You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/app-provisioning/known-issues.md
+4-1Lines changed: 4 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -95,6 +95,9 @@ If a user and their manager are both in scope for provisioning, the service prov
95
95
96
96
The global reader role is unable to read the provisioning configuration. Please create a custom role with the `microsoft.directory/applications/synchronization/standard/read` permission in order to read the provisioning configuration from the Azure Portal.
97
97
98
+
#### Microsoft Azure Government Cloud
99
+
Credentials, including the secret token, notification email, and SSO certificate notification emails together have a 1KB limit in the Microsoft Azure Government Cloud.
100
+
98
101
## On-premises application provisioning
99
102
The following information is a current list of known limitations with the Azure AD ECMA Connector Host and on-premises application provisioning.
100
103
@@ -139,4 +142,4 @@ The following attributes and objects aren't supported:
139
142
The ECMA host does not support updating the password in the connectivity page of the wizard. Please create a new connector when changing the password.
Copy file name to clipboardExpand all lines: articles/active-directory/app-provisioning/on-premises-application-provisioning-architecture.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,7 +7,7 @@ manager: amycolannino
7
7
ms.service: active-directory
8
8
ms.workload: identity
9
9
ms.topic: overview
10
-
ms.date: 08/26/2022
10
+
ms.date: 11/04/2022
11
11
ms.subservice: hybrid
12
12
ms.author: billmath
13
13
ms.collection: M365-identity-device-management
@@ -93,7 +93,7 @@ You can define one or more matching attribute(s) and prioritize them based on th
93
93
- The agent must communicate with both Azure and your application, so the placement of the agent affects the latency of those two connections. You can minimize the latency of the end-to-end traffic by optimizing each network connection. Each connection can be optimized by:
94
94
- Reducing the distance between the two ends of the hop.
95
95
- Choosing the right network to traverse. For example, traversing a private network rather than the public internet might be faster because of dedicated links.
96
-
96
+
- The agent and ECMA Host rely on a certificate for communication. The self-signed certificate generated by the ECMA host should only be used for testing purposes. The self-signed certificate expires in two years by default and cannot be revoked. Microsoft recommends using a certificiate from a trusted CA for production use cases.
Copy file name to clipboardExpand all lines: articles/active-directory/reports-monitoring/reports-faq.yml
+49-30Lines changed: 49 additions & 30 deletions
Original file line number
Diff line number
Diff line change
@@ -21,16 +21,6 @@ summary: |
21
21
sections:
22
22
- name: Getting started
23
23
questions:
24
-
- question: |
25
-
I currently use the `https://graph.windows.net/<tenant-name>/reports/` endpoint APIs to pull Azure AD audit and integrated application usage reports into our reporting systems programmatically. What should I switch to?
26
-
answer: |
27
-
Look up the [API reference](https://developer.microsoft.com/graph/) to see how you can [use the APIs to access activity reports](concept-reporting-api.md). This endpoint has two reports (**Audit** and **Sign-ins**) which provide all the data you got in the old API endpoint. This new endpoint also has a sign-ins report with the Azure AD Premium license that you can use to get app usage, device usage, and user sign-in information.
28
-
29
-
- question: |
30
-
I currently use the `https://graph.windows.net/<tenant-name>/reports/` endpoint APIs to pull Azure AD security reports (specific types of detections, such as leaked credentials or sign-ins from anonymous IP addresses) into our reporting systems programmatically. What should I switch to?
31
-
answer: |
32
-
You can use the [Identity Protection risk detections API](../identity-protection/howto-identity-protection-graph-api.md) to access security detections through Microsoft Graph. This new format gives greater flexibility in how you can query data, with advanced filtering, field selection, and more, and standardizes risk detections into one type for easier integration into SIEMs and other data collection tools. Because the data is in a different format, you can't substitute a new query for your old queries. However, [the new API uses Microsoft Graph](/graph/api/resources/identityprotection-root), which is the Microsoft standard for such APIs as Microsoft 365 or Azure AD. So the work required can either extend your current Microsoft Graph investments or help you begin your transition to this new standard platform.
33
-
34
24
- question: |
35
25
How do I get a premium license?
36
26
answer: |
@@ -39,22 +29,32 @@ sections:
39
29
- question: |
40
30
How soon should I see activities data after getting a premium license?
41
31
answer: |
42
-
If you already have activities data as a free license, then you can see it immediately. If you don’t have any data, then it will take up to 3 days for the data to show up in the reports.
32
+
If you already have activities data as a free license, then you can see it immediately. If you don't have any data, then it will take up to 3 days for the data to show up in the reports.
43
33
44
34
- question: |
45
35
Can I see last month's data after getting an Azure AD premium license?
46
36
answer: |
47
37
If you've recently switched to a Premium version (including a trial version), you can see data up to 7 days initially. When data accumulates, you can see data for the past 30 days.
48
38
49
39
- question: |
50
-
Do I need to be a global administrator to see the activity sign-ins to the Azure portal or to get data through the API?
