Skip to content

Commit 13bb4db

Browse files
authored
Merge pull request #172283 from MicrosoftDocs/master
9/13 PM Publish
2 parents 9193a8a + 5089257 commit 13bb4db

File tree

659 files changed

+2024
-1353
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

659 files changed

+2024
-1353
lines changed

.github/workflows/stale.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@ name: Mark stale pull requests
22

33
on:
44
schedule:
5-
- cron: "0 */6 * * *"
5+
- cron: "0 */4 * * *"
66

77
jobs:
88
stale:
@@ -19,7 +19,7 @@ jobs:
1919
close-pr-label: auto-close
2020
exempt-pr-labels: keep-open
2121
operations-per-run: 1000
22-
ascending: true
22+
ascending: false
2323
start-date: '2019-05-30'
2424
stale-pr-message: >
2525
This pull request has been inactive for at least 14 days.

.openpublishing.redirection.json

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -14073,11 +14073,6 @@
1407314073
"redirect_url": "/azure/azure-toolkit-for-intelliJ",
1407414074
"redirect_document_id": false
1407514075
},
14076-
{
14077-
"source_path_from_root": "/articles/azure-vmware/deploy-disaster-recovery-using-jetstream.md",
14078-
"redirect_url": "/azure/azure-vmware/concepts-run-command",
14079-
"redirect_document_id": false
14080-
},
1408114076
{
1408214077
"source_path_from_root": "/articles/azure-vmware/deploy-zerto-disaster-recovery.md",
1408314078
"redirect_url": "/azure/azure-vmware/introduction",
@@ -14243,6 +14238,11 @@
1424314238
"redirect_url": "/azure/azure-vmware/vrealize-operations-for-azure-vmware-solution",
1424414239
"redirect_document_id": false
1424514240
},
14241+
{
14242+
"source_path_from_root": "/articles/azure-vmware/deploy-disaster-recovery-using-jetstream.md",
14243+
"redirect_url": "/azure/azure-vmware/concepts-run-command",
14244+
"redirect_document_id": false
14245+
},
1424614246
{
1424714247
"source_path_from_root": "/articles/virtual-machines/workloads/sap/baremetal-infrastructure-portal.md",
1424814248
"redirect_url": "/azure/baremetal-infrastructure/connect-baremetal-infrastructure",
@@ -14500,32 +14500,32 @@
1450014500
},
1450114501
{
1450214502
"source_path_from_root": "/articles/blockchain/tokens/account-management.md",
14503-
"redirect_url": "/azure/blockchain",
14503+
"redirect_url": "https://azure.microsoft.com/solutions/blockchain",
1450414504
"redirect_document_id": false
1450514505
},
1450614506
{
1450714507
"source_path_from_root": "/articles/blockchain/tokens/composability.md",
14508-
"redirect_url": "/azure/blockchain",
14508+
"redirect_url": "https://azure.microsoft.com/solutions/blockchain",
1450914509
"redirect_document_id": false
1451014510
},
1451114511
{
1451214512
"source_path_from_root": "/articles/blockchain/index.md",
14513-
"redirect_url": "/azure/blockchain",
14513+
"redirect_url": "https://azure.microsoft.com/solutions/blockchain",
1451414514
"redirect_document_id": false
1451514515
},
1451614516
{
1451714517
"source_path_from_root": "/articles/blockchain/tokens/index.md",
14518-
"redirect_url": "/azure/blockchain",
14518+
"redirect_url": "https://azure.microsoft.com/solutions/blockchain",
1451914519
"redirect_document_id": false
1452014520
},
1452114521
{
1452214522
"source_path_from_root": "/articles/blockchain/tokens/overview.md",
14523-
"redirect_url": "/azure/blockchain",
14523+
"redirect_url": "https://azure.microsoft.com/solutions/blockchain",
1452414524
"redirect_document_id": false
1452514525
},
1452614526
{
1452714527
"source_path_from_root": "/articles/blockchain/tokens/templates.md",
14528-
"redirect_url": "/azure/blockchain",
14528+
"redirect_url": "https://azure.microsoft.com/solutions/blockchain",
1452914529
"redirect_document_id": false
1453014530
},
1453114531
{

