Skip to content

Commit 2fbd4bb

Browse files
authored
Merge pull request #217328 from MicrosoftDocs/main
Publish to live, Sunday 4 AM PST, 11/6
2 parents 31a5b48 + 137dfdf commit 2fbd4bb

File tree

44 files changed

+1471
-1245
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

44 files changed

+1471
-1245
lines changed

articles/active-directory/app-provisioning/known-issues.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -95,6 +95,9 @@ If a user and their manager are both in scope for provisioning, the service prov
9595

9696
The global reader role is unable to read the provisioning configuration. Please create a custom role with the `microsoft.directory/applications/synchronization/standard/read` permission in order to read the provisioning configuration from the Azure Portal.
9797

98+
#### Microsoft Azure Government Cloud
99+
Credentials, including the secret token, notification email, and SSO certificate notification emails together have a 1KB limit in the Microsoft Azure Government Cloud.
100+
98101
## On-premises application provisioning
99102
The following information is a current list of known limitations with the Azure AD ECMA Connector Host and on-premises application provisioning.
100103

@@ -139,4 +142,4 @@ The following attributes and objects aren't supported:
139142
The ECMA host does not support updating the password in the connectivity page of the wizard. Please create a new connector when changing the password.
140143

141144
## Next steps
142-
[How provisioning works](how-provisioning-works.md)
145+
[How provisioning works](how-provisioning-works.md)

articles/active-directory/app-provisioning/on-premises-application-provisioning-architecture.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ manager: amycolannino
77
ms.service: active-directory
88
ms.workload: identity
99
ms.topic: overview
10-
ms.date: 08/26/2022
10+
ms.date: 11/04/2022
1111
ms.subservice: hybrid
1212
ms.author: billmath
1313
ms.collection: M365-identity-device-management
@@ -93,7 +93,7 @@ You can define one or more matching attribute(s) and prioritize them based on th
9393
- The agent must communicate with both Azure and your application, so the placement of the agent affects the latency of those two connections. You can minimize the latency of the end-to-end traffic by optimizing each network connection. Each connection can be optimized by:
9494
- Reducing the distance between the two ends of the hop.
9595
- Choosing the right network to traverse. For example, traversing a private network rather than the public internet might be faster because of dedicated links.
96-
96+
- The agent and ECMA Host rely on a certificate for communication. The self-signed certificate generated by the ECMA host should only be used for testing purposes. The self-signed certificate expires in two years by default and cannot be revoked. Microsoft recommends using a certificiate from a trusted CA for production use cases.
9797

9898

9999
## Provisioning agent questions

articles/active-directory/app-provisioning/use-scim-to-provision-users-and-groups.md

Lines changed: 2 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: app-provisioning
99
ms.workload: identity
1010
ms.topic: tutorial
11-
ms.date: 10/17/2022
11+
ms.date: 11/04/2022
1212
ms.author: kenwith
1313
ms.reviewer: arvinh
1414
---
@@ -1315,16 +1315,7 @@ Applications that support the SCIM profile described in this article can be conn
13151315

13161316
The following screenshot shows the Azure AD application gallery:
13171317

1318-
![Screenshot shows the Azure AD application gallery.](media/use-scim-to-provision-users-and-groups/scim-figure-2b-1.png)
1319-
1320-
1321-
> [!NOTE]
1322-
> If you are using the old app gallery experience, follow the screen guide below.
1323-
1324-
The following screenshot shows the Azure AD old app gallery experience:
1325-
1326-
![Screenshot shows the Azure AD old app gallery experience](media/use-scim-to-provision-users-and-groups/scim-figure-2a.png)
1327-
1318+
![Screenshot shows the Azure AD application gallery.](media/use-scim-to-provision-users-and-groups/scim-figure-2b-1.png)
13281319

13291320
1. In the app management screen, select **Provisioning** in the left panel.
13301321
1. In the **Provisioning Mode** menu, select **Automatic**.

articles/active-directory/fundamentals/whats-new-archive.md

Lines changed: 23 additions & 24 deletions
Large diffs are not rendered by default.

