- 27 Jun 2025
- 2 Minutes to read
- PDF
Response Actions for Entra ID Protection
- Updated on 27 Jun 2025
- 2 Minutes to read
- PDF
The Red Canary Automation interface provides the following response action for Microsoft Entra ID Protection:
Mark User Compromised
Marks a user account as "confirm compromised," which automatically elevates their risk level to high within the Entra ID environment. The user's risk level can then be used by conditional access policies in Entra ID to require a password reset, block sign in, or apply stricter access controls.
The necessary Azure permissions will be requested automatically when you add the action to a playbook. For more information about the permissions required, see Permission Requirements for Microsoft.
Prerequisites
You have a Microsoft Entra ID P2 License, which is required for the underlying Entra ID Protection capabilities that power this response action. See License Requirements for Microsoft for more information.
You have the Global Administrator role in Azure
You have an active Red Canary integration that streams the relevant Microsoft Entra ID identity logs. Typically this will be either an Entra ID integration or a Microsoft 365 integration.
Adding Entra ID Protection Response Actions to a Playbook
To add one or more Entra ID Protection response actions to an Automate playbook:
From the Red Canary portal navigation menu, select Automation > Playbooks.
In the Playbooks section, open an existing Automate playbook or make a new one by clicking +Create New Playbook.
Assign or edit the playbook name and description, then click +Add Action.
From the Microsoft Entra ID Identity Protection section, add the required action to the playbook.
Enter your Azure Tenant ID.
In order to set the required Entra ID permissions for this action, click the consent link and log in to your Microsoft account as a Global Administrator.
Review the permissions requested by the Red Canary app and click Accept.
Note
The first time you add an Entra ID response action, accepting these permissions will automatically install the Red Canary + Azure AD Response Actions enterprise app in Azure.
After you’ve accepted the permissions request, check the Confirm Microsoft Automate API Access Granted box.
[OPTIONAL] Check the Require Approval box and provide contact details if you want someone to approve this action before it executes. This will apply to both manual and automatically-triggered executions.
Click Save.
Manually Executing the Reponse Actions
To execute the Entra ID Protection response actions manually:
Open the playbook and click Run.
Search for the user identity in the drop down then click Run.
Click the Follow along… link to view the results of the action.
If you set the action to Require Approval, you’ll need to approve it before it can execute.
Automatically Executing the Response Actions
To execute the Entra ID Protection response actions automatically, link an appropriate trigger to the playbook. For more information, see Customize When a Playbook is Run With Triggers.