articles/active-directory/conditional-access/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -102,6 +102,8 @@
102102
href: troubleshoot-conditional-access.md
103103
- name: Troubleshoot using the What If tool
104104
href: troubleshoot-conditional-access-what-if.md
105+
- name: Troubleshoot continuous access evaluation
106+
href: howto-continuous-access-evaluation-troubleshoot.md
105107
- name: FAQ
106108
href: faqs.md
107109
- name: Migrate classic policies

articles/active-directory/conditional-access/concept-conditional-access-conditions.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: conditional-access
88
ms.topic: conceptual
9-
ms.date: 07/08/2021
9+
ms.date: 09/13/2021
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -104,7 +104,7 @@ This setting works with all browsers. However, to satisfy a device policy, like
104104

105105
| OS | Browsers |
106106
| :-- | :-- |
107-
| Windows 10 | Microsoft Edge, Internet Explorer, Chrome |
107+
| Windows 10 | Microsoft Edge, Internet Explorer, Chrome, [Firefox 91+](https://support.mozilla.org/kb/windows-sso) |
108108
| Windows 8 / 8.1 | Internet Explorer, Chrome |
109109
| Windows 7 | Internet Explorer, Chrome |
110110
| iOS | Microsoft Edge, Intune Managed Browser, Safari |

articles/active-directory/conditional-access/concept-continuous-access-evaluation.md

