You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/reports-monitoring/howto-use-recommendations.md
+3-2Lines changed: 3 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -42,6 +42,7 @@ Some recommendations may require a P2 or other license. For more information, se
42
42
## How to read a recommendation
43
43
44
44
To view the details of a recommendation:
45
+
45
46
1. Sign in to Azure using the appropriate least-privilege role.
46
47
1. Go to **Azure AD** > **Recommendations** and select a recommendation from the list.
47
48
@@ -69,7 +70,7 @@ Each recommendation provides the same set of details that explain what the recom
69
70
70
71
- The **Action plan** provides step-by-step instructions to implement a recommendation. The Action plan may include links to relevant documentation or direct you to other pages in the Azure AD portal.
71
72
72
-
-If the impacted resource type is applications, a list of the **Impacted resources** appears at the bottom of the recommendation. The resource's name, ID, date it was first detected, and status are provided.
73
+
-The **Impacted resources** table contains a list of resources identified by the recommendation. The resource's name, ID, date it was first detected, and status are provided. The resource could be an application or resource service principal, for example.
73
74
74
75
## How to update a recommendation
75
76
@@ -105,7 +106,7 @@ Continue to monitor the recommendations in your tenant for changes.
105
106
106
107
### How to use Microsoft Graph with Azure Active Directory recommendations
107
108
108
-
Azure Active Directory recommendations can be viewed and managed using Microsoft Graph on the `/beta` endpoint. You can view recommendations along with their impacted resources, mark a recommendation as completed by a user, postpone a recommendation for later, and more.
109
+
Azure Active Directory recommendations can be viewed and managed using Microsoft Graph on the `/beta` endpoint. You can view recommendations along with their impacted resources, postpone a recommendation for later, and more.
109
110
110
111
To get started, follow these instructions to work with recommendations using Microsoft Graph in Graph Explorer. The example uses the "Migrate apps from Active Directory Federated Services (ADFS) to Azure AD" recommendation.
Copy file name to clipboardExpand all lines: articles/active-directory/reports-monitoring/overview-recommendations.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -53,11 +53,11 @@ The recommendations listed in the following table are currently available in pub
53
53
|[Convert per-user MFA to Conditional Access MFA](recommendation-turn-off-per-user-mfa.md)| Users | All licenses | Generally available |
54
54
|[Migrate applications from AD FS to Azure AD](recommendation-migrate-apps-from-adfs-to-azure-ad.md)| Applications | All licenses | Generally available |
55
55
|[Migrate to Microsoft Authenticator](recommendation-migrate-to-authenticator.md)| Users | All licenses | Preview |
56
-
|[Minimize MFA prompts from known devices](recommendation-migrate-apps-from-adfs-to-azure-ad.md)| Users | All licenses | Generally available |
|[Renew expiring service principal credentials](recommendation-renew-expiring-service-principal-credential.md)| Applications |Azure AD Premium P2 | Preview |
61
61
62
62
Azure AD only displays the recommendations that apply to your tenant, so you may not see all supported recommendations listed.
Copy file name to clipboardExpand all lines: articles/active-directory/reports-monitoring/recommendation-remove-unused-apps.md
+8-5Lines changed: 8 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -20,7 +20,7 @@ This article covers the recommendation to investigate unused applications. This
20
20
21
21
## Description
22
22
23
-
This recommendation shows up if your tenant has applications that haven't been used in more than 30 days, so haven't been issued any tokens. Applications or service principals that were added but never used will show up as unused apps, which will also trigger this recommendation.
23
+
This recommendation shows up if your tenant has applications that haven't been used in more than 30 days, so haven't been issued any tokens. Applications or service principals that were added but never used show up as unused apps, which will also trigger this recommendation.
24
24
25
25
## Value
26
26
@@ -35,22 +35,25 @@ Applications that the recommendation identified appear in the list of **Impacted
35
35
36
36

37
37
38
-
1. We suggest you take appropriate steps to ensure the application is not used in longer intervals of more than 30 days. If so, we recommend updating the frequency of access such that the application’s last used time is within 30 days from its last access date.
38
+
1. Determine if the identified application is needed.
39
+
- If the application is no longer needed, remove it from your tenant.
40
+
- If the application is needed, we suggest you take appropriate steps to ensure the application isn't used in intervals of more than 30 days.
