Skip to content

Commit 057af05

Browse files
authored
Merge pull request #190942 from MicrosoftDocs/main
3/08 AM Publish
2 parents b934ee3 + 9fcab14 commit 057af05

File tree

82 files changed

+1243
-39882
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

82 files changed

+1243
-39882
lines changed

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,10 @@
11
{
22
"redirections": [
3+
{
4+
"source_path": "articles/storage/blobs/storage-ios-how-to-use-blob-storage.md",
5+
"redirect_url": "/previous-versions/azure/storage/blobs/storage-ios-how-to-use-blob-storage",
6+
"redirect_document_id": false
7+
},
38
{
49
"source_path": "articles/virtual-machines/linux/login-using-aad.md",
510
"redirect_url": "/previous-versions/azure/virtual-machines/linux/login-using-aad",

articles/active-directory-b2c/configure-authentication-sample-web-app-with-api.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -62,14 +62,14 @@ A computer that's running either:
6262

6363
# [Visual Studio](#tab/visual-studio)
6464

65-
* [Visual Studio 2019 16.8 or later](https://visualstudio.microsoft.com/downloads/?utm_medium=microsoft&utm_source=docs.microsoft.com&utm_campaign=inline+link&utm_content=download+vs2019) with the **ASP.NET and web development** workload
66-
* [.NET 5.0 SDK](https://dotnet.microsoft.com/download/dotnet)
65+
* [Visual Studio 2022 17.0 or later](https://visualstudio.microsoft.com/downloads/?utm_medium=microsoft&utm_source=docs.microsoft.com&utm_campaign=inline+link&utm_content=download+vs2019) with the **ASP.NET and web development** workload
66+
* [.NET 6.0 SDK](https://dotnet.microsoft.com/download/dotnet)
6767

6868
# [Visual Studio Code](#tab/visual-studio-code)
6969

7070
* [Visual Studio Code](https://code.visualstudio.com/download)
7171
* [C# for Visual Studio Code (latest version)](https://marketplace.visualstudio.com/items?itemName=ms-dotnettools.csharp)
72-
* [.NET 5.0 SDK](https://dotnet.microsoft.com/download/dotnet)
72+
* [.NET 6.0 SDK](https://dotnet.microsoft.com/download/dotnet)
7373