articles/active-directory/reports-monitoring/reports-faq.yml

Lines changed: 49 additions & 30 deletions
Original file line numberDiff line numberDiff line change
@@ -21,16 +21,6 @@ summary: |
2121
sections:
2222
- name: Getting started
2323
questions:
24-
- question: |
25-
I currently use the `https://graph.windows.net/<tenant-name>/reports/` endpoint APIs to pull Azure AD audit and integrated application usage reports into our reporting systems programmatically. What should I switch to?
26-
answer: |
27-
Look up the [API reference](https://developer.microsoft.com/graph/) to see how you can [use the APIs to access activity reports](concept-reporting-api.md). This endpoint has two reports (**Audit** and **Sign-ins**) which provide all the data you got in the old API endpoint. This new endpoint also has a sign-ins report with the Azure AD Premium license that you can use to get app usage, device usage, and user sign-in information.
28-
29-
- question: |
30-
I currently use the `https://graph.windows.net/<tenant-name>/reports/` endpoint APIs to pull Azure AD security reports (specific types of detections, such as leaked credentials or sign-ins from anonymous IP addresses) into our reporting systems programmatically. What should I switch to?
31-
answer: |
32-
You can use the [Identity Protection risk detections API](../identity-protection/howto-identity-protection-graph-api.md) to access security detections through Microsoft Graph. This new format gives greater flexibility in how you can query data, with advanced filtering, field selection, and more, and standardizes risk detections into one type for easier integration into SIEMs and other data collection tools. Because the data is in a different format, you can't substitute a new query for your old queries. However, [the new API uses Microsoft Graph](/graph/api/resources/identityprotection-root), which is the Microsoft standard for such APIs as Microsoft 365 or Azure AD. So the work required can either extend your current Microsoft Graph investments or help you begin your transition to this new standard platform.
33-
3424
- question: |
3525
How do I get a premium license?
3626
answer: |
@@ -39,22 +29,32 @@ sections:
3929
- question: |
4030
How soon should I see activities data after getting a premium license?
4131
answer: |
42-
If you already have activities data as a free license, then you can see it immediately. If you dont have any data, then it will take up to 3 days for the data to show up in the reports.
32+
If you already have activities data as a free license, then you can see it immediately. If you don't have any data, then it will take up to 3 days for the data to show up in the reports.
4333
4434
- question: |
4535
Can I see last month's data after getting an Azure AD premium license?
4636
answer: |
4737
If you've recently switched to a Premium version (including a trial version), you can see data up to 7 days initially. When data accumulates, you can see data for the past 30 days.
4838
4939
- question: |
50-
Do I need to be a global administrator to see the activity sign-ins to the Azure portal or to get data through the API?
40+
I currently use the https://graph.windows.net/<tenant-name>/reports/ endpoint APIs to pull Azure AD audit and integrated application usage reports into our reporting systems programmatically. What should I switch to?
5141
answer: |
52-
No, you can also access the reporting data through the portal or through the API if you're a **Security Reader** or **Security Administrator** for the tenant. **Global Administrators** will also have access to this data.
42+
Look up the [API reference](https://developer.microsoft.com/graph/) to see how you can [use the APIs to access activity logs](concept-reporting-api.md). This endpoint has two reports (**Audit** and **Sign-ins**) which provide all the data you got in the old API endpoint. This new endpoint also has a sign-ins report with the Azure AD Premium license that you can use to get app usage, device usage, and user sign-in information.
43+
44+
- question: |
45+
I currently use the https://graph.windows.net/<tenant-name>/reports/ endpoint APIs to pull Azure AD security reports (specific types of detections, such as leaked credentials or sign-ins from anonymous IP addresses) into our reporting systems programmatically. What should I switch to?
46+
answer: |
47+
