@Venkata Jagadeep no i am not using passwordless sign in and no the user is not automatically blocked
When a user reports a MFA fraud, only one thing happens and not the rest according to a Microsoft article
according to this article:
when a user reports a fraudulent MFA (i.e. pressing 0# on the phone) the user is supposed to be made "high risk" and IT people should be able to see this report in:
Sign in logs
Audit logs
Risk Detection report
i have tested this and the only thing that happens is i see a "failure" in the users sign in logs. none of the other things happen and the user is not marked as "high risk" i do have it enabled:
Microsoft Entra ID
2 answers
Sort by: Most helpful
-
-
Venkata Jagadeep 1,400 Reputation points Microsoft External Staff Moderator
2025-05-21T02:55:06.8333333+00:00 Hello Michael Menzie,
Microsoft Entra ID Protection determines the likelihood that a sign-in request is unauthorized for each login attempt.
To test risky sign-in a simulation with an anonymous IP address can be easily and quickly performed using the Tor Browser.
Start the Tor Browser and navigate to https://aka.ms/myapps
Sign in with your account and the sign-in will appear in the Risk Detection report after approximately 15 minutes
The below document shows the types of risk detections in Entra-ID Identity Protection.
https://learn.microsoft.com/en-us/entra/id-protection/concept-identity-protection-risks
The reason why your sign-in attempt from phone is not showing as risky sign-in is that you use your phone to sign-in regularly, Microsoft Algorithms will identify those sign-ins as legitimate sign-ins.
When you try from a device which you didn't sign-in regularly from un-known ip address (external and also not from your home) it might show as risky sing-in attempt.