Skip to content

Commit 190e904

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into del-samples
2 parents e228581 + 17ac51b commit 190e904

File tree

113 files changed

+1180
-154
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

113 files changed

+1180
-154
lines changed

articles/active-directory/authentication/howto-mfa-mfasettings.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: multi-factor-authentication
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: how-to
9-
ms.date: 05/17/2023
9+
ms.date: 05/30/2023
1010

1111
ms.author: justinha
1212
author: justinha
@@ -78,14 +78,14 @@ To unblock a user, complete the following steps:
7878

7979
## Report suspicious activity
8080

81-
A preview of **Report Suspicious Activity**, the updated MFA **Fraud Alert** feature, is now available. When an unknown and suspicious MFA prompt is received, users can report the fraud attempt by using Microsoft Authenticator or through their phone. These alerts are integrated with [Identity Protection](../identity-protection/overview-identity-protection.md) for more comprehensive coverage and capability.
81+
**Report suspicious activity**, the updated **MFA Fraud Alert** feature, is now available. When an unknown and suspicious MFA prompt is received, users can report the fraud attempt by using Microsoft Authenticator or through their phone. These alerts are integrated with [Identity Protection](../identity-protection/overview-identity-protection.md) for more comprehensive coverage and capability.
8282

8383
Users who report an MFA prompt as suspicious are set to **High User Risk**. Administrators can use risk-based policies to limit access for these users, or enable self-service password reset (SSPR) for users to remediate problems on their own. If you previously used the **Fraud Alert** automatic blocking feature and don't have an Azure AD P2 license for risk-based policies, you can use risk detection events to identify and disable impacted users and automatically prevent their sign-in. For more information about using risk-based policies, see [Risk-based access policies](../identity-protection/concept-identity-protection-policies.md).
8484

85-
To enable **Report Suspicious Activity** from the Authentication Methods Settings:
85+
To enable **Report suspicious activity** from the Authentication Methods Settings:
8686

8787
1. In the Azure portal, click **Azure Active Directory** > **Security** > **Authentication Methods** > **Settings**.
88-
1. Set **Report Suspicious Activity** to **Enabled**.
88+
1. Set **Report suspicious activity** to **Enabled**.
8989
1. Select **All users** or a specific group.
9090

9191
### View suspicious activity events
@@ -104,9 +104,9 @@ Once a user has reported a prompt as suspicious, the risk should be investigated
104104

105105
### Report suspicious activity and fraud alert
106106

107-
**Report Suspicious Activity** and the legacy **Fraud Alert** implementation can operate in parallel. You can keep your tenant-wide **Fraud Alert** functionality in place while you start to use **Report Suspicious Activity** with a targeted test group.
107+
**Report suspicious activity** and the legacy **Fraud Alert** implementation can operate in parallel. You can keep your tenant-wide **Fraud Alert** functionality in place while you start to use **Report suspicious activity** with a targeted test group.
108108

109-
If **Fraud Alert** is enabled with Automatic Blocking, and **Report Suspicious Activity** is enabled, the user will be added to the blocklist and set as high-risk and in-scope for any other policies configured. These users will need to be removed from the blocklist and have their risk remediated to enable them to sign in with MFA.
109+
If **Fraud Alert** is enabled with Automatic Blocking, and **Report suspicious activity** is enabled, the user will be added to the blocklist and set as high-risk and in-scope for any other policies configured. These users will need to be removed from the blocklist and have their risk remediated to enable them to sign in with MFA.
110110

111111
## Notifications
112112

articles/active-directory/reports-monitoring/concept-usage-insights-report.md

Lines changed: 159 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -8,59 +8,96 @@ ms.service: active-directory
88
ms.topic: conceptual
99
ms.workload: identity
1010
ms.subservice: report-monitor
11-
ms.date: 01/10/2023
11+
ms.date: 05/30/2023
1212
ms.author: sarahlipsey
13-
ms.reviewer: besiler
13+
ms.reviewer: madansr7
1414
---
1515

1616
# Usage and insights in Azure Active Directory
1717

18-
With the Azure Active Directory (Azure AD) **Usage and insights** reports, you can get an application-centric view of your sign-in data. Usage & insights also includes a report on authentication methods activity. You can find answers to the following questions:
18+
With the Azure Active Directory (Azure AD) **Usage and insights** reports, you can get an application-centric view of your sign-in data. Usage & insights includes a report on authentication methods, service principal sign-ins, and application credential activity. You can find answers to the following questions:
1919

20-
* What are the top used applications in my organization?
21-
* What applications have the most failed sign-ins?
22-
* What are the top sign-in errors for each application?
20+
* What are the top used applications in my organization?
21+
* What applications have the most failed sign-ins?
22+
* What are the top sign-in errors for each application?
23+
* What was the date of the last sign-in for an application?
2324