40
+
I currently use the https://graph.windows.net/<tenant-name>/reports/ endpoint APIs to pull Azure AD audit and integrated application usage reports into our reporting systems programmatically. What should I switch to?
51
41
answer: |
52
-
No, you can also access the reporting data through the portal or through the API if you're a **Security Reader** or **Security Administrator** for the tenant. **Global Administrators** will also have access to this data.
42
+
Look up the [API reference](https://developer.microsoft.com/graph/) to see how you can [use the APIs to access activity logs](concept-reporting-api.md). This endpoint has two reports (**Audit** and **Sign-ins**) which provide all the data you got in the old API endpoint. This new endpoint also has a sign-ins report with the Azure AD Premium license that you can use to get app usage, device usage, and user sign-in information.
43
+
44
+
- question: |
45
+
I currently use the https://graph.windows.net/<tenant-name>/reports/ endpoint APIs to pull Azure AD security reports (specific types of detections, such as leaked credentials or sign-ins from anonymous IP addresses) into our reporting systems programmatically. What should I switch to?
46
+
answer: |
47
+
You can use the [Identity Protection risk detections API](../identity-protection/howto-identity-protection-graph-api.md) to access security detections through Microsoft Graph. This new format gives greater flexibility in how you can query data, with advanced filtering, field selection, and more, and standardizes risk detections into one type for easier integration into SIEMs and other data collection tools. Because the data is in a different format, you can't substitute a new query for your old queries. However, [the new API uses Microsoft Graph](/graph/api/resources/identityprotection-root), which is the Microsoft standard for such APIs as Microsoft 365 or Azure AD. So the work required can either extend your current Microsoft Graph investments or help you begin your transition to this new standard platform.
53
48
54
49
- name: Activity logs
55
50
questions:
56
51
- question: |
57
-
What is the data retention for activity logs (Audit and Sign-ins) in the Azure portal?
52
+
Do I need to be a Global Administrator to see the activity logs in the Azure portal or to get data through the API?
53
+
answer: |
54
+
No, the [least privilege role](../roles/delegate-by-task.md) to view audit and sign-in logs is **Reports Reader**. Other roles include **Security Reader** and **Security Administrator** for the tenant. You can also access the reporting data through the portal or through the API if you're a Global Administrator.
55
+
56
+
- question: |
57
+
What is the data retention for activity logs (Audit, Sign-ins, and Provisioning) in the Azure portal?
58
58
answer: |
59
59
For more information, see [data retention policies for Azure AD reports](reference-reports-data-retention.md).
60
60
@@ -71,10 +71,10 @@ sections:
71
71
- question: |
72
72
Which APIs do I use to get information about Microsoft 365 Activity logs?
73
73
answer: |
74
-
Use the [Microsoft 365 Management APIs](/office/office-365-management-api/office-365-management-apis-overview) to access the Microsoft 365 Activity logs through an API.
74
+
The APIs for Microsoft 365 are described in the [Microsoft 365 Management APIs](/office/office-365-management-api/office-365-management-apis-overview) article.
75
75
76
76
- question: |
77
-
How many records I can download from Azure portal?
77
+
How many records I can download from the Azure portal?
78
78
answer: |
79
79
You can download up to 5000 records from the Azure portal. The records are sorted by *most recent* and by default, you get the most recent 5000 records.
80
80
@@ -85,29 +85,48 @@ sections:
85
85
What data is included in the CSV file I can download from the Azure AD sign-in logs?
86
86
answer: |
87
87
The CSV includes sign-in logs for your users and service principals. However, data that is represented as a nested array in the MS Graph API for sign-in logs isn't included. For example, conditional access policies and report-only information aren't included. If you need to export all the information contained in your sign-in logs, use the **Export Data Settings** feature.
88
+
88
89
- question: |
89
90
I see .XXX in part of the IP address from a user in my sign-in logs. Why is that happening?
90
91
answer: |
91
92
Azure AD may redact part of an IP address in the sign-in logs to protect user privacy when a user may not belong to the tenant viewing the logs. This action happens in two cases: first, during cross tenant sign ins, such as when a CSP technician signs into a tenant that CSP manages. Second, when our service wasn't able to determine the user's identity with sufficient confidence to be sure the user belongs to the tenant viewing the logs.
93
+
92
94
- question: |
93
95
I see "PII Removed" in the Device Details of a user in my sign-in logs. Why is that happening?
94
96
answer: |
95
97
Azure AD redacts Personally Identifiable Information (PII) generated by devices that do not belong to your tenant to ensure customer data does not spread beyond tenant boundaries without user and data owner consent.
96
98
99
+
- question: |
100
+
I see duplicate sign-in entries / multiple sign-in events per requestID. Why is that happening?
101
+
answer: |
102
+
There are several reasons sign-in entries may be duplicated in your logs.
103
+
- If a risk is identified on a sign-in, another nearly identical event is published immediately after with risk included.