You can use the [Identity Protection risk detections API](../identity-protection/howto-identity-protection-graph-api.md) to access security detections through Microsoft Graph. This new format gives greater flexibility in how you can query data, with advanced filtering, field selection, and more, and standardizes risk detections into one type for easier integration into SIEMs and other data collection tools. Because the data is in a different format, you can't substitute a new query for your old queries. However, [the new API uses Microsoft Graph](/graph/api/resources/identityprotection-root), which is the Microsoft standard for such APIs as Microsoft 365 or Azure AD. So the work required can either extend your current Microsoft Graph investments or help you begin your transition to this new standard platform.
5348
5449
- name: Activity logs
5550
questions:
5651
- question: |
57-
What is the data retention for activity logs (Audit and Sign-ins) in the Azure portal?
52+
Do I need to be a Global Administrator to see the activity logs in the Azure portal or to get data through the API?
53+
answer: |
54+
No, the [least privilege role](../roles/delegate-by-task.md) to view audit and sign-in logs is **Reports Reader**. Other roles include **Security Reader** and **Security Administrator** for the tenant. You can also access the reporting data through the portal or through the API if you're a Global Administrator.
55+
56+
- question: |
57+
What is the data retention for activity logs (Audit, Sign-ins, and Provisioning) in the Azure portal?
5858
answer: |
5959
For more information, see [data retention policies for Azure AD reports](reference-reports-data-retention.md).
6060
@@ -71,10 +71,10 @@ sections:
7171
- question: |
7272
Which APIs do I use to get information about Microsoft 365 Activity logs?
7373
answer: |
74-
Use the [Microsoft 365 Management APIs](/office/office-365-management-api/office-365-management-apis-overview) to access the Microsoft 365 Activity logs through an API.
74+
The APIs for Microsoft 365 are described in the [Microsoft 365 Management APIs](/office/office-365-management-api/office-365-management-apis-overview) article.
7575
7676
- question: |
77-
How many records I can download from Azure portal?
77+
How many records I can download from the Azure portal?
7878
answer: |
7979
You can download up to 5000 records from the Azure portal. The records are sorted by *most recent* and by default, you get the most recent 5000 records.
8080
@@ -85,29 +85,48 @@ sections:
8585
What data is included in the CSV file I can download from the Azure AD sign-in logs?
8686
answer: |
8787
The CSV includes sign-in logs for your users and service principals. However, data that is represented as a nested array in the MS Graph API for sign-in logs isn't included. For example, conditional access policies and report-only information aren't included. If you need to export all the information contained in your sign-in logs, use the **Export Data Settings** feature.
88+
8889
- question: |
8990
I see .XXX in part of the IP address from a user in my sign-in logs. Why is that happening?
9091
answer: |
9192
Azure AD may redact part of an IP address in the sign-in logs to protect user privacy when a user may not belong to the tenant viewing the logs. This action happens in two cases: first, during cross tenant sign ins, such as when a CSP technician signs into a tenant that CSP manages. Second, when our service wasn't able to determine the user's identity with sufficient confidence to be sure the user belongs to the tenant viewing the logs.
93+
9294
- question: |
9395
I see "PII Removed" in the Device Details of a user in my sign-in logs. Why is that happening?
9496
answer: |
9597
Azure AD redacts Personally Identifiable Information (PII) generated by devices that do not belong to your tenant to ensure customer data does not spread beyond tenant boundaries without user and data owner consent.
9698
99+
- question: |
100+
I see duplicate sign-in entries / multiple sign-in events per requestID. Why is that happening?
101+
answer: |
102+
There are several reasons sign-in entries may be duplicated in your logs.
103+
- If a risk is identified on a sign-in, another nearly identical event is published immediately after with risk included.
104+
- If MFA events related to a sign-in are received, all related events are aggregated to the original sign-in.
105+
- If partner publishing for a sign-in event fails, such as publishing to Kusto, an entire batch of events will be retried and published again, which may result in duplicates.
106+
- Sign-in events that involve multiple Conditional Access policies may be split into multiple events, which can result in at least two events per sign-in event.
107+
108+
- question: |
109+
Why do my non-interactive sign-ins appear to have the same time stamp?
110+
answer: |
111+
Non-interactive sign-ins can trigger a large volume of events every hour, so they are grouped together in the logs.
112+
113+