7474
---
7575

20.3 KB
Loading
3.49 KB
Loading

articles/active-directory/reports-monitoring/toc.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -130,6 +130,8 @@
130130
href: workbook-conditional-access-gap-analyzer.md
131131
- name: Cross-tenant access activity
132132
href: workbook-cross-tenant-access-activity.md
133+
- name: Risk analysis
134+
href: workbook-risk-analysis.md
133135
- name: Sensitive Operations Report
134136
href: workbook-sensitive-operations-report.md
135137
- name: Recommendations
Lines changed: 107 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,107 @@
1+
---
2+
3+
title: Identity protection risk analysis workbook in Azure AD | Microsoft Docs
4+
description: Learn how to use the identity protection risk analysis workbook.
5+
services: active-directory
6+
documentationcenter: ''
7+
author: MarkusVi
8+
manager: karenho
9+
editor: ''
10+
11+
ms.service: active-directory
12+
ms.topic: reference
13+
ms.workload: identity
14+
ms.subservice: report-monitor
15+
ms.date: 03/08/2022
16+
ms.author: markvi
17+
ms.reviewer: sahandle
18+
19+
ms.collection: M365-identity-device-management
20+
---
21+
22+
# Identity protection risk analysis workbook
23+
24+
Azure AD Identity Protection detects, remediates, and prevents compromised identities. As an IT administrator, you want to understand risk trends in your organizations and opportunities for better policy configuration. With the Identity Protection Risky Analysis Workbook, you can answer common questions about your Identity Protection implementation.
25+
26+
This article provides you with an overview of this workbook.
27+
28+
29+
## Description
30+
31+
![Workbook category](./media/workbook-risk-analysis/workbook-category.png)
32+
33+
34+
As an IT administrator, you need to understand trends in identity risks and gaps in your policy implementations to ensure you are best protecting your organizations from identity compromise. The identity protection risk analysis workbook helps you analyze the state of risk in your organization.
35+
36+
**This workbook:**
37+
38+
- Provides visualizations of where in the world risk is being detected.
39+
40+
- Allows you to understand the trends in real time vs. Offline risk detections.
41+
42+
- Provides insight into how effective you are at responding to risky users.
43+
44+
45+
46+
47+
48+
## Sections
49+
50+
This workbook has five sections:
51+
52+
- Heatmap of risk detections
53+
54+
- Offline vs real-time risk detections
55+
56+
- Risk detection trends
57+
58+
- Risky users
59+
60+
- Summary
61+
62+
63+
64+
65+
66+
67+
68+
## Filters
69+
70+
71+
This workbook supports setting a time range filter.
72+
73+
74+
![Set time range filter](./media/workbook-risk-analysis/time-range-filter.png)
75+
76+
There are more filters in the risk detection trends and risky users sections.
77+
78+
Risk Detection Trends:
79+
80+
- Detection timing type (real-time or offline)
81+
82+
- Risk level (low, medium, high, or none)
83+
84+
Risky Users:
85+
86+
- Risk detail (which indicates what changed a user’s risk level)
87+
88+
- Risk level (low, medium, high, or none)
89+
90+
91+
## Best practices
92+
93+
94+
- **[Enable risky sign-in policies](../identity-protection/concept-identity-protection-policies.md)** - To prompt for multi-factor authentication (MFA) on medium risk or above. Enabling the policy reduces the proportion of active real-time risk detections by allowing legitimate users to self-remediate the risk detections with MFA.
95+
96+
- **[Enable a risky user policy](../identity-protection/howto-identity-protection-configure-risk-policies.md#user-risk-with-conditional-access)** - To enable users to securely remediate their accounts when they are high risk. Enabling the policy reduces the number of active at-risk users in your organization by returning the user’s credentials to a safe state.
97+
98+
99+
100+
101+
102+
## Next steps
103+
104+
- To learn more about identity protection, see [What is identity protection](../identity-protection/overview-identity-protection.md).
105+
106+
- For more information about Azure AD workbooks, see [How to use Azure AD workbooks](howto-use-azure-monitor-workbooks.md).
107+

articles/active-directory/verifiable-credentials/TOC.yml

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -47,10 +47,10 @@
4747
items:
4848
- name: Sample Applications
4949
href: https://github.com/Azure-Samples/active-directory-verifiable-credentials
50-
- name: Sample Issuer
51-
href: https://didvc-issuer-sample.azurewebsites.net/
52-
- name: Sample Verifier
53-
href: https://didvc-verifier-sample.azurewebsites.net/
50+
# - name: Sample Issuer
51+
# href:
52+
- name: End to End Demo
53+
href: https://woodgroveemployee.azurewebsites.net/
5454
- name: Reference
5555
expanded: true
5656
items:

articles/active-directory/verifiable-credentials/decentralized-identifier-overview.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -94,9 +94,9 @@ The scenario we use to explain how VCs work involves:
9494

9595

9696

97-
Today, Alice provides a username and password to log onto Woodgrove’s networked environment. Woodgrove is deploying a VC solution to provide a more manageable way for Alice to prove she is an employee of Woodgrove. Proseware is using a VC solution compatible with Woodgrove's VC solution and they accept credentials issued by Woodgrove as proof of employment.
97+
Today, Alice provides a username and password to log onto Woodgrove’s networked environment. Woodgrove is deploying a verifiable credential solution to provide a more manageable way for Alice to prove that she is an employee of Woodgrove. Proseware accepts verifiable credentials issued by Woodgrove as proof of employment to offer corporate discounts as part of their corporate discount program.
9898

