4.5.7
Configuring Risk-based Authentication
For information about configuring risk-based authentication, see
Risk-based Policies
.