clarification that you need in terms of implementing any of these and we can definitely guide with the best practices.

    Regards

    Rahul Gupta

    Microsoft Customer Support

    1 person found this answer helpful.

0 additional answers

Sort by: Most helpful

Your answer

Answers can be marked as Accepted Answers by the question author, which helps users to know the answer solved the author's problem.