Lines changed: 68 additions & 42 deletions
Large diffs are not rendered by default.
Lines changed: 100 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,100 @@
1+
---
2+
title: Monitor and troubleshoot sign-ins with continuous access evaluation in Azure AD
3+
description: Troubleshoot and respond to changes in user state faster with continuous access evaluation in Azure AD
4+
5+
services: active-directory
6+
ms.service: active-directory
7+
ms.subservice: conditional-access
8+
ms.topic: how-to
9+
ms.date: 09/13/2021
10+
11+
ms.author: joflore
12+
author: MicrosoftGuyJFlo
13+
manager: daveba
14+
ms.reviewer: jlu
15+
16+
ms.collection: M365-identity-device-management
17+
---
18+
# Monitor and troubleshoot continuous access evaluation
19+
20+
Administrators can monitor and troubleshoot sign in events where [continuous access evaluation (CAE)](concept-continuous-access-evaluation.md) is applied in multiple ways.
21+
22+
## Continuous access evaluation sign-in reporting
23+
24+
Administrators will have the opportunity to monitor user sign-ins where CAE is applied. This pane can be located by via the following instructions:
25+
26+
1. Sign in to the **Azure portal** as a Conditional Access Administrator, Security Administrator, or Global Administrator.
27+
1. Browse to **Azure Active Directory** > **Sign-ins**.
28+
1. Apply the **Is CAE Token** filter.
29+
30+
[ ![Add a filter to the Sitn-ins log to see where CAE is being applied or not](./media/howto-continuous-access-evaluation-troubleshoot/azure-ad-sign-ins-log-apply-filter.png) ](./media/howto-continuous-access-evaluation-troubleshoot/azure-ad-sign-ins-log-apply-filter.png#lightbox)
31+
32+
From here, admins will be presented with information about their user’s sign-in events. Select any sign-in to see details about the session, like which Conditional Access policies were applied and is CAE enabled.
33+
34+
A given sign-in attempt may display on either the interactive or non-interactive tab. Administrators may need to check both tabs as they track their user’s sign-ins.
35+
36+
### Searching for specific sign-in attempts
37+
38+
Use filters to narrow your search. For example, if a user signed in to Teams, use the Application filter and set it to Teams. Admins may need to check the sign-ins from both interactive and non-interactive tabs to locate the specific sign-in. To further narrow the search, admins may apply multiple filters.
39+
40+
## Continuous access evaluation workbooks
41+
42+
The continuous access evaluation insights workbook allows administrators to view and monitor CAE usage insights for their tenants. The first table displays authentication attempts with IP mismatches. The second table displays the support status of CAE across various applications. This workbook can be found as template under the Conditional Access category.
43+
44+
### Accessing the CAE workbook template
45+
46+
Log Analytics integration must be completed before workbooks are displayed. For more information about how to stream Azure AD sign-in logs to a Log Analytics workspace, see the article [Integrate Azure AD logs with Azure Monitor logs](../reports-monitoring/howto-integrate-activity-logs-with-log-analytics.md).
47+
48+
1. Sign in to the **Azure portal** as a Conditional Access Administrator, Security Administrator, or Global Administrator.
49+
1. Browse to **Azure Active Directory** > **Workbooks**.
50+
1. Under **Public Templates**, search for **Continuous access evaluation insights**.
51+
52+
[ ![Find the CAE insights workbook in the gallery to continue monitoring](./media/howto-continuous-access-evaluation-troubleshoot/azure-ad-workbooks-continuous-access-evaluation.png) ](./media/howto-continuous-access-evaluation-troubleshoot/azure-ad-workbooks-continuous-access-evaluation.png#lightbox)
53+
54+
The **Continuous access evaluation insights** workbook contains two tables:
55+
56+
### Table 1: Potential IP address mismatch between Azure AD and resource provider
57+
58+
![Workbook table 1 showing potential IP address mismatches](./media/howto-continuous-access-evaluation-troubleshoot/continuous-access-evaluation-insights-workbook-table-1.png)
59+
60+
The potential IP address mismatch between Azure AD & resource provider table allows admins to investigate sessions where the IP address detected by Azure AD doesn't match with the IP address detected by the Resource Provider.
61+
62+
This workbook table sheds light on these scenarios by displaying the respective IP addresses and whether a CAE token was issued during the session.
63+
64+
#### IP address configuration
65+
66+
Your identity provider and resource providers may see different IP addresses. This mismatch may happen because of the following examples:
67+
68+
- Your network implements split tunneling.
69+
- Your resource provider is using an IPv6 address and Azure AD is using an IPv4 address.
70+
- Because of network configurations, Azure AD sees one IP address from the client and your resource provider sees a different IP address from the client.
71+
72+
If this scenario exists in your environment, to avoid infinite loops, Azure AD will issue a one-hour CAE token and won't enforce client location change during that one-hour period. Even in this case, security is improved compared to traditional one-hour tokens since we're still evaluating the other events besides client location change events.
73+
74+
Admins can view records filtered by time range and application. Admins can compare the number of mismatched IPs detected with the total number of sign-ins during a specified time period.
75+
76+
To unblock users, administrators can add specific IP addresses to a trusted named location.
77+
78+
1. Sign in to the **Azure portal** as a Conditional Access Administrator, Security Administrator, or Global Administrator.
79+
1. Browse to **Azure Active Directory** > **Security** > **Conditional Access** > **Named locations**. Here you can create or update trusted IP locations.
80+
81+
> [!NOTE]
82+
> Before adding an IP address as a trusted named location, confirm that the IP address does in fact belong to the intended organization.
83+
84+
For more information about named locations, see the article [Using the location condition](location-condition.md#named-locations)
85+
86+
### Table 2: Continuous access evaluation support status
87+
88+
![Workbook table 2 showing CAE supported apps and sign-in count](./media/howto-continuous-access-evaluation-troubleshoot/continuous-access-evaluation-insights-workbook-table-2.png)
89+
90+
The continuous access evaluation support status table allows admins to differentiate between client applications that support CAE and those client applications that don't support CAE. The table displays the number of user sign-ins for each client application.
91+
92+
You may notice that the same application may appear as both supported and not supported. This duplication is because of a concept called client capability. Not all clients are CAE supported and capable. For example, if a customer has some users using the latest version of Outlook and others still using an older unsupported version, that customer will see Outlook instances as supported and non supported. The older version of Outlook isn't CAE capable can't do continuous access evaluation. For users that are using the most recent version of Outlook, the admin will see supported CAE status.
93+
94+
Based on analysis, admins may choose to turn on strict enforcement within a Conditional Access policy. When strict enforcement is turned on, any client that isn't CAE capable will be rejected entirely. Admins can view records filtered by time range, application, and resource.
95+
96+
## Next steps
97+
98+
- [Integrate Azure AD logs with Azure Monitor logs](../reports-monitoring/howto-integrate-activity-logs-with-log-analytics.md)
99+
- [Using the location condition](location-condition.md#named-locations)
100+
- [Continuous access evaluation](concept-continuous-access-evaluation.md)
-56 KB
Loading
Loading
Loading
Loading

0 commit comments

Comments
 (0)