So, waking up to leaked credentials can be frustrating. Probably since you do not know how exactly they got leaked. Fortunatly Azure AD have some sugestions on what to do.
This is what it looks like in Azure Identity Protection and how you mitigate the impact:
A very high risk, click the risk to see what it is.
Here you see what it was all about, click on the event to se which user
here you see the user. click on the user to get actions on what to do
Here is what yo can do
Here is what I did to mitigate the event.
I simply requested the user for a password change. Keep in mind that the malware that did this might have stolen all other passwords as well. It might also be active on the target device, så MFA might be something you should consider.
Also have the user change passwords on all other services he uses!
You must be logged in to post a comment.