This guide will show an administrator how to reset the password for a user if the risk associated with the account has been determined to be true.
Role Requirements
Procedure Scope: Administrators
Required Group Membership: Admin.Security
Handbook Reference
Package: TBD
Domain: TBD
Modifies: TBD
Initiating the Password reset action should be carried out once a Risky User has been Blocked from being able to successfully authenticate during sign-in prompts or MFA prompts.
Risky Users Password Reset Action
- Navigate to the Risky Users – Azure Active Directory portal, locate and select a desired risky user from the list.
- From the Risky User Details flyout, select the Reset password action.
- A new flyout will be displayed detailing that a Temporary Password will be assigned to the user and upon the user's next sign-in attempt they will be forced to change their password. Select Reset Password to display the Temporary Password for the User.
- Make sure to capture the Temporary Password that is displayed, this will need to be provided to the user when they are prompted for a password reset upon their next authentication attempt.
- Once the Reset Password action has been successfully carried out, it is best practice to also initiate the Revoke Sessions action to ensure that all active sessions that are utilizing the previously reset password are also terminated. This can be done by navigating to the Users – Azure Active Directory portal, locate and select the account that has recently has its password reset.
- On the Overview page for the selected User Account, locate and select the Revoke Sessions action, a disclaimer will be displayed detailing that all active sessions will be terminated, and the user will be forced to re-authenticate on all devices. Select Yes to successfully revoke all active sessions for the selected account.
- Carrying out the listed actions above should result in the selected user having their previously stored Password being successfully removed and having all their active sessions utilizing this revoked Password also being terminated. Upon their next authentication attempt, make sure to supply the User with the previously captured Temporary Password since the system has already modified their previously stored password to reflect the generated Temporary Password. They will be prompted with a new password prompt requiring a new password be configured once the authentication attempt has been verified and will be re-required to upload the Temporary Password one last time before the creation of a new password.
Need Assistance?
Reach out to your Customer Success Manager to discuss how a Sittadel cybersecurity analyst can assist in managing these tasks for you. New to our services? Inquire about arranging a consultation to explore optimizing your Azure environment for painless management.