99-
The issuer of the credential, Woodgrove Inc., creates a public key and a private key. The public key is stored on ION. When the key is added to the infrastructure, the entry is recorded in a blockchain-based decentralized ledger. The issuer provides Alice the private key that is stored in a wallet application. Each time Alice successfully uses the private key the transaction is logged in the wallet application.
99+
Alice requests Woodgrove Inc for a proof of employment verifiable credential. Woodgrove Inc attests Alice's identiy and issues a signed verfiable credential that Alice can accept and store in her digital wallet application. Alice can now present this verifiable credential as a proof of employement on the Proseware site. After a succesfull presentation of the credential, Prosware offers discount to Alice and the transaction is logged in Alice's wallet application so that she can track where and to whom she has presented her proof of employment verifiable credential.
100100

101101
![microsoft-did-overview](media/decentralized-identifier-overview/did-overview.png)
102102

articles/analysis-services/analysis-services-create-bicep-file.md

Lines changed: 3 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Quickstart - Create an Azure Analysis Services server resource by using Bicep
33
description: Quickstart showing how to an Azure Analysis Services server resource by using a Bicep file.
4-
ms.date: 03/04/2022
4+
ms.date: 03/08/2022
55
ms.topic: quickstart
66
ms.service: azure-analysis-services
77
ms.author: jgao
@@ -73,18 +73,13 @@ When no longer needed, use the Azure portal, Azure CLI, or Azure PowerShell to d
7373
# [CLI](#tab/CLI)
7474

7575
```azurecli-interactive
76-
echo "Enter the Resource Group name:" &&
77-
read resourceGroupName &&
78-
az group delete --name $resourceGroupName &&
79-
echo "Press [ENTER] to continue ..."
76+
az group delete --name exampleRG
8077
```
8178

8279
# [PowerShell](#tab/PowerShell)
8380

8481
```azurepowershell-interactive
85-
$resourceGroupName = Read-Host -Prompt "Enter the Resource Group name"
86-
Remove-AzResourceGroup -Name $resourceGroupName
87-
Write-Host "Press [ENTER] to continue..."
82+
Remove-AzResourceGroup -Name exampleRG
8883
```
8984

9085
---

articles/application-gateway/how-application-gateway-works.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -53,11 +53,11 @@ When an application gateway sends the original request to the backend server, it
5353
5454
### Modifications to the request
5555

56-
Application gateway inserts five additional headers to all requests before it forwards the requests to the backend. These headers are x-forwarded-for, x-forwarded-proto, x-forwarded-port, x-original-host, and x-appgw-trace-id. The format for x-forwarded-for header is a comma-separated list of IP:port.
56+
Application gateway inserts six additional headers to all requests before it forwards the requests to the backend. These headers are x-forwarded-for, x-forwarded-port, x-forwarded-proto, x-original-host, x-original-url, and x-appgw-trace-id. The format for x-forwarded-for header is a comma-separated list of IP:port.
5757

5858
The valid values for x-forwarded-proto are HTTP or HTTPS. X-forwarded-port specifies the port where the request reached the application gateway. X-original-host header contains the original host header with which the request arrived. This header is useful in Azure website integration, where the incoming host header is modified before traffic is routed to the backend. If session affinity is enabled as an option, then it adds a gateway-managed affinity cookie.
5959

60-
x-appgw-trace-id is a unique guid generated by application gateway for each client request and presented in the forwarded request to the backend pool member. The guid consists of 32 alphanumeric characters presented without dashes (for example: ac882cd65a2712a0fe1289ec2bb6aee7). This guid can be used to correlate a request received by application gateway and initiated to a backend pool member via the transactionId property in [Diagnostic Logs](application-gateway-diagnostics.md#diagnostic-logging).
60+
X-appgw-trace-id is a unique guid generated by application gateway for each client request and presented in the forwarded request to the backend pool member. The guid consists of 32 alphanumeric characters presented without dashes (for example: ac882cd65a2712a0fe1289ec2bb6aee7). This guid can be used to correlate a request received by application gateway and initiated to a backend pool member via the transactionId property in [Diagnostic Logs](application-gateway-diagnostics.md#diagnostic-logging).
6161

6262
You can configure application gateway to modify request and response headers and URL by using [Rewrite HTTP headers and URL](rewrite-http-headers-url.md) or to modify the URI path by using a path-override setting. However, unless configured to do so, all incoming requests are proxied to the backend.
6363

0 commit comments

Comments
 (0)