4.5.7 Configuring Risk-based Authentication

For information about configuring risk-based authentication, see Risk-based Policies.