In many cases, non-interactive sign-ins have all the same characteristics, except for the date and time of the sign-in. If the time aggregate is set to 24 hours, the logs will appear to show the sign-ins at the same time. Each of these grouped rows can be expanded to view the exact time stamp.
97114
98-
- name: Conditional Access
99-
questions:
100115
- question: |
101-
What's new with this feature?
116+
I am seeing User IDs in the username field of my sign-ins log. Why is this happening?
102117
answer: |
103-
Customers can now troubleshoot Conditional Access policies through all sign-ins report. Customers can review the Conditional Access status and dive into the details of the policies that applied to the sign-in and the result for each policy.
118+
With passwordless authentication, User IDs appear as the username. To confirm this scenario, look at the details of the sign-in event in question. The *authenticationDetail* field will say *passwordless*.
104119
120+
- name: Conditional Access
121+
questions:
105122
- question: |
106-
How do I get started?
123+
What Conditional Access (CA) details can I see in the sign-in logs?
107124
answer: |
125+
You can troubleshoot Conditional Access policies through all sign-ins log. Review the CA status and dive into the details of the policies that applied to the sign-in and the result for each policy.
126+
108127
To get started:
109128
110-
* Navigate to the sign-ins report in the [Azure portal](https://portal.azure.com).
129+
* Sign in to the [Azure portal](https://portal.azure.com) and got to **Azure AD** > **Sign-ins log**.
111130
* Select the sign-in that you want to troubleshoot.
112131
* Navigate to the **Conditional Access** tab.
113132
Here, you can view all the policies that impacted the sign-in and the result for each policy.
@@ -117,26 +136,26 @@ sections:
117136
answer: |
118137
Conditional Access status can have the following values:
119138
120-
* **Not Applied**: There was no Conditional Access policy with the user and app in scope.
121-
* **Success**: There was a Conditional Access policy with the user and app in scope and Conditional Access policies were successfully satisfied.
122-
* **Failure**: The sign-in satisfied the user and application condition of at least one Conditional Access policy and grant controls are either not satisfied or set to block access.
139+
* **Not Applied**: There was no CA policy with the user and app in scope.
140+
* **Success**: There was a CA policy with the user and app in scope and CA policies were successfully satisfied.
141+
* **Failure**: The sign-in satisfied the user and application condition of at least one CA policy and grant controls are either not satisfied or set to block access.
123142
124143
- question: |
125144
What are all possible values for the Conditional Access policy result?
126145
answer: |
127-
A Conditional Access policy can have the following results:
146+
A CA policy can have the following results:
128147
129148
* **Success**: The policy was successfully satisfied.
130149
* **Failure**: The policy wasn't satisfied.
131150
* **Not applied**: The policy conditions may not have been met.
132151
* **Not enabled**: The policy may be in a disabled state.
133152
134153
- question: |
135-
The policy name in the all sign-in report doesn't match the policy name in Conditional Access. Why?
154+
The policy name in the sign-ins log doesn't match the policy name in Conditional Access. Why?
136155
answer: |
137-
The policy name in the all sign-in report is based on the Conditional Access (CA) policy name at the time of the sign-in. The name can be inconsistent with the policy name in CA if you updated the policy name later, that is, after the sign-in.
156+
The policy name in the sign-ins log is based on the CA policy name at the time of the sign-in. The name can be inconsistent with the policy name in CA if you updated the policy name after the sign-in.
138157
139158
- question: |
140-
My sign-in was blocked due to a Conditional Access policy, but the sign-in activity report shows that the sign-in succeeded. Why?
159+
My sign-in was blocked due to a Conditional Access policy, but the sign-ins log shows that the sign-in succeeded. Why?
141160
answer: |
142-
Currently the sign-in report may not show accurate results for Exchange ActiveSync scenarios when Conditional Access is applied. There can be cases when the sign-in result in the report shows a successful sign-in, but the sign-in actually failed due to a Conditional Access policy.
161+
Currently the sign-ins log may not show accurate results for Exchange ActiveSync scenarios when Conditional Access is applied. There can be cases when the sign-in result in the report shows a successful sign-in, but the sign-in actually failed due to a CA policy.

0 commit comments

Comments
 (0)