24-
This article provides an overview of three reports that look sign-in data.
25+
## Prerequisites
2526

26-
## Access Usage & insights
27-
28-
Accessing the data from Usage and insights requires:
27+
To access the data from Usage and insights you must have:
2928

3029
* An Azure AD tenant
3130
* An Azure AD premium (P1/P2) license to view the sign-in data
32-
* A user in the Global Administrator, Security Administrator, Security Reader, or Reports Reader roles.
31+
* A user in the Reports Reader, Security Reader, Security Administrator, or Global Administrator role.
32+
33+
## Access Usage and insights
34+
35+
You can access the Usage and insights reports from the Azure portal and using Microsoft Graph.
3336

34-
To access Usage & insights:
37+
### To access Usage & insights in the portal:
3538

3639
1. Sign in to the [Azure portal](https://portal.azure.com) using the appropriate least privileged role.
3740
1. Go to **Azure Active Directory** > **Usage & insights**.
3841

39-
The **Usage & insights** report is also available from the **Enterprise applications** area of Azure AD. All users can access their own sign-ins at the [My Sign-Ins portal](https://mysignins.microsoft.com/security-info).
42+
The **Usage & insights** reports are also available from the **Enterprise applications** area of Azure AD. All users can access their own sign-ins at the [My Sign-Ins portal](https://mysignins.microsoft.com/security-info).
4043

41-
## View the Usage & insights reports
44+
### To access Usage & insights using Microsoft Graph:
4245

43-
There are currently three reports available in Azure AD Usage & insights. All three reports use sign-in data to provide helpful information an application usage and authentication methods.
46+
The reports can be viewed and managed using Microsoft Graph on the `/beta` endpoint in Graph Explorer.
4447

45-
### Azure AD application activity (preview)
48+
1. Sign in to [Graph Explorer](https://aka.ms/ge).
49+
1. Select **GET** as the HTTP method from the dropdown.
50+
1. Set the API version to **beta**.
51+
52+
Refer to the section on each report in this article for the specific objects and parameters to include. For more information, see the [Microsoft Graph documentation for Identity and access reports](/graph/api/resources/report-identity-access).
53+
54+
## Azure AD application activity (preview)
4655

4756
The **Azure AD application activity (preview)** report shows the list of applications with one or more sign-in attempts. Any application activity during the selected date range appears in the report. The report allows you to sort by the number of successful sign-ins, failed sign-ins, and the success rate.
4857

4958
It's possible that activity for a deleted application may appear in the report if the activity took place during the selected date range and before the application was deleted. Other scenarios could include a user attempting to sign in to an application that doesn't have a service principal associated with the app. For these types of scenarios, you may need to review the audit logs or sign-in logs to investigate further.
5059

51-
Select the **View sign in activity** link for an application to view more details. The sign-in graph per application counts interactive user sign-ins. The details of any sign-in failures appears below the table.
60+
To view the details of the sign-in activity for an application, select the **View sign-in activity** link for the application.
5261

5362
![Screenshot shows Usage and insights for Application activity where you can select a range and view sign-in activity for different apps.](./media/concept-usage-insights-report/usage-insights-overview.png)
5463

55-
Select a day in the application usage graph to see a detailed list of the sign-in activities for the application. This detailed list is actually the sign-in log with the filter set to the selected application and date.
64+
The sign-in activity graph uses interactive user sign-ins. Select a day in the application usage graph to see a detailed list of the sign-in activities for the application. This detailed list is actually the sign-in log with the filter set to the selected application and date. The details of any sign-in failures appear below the table.
5665

5766
![Screenshot of the sign-in activity details for a selected application.](./media/concept-usage-insights-report/application-activity-sign-in-detail.png)
5867

59-
### AD FS application activity
68+
### Application activity using Microsoft Graph
69+
70+
You can view the `applicationSignInSummary` or `applicationSignInDetailedSummary` of Azure AD application activity with Microsoft Graph.
71+
72+
Add the following query to view the **sign-in summary**, then select the **Run query** button.
73+
74+
```http
75+
GET https://graph.microsoft.com/beta/reports/getAzureADApplicationSignInSummary(period='{period}')
76+
```
77+
78+
Add the following query to view the **sign-in details**, then select the **Run query** button.
79+
80+
```http
81+
GET https://graph.microsoft.com/beta/reports/applicationSignInDetailedSummary/{id}
82+
```
83+
84+
For more information, see [Application sign-in in Microsoft Graph](/graph/api/resources/applicationsigninsummary?view=graph-rest-beta&preserve-view=true).
85+
86+
## AD FS application activity
6087