41
+
- We recommend updating the frequency of access such that the application’s last used time is within 30 days from its last access date.
39
42
40
43
## Known limitations
41
44
42
45
Take note of the following common scenarios or known limitations of the "Remove unused applications" recommendation.
43
46
44
-
* The time frame for application usage that triggers this recommendation cannot be customized.
47
+
* The time frame for application usage that triggers this recommendation can't be customized.
45
48
46
-
* The following apps will not show up as a part of this recommendation, but are currently under review for future enhancements:
49
+
* The following apps won't show up as a part of this recommendation, but are currently under review for future enhancements:
47
50
- Microsoft-owned applications
48
51
- Password single sign-on
49
52
- Linked single sign-on
50
53
- App proxy
51
54
- Add-in apps
52
55
53
-
* This recommendation currently surfaces applications that were created within the past 30 days *and* shows as unused. Updates to the recommendation to filter out newly-created apps so that they can complete a full cycle are in progress.
56
+
* This recommendation currently surfaces applications that were created within the past 30 days *and* shows as unused. Updates to the recommendation to filter out recently created apps so that they can complete a full cycle are in progress.
Copy file name to clipboardExpand all lines: articles/active-directory/reports-monitoring/recommendation-remove-unused-credential-from-apps.md
+12-3Lines changed: 12 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -47,11 +47,20 @@ Applications that the recommendation identified appear in the list of **Impacted
47
47
48
48

49
49
50
-
To remove a credential from a service principal resource, use the MS Graph Service Principal API service action `removePassword`.
51
-
50
+
### Use Microsoft Graph to remove an unused credential
51
+
52
+
To get started, see [How to use Microsoft Graph with Azure AD recommendations](howto-use-recommendations.md#how-to-use-microsoft-graph-with-azure-active-directory-recommendations).
53
+
54
+
- Remove a **credential** from a service principal resource:
55
+
- Use the Microsoft Graph Service Principal API service action `removePassword`
56
+
-[servicePrincipal: removePassword MS Graph API documentation](/graph/api/serviceprincipal-removepassword?view=graph-rest-beta&preserve-view=true)
57
+
- Remove a **key credential** from a service principal resource:
58
+
- Use the Microsoft Graph Service Principal API service action `removeKey`
59
+
-[servicePrincipal: removeKey MS Graph API documentation](/graph/api/serviceprincipal-removekey?view=graph-rest-beta&preserve-view=true)
60
+
52
61
## Next steps
53
62
54
63
-[Review the Azure AD recommendations overview](overview-recommendations.md)
55
64
-[Learn how to use Azure AD recommendations](howto-use-recommendations.md)
56
-
-[Explore the Microsoft Graph API properties for recommendations](/graph/api/resources/recommendation)
65
+
-[Explore the Microsoft Graph API properties for recommendations](/graph/api/resources/recommendations-api-overview)
57
66
-[Learn about app and service principal objects in Azure AD](../develop/app-objects-and-service-principals.md)
Copy file name to clipboardExpand all lines: articles/active-directory/reports-monitoring/recommendation-renew-expiring-application-credential.md
+3-2Lines changed: 3 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -46,8 +46,9 @@ Applications that the recommendation identified appear in the list of **Impacted
46
46
47
47

48
48
49
-
1. Once the certificate or secret is successfully added, update the service code to ensure it works with the new credential and has no negative customer impact. You should use Azure AD’s sign-in logs to validate that the thumbprint of the certificate matches the one that was just uploaded.
50
-
1. After validating the new credential, navigate back to the Certificates and Secrets blade for the app and remove the old credential.
49
+
1. Once the certificate or secret is successfully added, update the service code to ensure it works with the new credential and doesn't negatively affect customers.
50
+
1. Use the Azure AD sign-in logs to validate that the thumbprint of the certificate matches the one that was recently uploaded.
51
+
1. After validating the new credential, navigate back to **Azure AD** > **App registrations** > **Certificates and Secrets** for the app and remove the old credential.