104
+
- If MFA events related to a sign-in are received, all related events are aggregated to the original sign-in.
105
+
- If partner publishing for a sign-in event fails, such as publishing to Kusto, an entire batch of events will be retried and published again, which may result in duplicates.
106
+
- Sign-in events that involve multiple Conditional Access policies may be split into multiple events, which can result in at least two events per sign-in event.
107
+
108
+
- question: |
109
+
Why do my non-interactive sign-ins appear to have the same time stamp?
110
+
answer: |
111
+
Non-interactive sign-ins can trigger a large volume of events every hour, so they are grouped together in the logs.
112
+
113
+
In many cases, non-interactive sign-ins have all the same characteristics, except for the date and time of the sign-in. If the time aggregate is set to 24 hours, the logs will appear to show the sign-ins at the same time. Each of these grouped rows can be expanded to view the exact time stamp.
97
114
98
-
- name: Conditional Access
99
-
questions:
100
115
- question: |
101
-
What's new with this feature?
116
+
I am seeing User IDs in the username field of my sign-ins log. Why is this happening?
102
117
answer: |
103
-
Customers can now troubleshoot Conditional Access policies through all sign-ins report. Customers can review the Conditional Access status and dive into the details of the policies that applied to the sign-in and the result for each policy.
118
+
With passwordless authentication, User IDs appear as the username. To confirm this scenario, look at the details of the sign-in event in question. The *authenticationDetail* field will say *passwordless*.
104
119
120
+
- name: Conditional Access
121
+
questions:
105
122
- question: |
106
-
How do I get started?
123
+
What Conditional Access (CA) details can I see in the sign-in logs?
107
124
answer: |
125
+
You can troubleshoot Conditional Access policies through all sign-ins log. Review the CA status and dive into the details of the policies that applied to the sign-in and the result for each policy.
126
+
108
127
To get started:
109
128
110
-
* Navigate to the sign-ins report in the [Azure portal](https://portal.azure.com).
129
+
* Sign in to the [Azure portal](https://portal.azure.com) and got to **Azure AD** > **Sign-ins log**.
111
130
* Select the sign-in that you want to troubleshoot.
112
131
* Navigate to the **Conditional Access** tab.
113
132
Here, you can view all the policies that impacted the sign-in and the result for each policy.
@@ -117,26 +136,26 @@ sections:
117
136
answer: |
118
137
Conditional Access status can have the following values:
119
138
120
-
* **Not Applied**: There was no Conditional Access policy with the user and app in scope.
121
-
* **Success**: There was a Conditional Access policy with the user and app in scope and Conditional Access policies were successfully satisfied.
122
-
* **Failure**: The sign-in satisfied the user and application condition of at least one Conditional Access policy and grant controls are either not satisfied or set to block access.
139
+
* **Not Applied**: There was no CA policy with the user and app in scope.
140
+
* **Success**: There was a CA policy with the user and app in scope and CA policies were successfully satisfied.
141
+
* **Failure**: The sign-in satisfied the user and application condition of at least one CA policy and grant controls are either not satisfied or set to block access.
123
142
124
143
- question: |
125
144
What are all possible values for the Conditional Access policy result?
126
145
answer: |
127
-
A Conditional Access policy can have the following results:
146
+
A CA policy can have the following results:
128
147
129
148
* **Success**: The policy was successfully satisfied.
130
149
* **Failure**: The policy wasn't satisfied.
131
150
* **Not applied**: The policy conditions may not have been met.
132
151
* **Not enabled**: The policy may be in a disabled state.
133
152
134
153
- question: |
135
-
The policy name in the all sign-in report doesn't match the policy name in Conditional Access. Why?
154
+
The policy name in the sign-ins log doesn't match the policy name in Conditional Access. Why?
136
155
answer: |
137
-
The policy name in the all sign-in report is based on the Conditional Access (CA) policy name at the time of the sign-in. The name can be inconsistent with the policy name in CA if you updated the policy name later, that is, after the sign-in.
156
+
The policy name in the sign-ins log is based on the CA policy name at the time of the sign-in. The name can be inconsistent with the policy name in CA if you updated the policy name after the sign-in.
138
157
139
158
- question: |
140
-
My sign-in was blocked due to a Conditional Access policy, but the sign-in activity report shows that the sign-in succeeded. Why?
159
+
My sign-in was blocked due to a Conditional Access policy, but the sign-ins log shows that the sign-in succeeded. Why?
141
160
answer: |
142
-
Currently the sign-in report may not show accurate results for Exchange ActiveSync scenarios when Conditional Access is applied. There can be cases when the sign-in result in the report shows a successful sign-in, but the sign-in actually failed due to a Conditional Access policy.
161
+
Currently the sign-ins log may not show accurate results for Exchange ActiveSync scenarios when Conditional Access is applied. There can be cases when the sign-in result in the report shows a successful sign-in, but the sign-in actually failed due to a CA policy.
0 commit comments