6188
The **AD FS application activity** report in Usage & insights lists all Active Directory Federated Services (AD FS) applications in your organization that have had an active user login to authenticate in the last 30 days. These applications have not been migrated to Azure AD for authentication.
6289

63-
### Authentication methods activity
90+
Viewing the AD FS application activity using Microsoft Graph retrieves a list of the `relyingPartyDetailedSummary` objects, which identifies the relying party to a particular Federation Service.
91+
92+
Add the following query, then select the **Run query** button.
93+
94+
```http
95+
GET https://graph.microsoft.com/beta/reports/getRelyingPartyDetailedSummary
96+
```
97+
98+
For more information, see [AD FS application activity in Microsoft Graph](/graph/api/resources/relyingpartydetailedsummary?view=graph-rest-beta&preserve-view=true).
99+
100+
## Authentication methods activity
64101

65102
The **Authentication methods activity** in Usage & insights displays visualizations of the different authentication methods used by your organization. The **Registration tab** displays statistics of users registered for each of your available authentication methods. Select the **Usage** tab at the top of the page to see actual usage for each authentication method.
66103

@@ -72,6 +109,108 @@ Looking for the details of a user and their authentication methods? Look at the
72109

73110
Looking for the status of an authentication registration or reset event of a user? Look at the **Registration and reset events** report from the side menu and then search for a name or UPN. You'll be able to see the method used to attempt to register or reset an authentication method.
74111

112+
## Service principal sign-in activity (preview)
113+
114+
The Service principal sign-in activity (preview) report provides the last activity date for every service principal. The report provides you information on the usage of the service principal - whether it was used as a client or resource app and whether it was used in an app-only or delegated context. The report shows the last time the service principal was used.
115+
116+
[ ![Screenshot of the service principal sign-in activity report.](./media/concept-usage-insights-report/service-principal-sign-ins.png) ](./media/concept-usage-insights-report/service-principal-sign-ins.png#lightbox)
117+
118+
Select the **View more details** link to locate the client and object IDs for the application as well as specific service principal sign-in activity.
119+
120+
[ ![Screenshot of the service principal sign-in activity details.](./media/concept-usage-insights-report/service-principal-sign-in-activity-details.png) ](./media/concept-usage-insights-report/service-principal-sign-in-activity-details.png#lightbox)
121+
122+
### Service principal sign-in activity using Microsoft Graph
123+
124+
The `servicePrincipalSignInActivity` reports can be viewed using Microsoft Graph in Graph Explorer.
125+
126+
Add the following query to retrieve the service principal sign-in activity, then select the **Run query** button.
127+
128+
```http
129+
GET https://graph.microsoft.com/beta/reports/servicePrincipalSignInActivities/{id}
130+
```
131+
132+
The following is an example of the response:
133+
134+
```json
135+
{
136+
"@odata.context": "https://graph.microsoft.com/beta/$metadata#reports/servicePrincipalSignInActivities",
137+
"id": "ODNmNDUyOTYtZmI4Zi00YWFhLWEzOTktYWM1MTA4NGUwMmI3",
138+
"appId": "83f45296-fb8f-4aaa-a399-ac51084e02b7",
139+
"delegatedClientSignInActivity": {
140+
"lastSignInDateTime": "2021-01-01T00:00:00Z",
141+
"lastSignInRequestId": "2d245633-0f48-4b0e-8c04-546c2bcd61f5"
142+
},
143+
"delegatedResourceSignInActivity": {
144+
"lastSignInDateTime": "2021-02-01T00:00:00Z",
145+
"lastSignInRequestId": "d2b4c623-f930-42b5-9519-7851ca604b16"
146+
},
147+
"applicationAuthenticationClientSignInActivity": {
148+
"lastSignInDateTime": "2021-03-01T00:00:00Z",
149+
"lastSignInRequestId": "b71f24ec-f212-4306-b2ae-c229e15805ea"
150+
},
151+
"applicationAuthenticationResourceSignInActivity": {
152+
"lastSignInDateTime": "2021-04-01T00:00:00Z",
153+
"lastSignInRequestId": "53e6981f-2272-4deb-972c-c8272aca986d"
154+
},
155+
"lastSignInActivity": {
156+
"lastSignInDateTime": "2021-04-01T00:00:00Z",
157+
"lastSignInRequestId": "cd9733e8-d75a-468f-a63d-6e82bd48c05e"
158+
}
159+
}
160+
```
161+
162+
For more information, see [List service principal activity in Microsoft Graph](/graph/api/reportroot-list-serviceprincipalsigninactivities?view=graph-rest-beta&preserve-view=true).
163+
164+
## Application credential activity (preview)
165+
166+
The Application credential activity (preview) report provides the last credential activity date for every application credential. The report provides the credential type (certificate or client secret), the last used date, and the expiration date. With this report you can view the expiration dates of all your applications in one place.
167+
168+
To view the details of the application credential activity, select the **View more details** link. These details include the application object, service principal, and resource IDs. You can also see if the credential origin is the application or the service principal.
169+
170+
[ ![Screenshot of the app credential activity report.](media/concept-usage-insights-report/app-credential-activity.png) ](media/concept-usage-insights-report/app-credential-activity.png#lightbox)
171+
172+
When you select the **View more details** link, you can see the application object ID and resource ID, in addition to the details visible in the report.
173+
174+
[ ![Screenshot of the app credential activity details.](media/concept-usage-insights-report/app-credential-activity-details.png) ](media/concept-usage-insights-report/app-credential-activity-details.png#lightbox)
175+
176+
### Application credential activity using Microsoft Graph
177+
178+
Application credential activity can be viewed and managed using Microsoft Graph on the `/beta` endpoint. You can get the application credential sign-in activity by entity `id`, `keyId`, and `appId` .
179+
180+
To get started, follow these instructions to work with `appCredentialSignInActivity` using Microsoft Graph in Graph Explorer.
181+
182+
1. Sign in to [Graph Explorer](https://aka.ms/ge).
183+
1. Select **GET** as the HTTP method from the dropdown.
184+
1. Set the API version to **beta**.
185+
1. Add the following query to retrieve recommendations, then select the **Run query** button.
186+
187+
```http
188+
GET https://graph.microsoft.com/beta/reports/appCredentialSignInActivities/{id}
189+
```
190+
The following is an example of the response:
191+
192+
```json
193+
{
194+
"@odata.type": "#microsoft.graph.appCredentialSignInActivity",
195+
"id": "ODNmNDUyOTYtZmI4Zi00YWFhLWEzOTktYWM1MTA4NGUwMmI3fGFwcGxpY2F0aW9u",
196+
"keyId": "83f45296-fb8f-4aaa-a399-ac51084e02b7",
197+
"keyType": "certificate",
198+
"keyUsage": "sign",
199+
"appId": "f4d9654f-0305-4072-878c-8bf266dfe146",
200+
"appObjectId": "6920caa5-1cae-4bc8-bf59-9c0b8495d240",
201+
"servicePrincipalObjectId": "cf533854-9fb7-4c01-9c0e-f68922ada8b6",
202+
"resourceId": "a89dc091-a671-4da4-9fcf-3ef06bdf3ac3",
203+
"credentialOrigin": "application",
204+
"expirationDate": "2021-04-01T21:36:48-8:00",
205+
"signInActivity": {
206+
"lastSignInDateTime": "2021-04-01T00:00:00-8:00",
207+
"lastSignInRequestId": "b0a282a3-68ec-4ec8-aef0-290ed4350271"
208+
}
209+
}
210+
```
211+
212+
For more information, see [Application credential activity in Microsoft Graph](/graph/api/resources/appcredentialsigninactivity?view=graph-rest-beta&preserve-view=true).
213+
75214
## Next steps
76215