Copy file name to clipboardExpand all lines: articles/active-directory/reports-monitoring/recommendation-renew-expiring-service-principal-credential.md
+30-9Lines changed: 30 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -21,7 +21,7 @@ This article covers the recommendation to renew expiring service principal crede
21
21
22
22
## Description
23
23
24
-
An Azure Active Directory (Azure AD) service principal is the local representation of an application object in a single tenant or directory. The service principal defines who can access an application and what resources the application can access. Authentication of service principals is often completed using certificate credentials, which have a lifespan. If the credentials expire, the application will not be able to authenticate with your tenant.
24
+
An Azure Active Directory (Azure AD) service principal is the local representation of an application object in a single tenant or directory. The service principal defines who can access an application and what resources the application can access. Authentication of service principals is often completed using certificate credentials, which have a lifespan. If the credentials expire, the application won't be able to authenticate with your tenant.
25
25
26
26
This recommendation shows up if your tenant has service principals with credentials that will expire soon.
27
27
@@ -42,20 +42,41 @@ Renewing the service principal credential(s) before expiration ensures the appli
42
42
43
43

44
44
45
-
1. After adding the certificate, change its properties to make the certificate active. This will make the other certificate inactive.
46
-
1. Once the certificate is successfully added and activated, update the service code to ensure it works with the new credential and has no negative customer impact. You should use Azure AD’s sign-in logs to validate that the thumbprint of the certificate matches the one that was just uploaded.
47
-
1. After validating the new credential, navigate back to the **Certificates and Secrets** area for the app and remove the old credential.
45
+
1. After adding the certificate, change its properties to make the certificate active, which makes the other certificate inactive.
46
+
1. Once the certificate is successfully added and activated, update the service code to ensure it works with the new credential and doesn't negatively affect customers.
47
+
1. Use the Azure AD sign-in logs to validate that the thumbprint of the certificate matches the one that was recently uploaded.
48
+
1. After validating the new credential, navigate back to the **Single sign-on** area for the app and remove the old credential.
49
+
50
+
### Use Microsoft Graph to renew expiring service principal credentials
51
+
52
+
To get started, see [How to use Microsoft Graph with Azure AD recommendations](howto-use-recommendations.md#how-to-use-microsoft-graph-with-azure-active-directory-recommendations).
53
+
54
+
When renewing service principal credentials using Microsoft Graph, you need to run a query to get the password credentials on a service principal, add a new password credential, then remove the old credentials.
55
+
56
+
1. Run the following query in Microsoft Graph to get the password credentials on a service principal:
- Use the Microsoft Graph Service Principal API service action `addPassword`
62
+
-[servicePrincipal: addPassword MS Graph API documentation](/graph/api/serviceprincipal-addpassword?view=graph-rest-beta&preserve-view=true)
63
+
64
+
1. Remove the old/original credentials.
65
+
- Use the Microsoft Graph Service Principal API service action `removePassword`
66
+
-[servicePrincipal: removePassword MS Graph API documentation](/graph/api/serviceprincipal-removepassword?view=graph-rest-beta&preserve-view=true)
48
67
49
68
## Known limitations
50
69
51
-
Service principals that expire before the recommendation is completed by a user will be marked complete by the system. This recommendation identifies service principal credentials that are about to expire, so if they do expire, the recommendation doesn't distinguish between the credential expiring on its own or being addressed by the user.
70
+
- This recommendation identifies service principal credentials that are about to expire, so if they do expire, the recommendation doesn't distinguish between the credential expiring on its own or being addressed by the user.
71
+
72
+
- Service principal credentials that expire before the recommendation is completed will be marked complete by the system.
73
+
74
+
- The recommendation currently doesn't display the password secret credential in service principal when you select the impacted resource from the list.
75
+
52
76
53
-
You can see the recommendation but won't be able to see the service principal credential when you click on the impacted resource. Credentials are not displayed on the Enterprise applications area. You can use Microsoft Graph to pull this information programmatically.
54
-
55
77
## Next steps
56
78
57
79
-[Review the Azure AD recommendations overview](overview-recommendations.md)
58
80
-[Learn how to use Azure AD recommendations](howto-use-recommendations.md)
59
81
-[Explore the Microsoft Graph API properties for recommendations](/graph/api/resources/recommendation)
60
-
-[Learn about securing service principals](../fundamentals/service-accounts-principal.md)
61
-
82
+
-[Learn about securing service principals](../fundamentals/service-accounts-principal.md)
0 commit comments