77216
- [Learn about the sign-ins report](concept-sign-ins.md)
Loading
68.6 KB
Loading
Loading
90.9 KB
Loading

articles/advisor/advisor-release-notes.md

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -7,6 +7,14 @@ ms.date: 04/18/2023
77
# What's new in Azure Advisor?
88

99
Learn what's new in the service. These items may be release notes, videos, blog posts, and other types of information. Bookmark this page to stay up to date with the service.
10+
## May 2023
11+
### Service retirement workbook
12+
13+
It is important to be aware of the upcoming Azure service and feature retirements to understand their impact on your workloads and plan migration. The [Service Retirement workbook](https://portal.azure.com/#view/Microsoft_Azure_Expert/AdvisorMenuBlade/~/workbooks) provides a single centralized resource level view of service retirements and helps you assess impact, evaluate options, and plan migration.
14+
The workbook includes 35 services and features planned for retirement. You can view planned retirement dates, list and map of impacted resources and get information to make the necessary actions.
15+
16+
To learn more, visit [Prepare migration of your workloads impacted by service retirements](advisor-how-to-plan-migration-workloads-service-retirement.md).
17+
1018
## April 2023
1119

1220
### VM/VMSS right-sizing recommendations with custom lookback period

articles/advisor/toc.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -48,6 +48,8 @@
4848
href: advisor-security-recommendations.md
4949
- name: Improve reliability
5050
href: advisor-how-to-improve-reliability.md
51+
- name: Plan migration of workloads impacted by services retirement
52+
href: advisor-how-to-plan-migration-workloads-service-retirement.md
5153
- name: Improve the performance of highly used VMs
5254
href: advisor-how-to-performance-resize-high-usage-vm-recommendations.md
5355
- name: Use tags to filter recommendations and score

0 commit comments

Comments
 (0)