Skip to content

Commit 3389e76

Browse files
authored
Merge pull request #113081 from curtand/pim0428
[Azure AD PIM] replace tenant
2 parents b38a7a3 + 1e3dce2 commit 3389e76

File tree

4 files changed

+14
-14
lines changed

4 files changed

+14
-14
lines changed

articles/active-directory/privileged-identity-management/pim-deployment-plan.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.service: active-directory
1010
ms.topic: conceptual
1111
ms.workload: identity
1212
ms.subservice: pim
13-
ms.date: 02/04/2020
13+
ms.date: 04/28/2020
1414
ms.author: curtand
1515
ms.custom:
1616
ms.collection: M365-identity-device-management
@@ -320,7 +320,7 @@ You should use this stage to verify whether all the configuration you set up for
320320

321321
### Communicate Privileged Identity Management to affected stakeholders
322322

323-
Deploying Privileged Identity Management will introduce additional steps for users of privileged roles. Although Privileged Identity Management greatly reduces security issues associated with privileged identities, the change needs to be effectively communicated before the tenant-wide deployment. Depending on the number of impacted administrators, organizations often elect to create an internal document, a video, or an email about the change. Frequently included in these communications include:
323+
Deploying Privileged Identity Management will introduce additional steps for users of privileged roles. Although Privileged Identity Management greatly reduces security issues associated with privileged identities, the change needs to be effectively communicated before the organization-wide deployment. Depending on the number of impacted administrators, organizations often elect to create an internal document, a video, or an email about the change. Frequently included in these communications include:
324324

325325
- What is PIM
326326
- What is the benefit for the organization
@@ -366,7 +366,7 @@ Successfully deploying Privileged Identity Management in production is a signifi
366366

367367
### Use Privileged Identity Management alerts to safeguard your privileged access
368368

369-
You should utilize Privileged Identity Management’s built-in alerting functionality to better safeguard your tenant. For more information, see [security alerts](pim-how-to-configure-security-alerts.md#security-alerts). These alerts include: administrators aren’t using privileged roles, roles are being assigned outside of Privileged Identity Management, roles are being activated too frequently and more. To fully protect your organization, you should regularly go through your list of alerts and fix the issues. You can view and fix your alerts the following way:
369+
You should utilize Privileged Identity Management’s built-in alerting functionality to better safeguard your organization. For more information, see [security alerts](pim-how-to-configure-security-alerts.md#security-alerts). These alerts include: administrators aren’t using privileged roles, roles are being assigned outside of Privileged Identity Management, roles are being activated too frequently and more. To fully protect your organization, you should regularly go through your list of alerts and fix the issues. You can view and fix your alerts the following way:
370370

371371
1. Sign in to the [Azure portal](https://portal.azure.com/).
372372
1. Open **Azure AD Privileged Identity Management**.

articles/active-directory/privileged-identity-management/pim-email-notifications.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ ms.tgt_pltfrm: na
1111
ms.devlang: na
1212
ms.topic: conceptual
1313
ms.subservice: pim
14-
ms.date: 04/21/2020
14+
ms.date: 04/28/2020
1515
ms.author: curtand
1616
ms.reviewer: hanki
1717
ms.custom: pim
@@ -57,20 +57,20 @@ The following shows an example email that is sent when a user activates an Azure
5757

5858
### Weekly Privileged Identity Management digest email for Azure AD roles
5959

60-
A weekly Privileged Identity Management summary email for Azure AD roles is sent to Privileged Role Administrators, Security Administrators, and Global Administrators that have enabled Privileged Identity Management. This weekly email provides a snapshot of Privileged Identity Management activities for the week as well as privileged role assignments. It is only available for tenants on the public cloud. Here's an example email:
60+
A weekly Privileged Identity Management summary email for Azure AD roles is sent to Privileged Role Administrators, Security Administrators, and Global Administrators that have enabled Privileged Identity Management. This weekly email provides a snapshot of Privileged Identity Management activities for the week as well as privileged role assignments. It is only available for Azure AD organizations on the public cloud. Here's an example email:
6161

6262
![Weekly Privileged Identity Management digest email for Azure AD roles](./media/pim-email-notifications/email-directory-weekly.png)
6363

6464
The email includes four tiles:
6565

6666
| Tile | Description |
6767
| --- | --- |
68-
| **Users activated** | Number of times users activated their eligible role inside the tenant. |
68+
| **Users activated** | Number of times users activated their eligible role inside the organization. |
6969
| **Users made permanent** | Number of times users with an eligible assignment is made permanent. |
7070
| **Role assignments in Privileged Identity Management** | Number of times users are assigned an eligible role inside Privileged Identity Management. |
7171
| **Role assignments outside of PIM** | Number of times users are assigned a permanent role outside of Privileged Identity Management (inside Azure AD). |
7272

73-
The **Overview of your top roles** section lists the top five roles in your tenant based on total number of permanent and eligible administrators for each role. The **Take action** link opens the [PIM wizard](pim-security-wizard.md) where you can convert permanent administrators to eligible administrators in batches.
73+
The **Overview of your top roles** section lists the top five roles in your organization based on total number of permanent and eligible administrators for each role. The **Take action** link opens the [PIM wizard](pim-security-wizard.md) where you can convert permanent administrators to eligible administrators in batches.
7474

7575
## Email timing for activation approvals
7676

articles/active-directory/privileged-identity-management/pim-getting-started.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -64,8 +64,8 @@ Once Privileged Identity Management is set up, you can learn your way around.
6464
| **My requests** | Displays your pending requests to activate eligible role assignments. |
6565
| **Approve requests** | Displays a list of requests to activate eligible roles by users in your directory that you are designated to approve. |
6666
| **Review access** | Lists active access reviews you are assigned to complete, whether you're reviewing access for yourself or someone else. |
67-
| **Azure AD roles** | Displays a dashboard and settings for Privileged role administrators to manage Azure AD role assignments. This dashboard is disabled for anyone who isn't a privileged role administrator. These users have access to a special dashboard titled My view. The My view dashboard only displays information about the user accessing the dashboard, not the entire tenant. |
68-
| **Azure resources** | Displays a dashboard and settings for Privileged role administrators to manage Azure resource role assignments. This dashboard is disabled for anyone who isn't a privileged role administrator. These users have access to a special dashboard titled My view. The My view dashboard only displays information about the user accessing the dashboard, not the entire tenant. |
67+
| **Azure AD roles** | Displays a dashboard and settings for Privileged role administrators to manage Azure AD role assignments. This dashboard is disabled for anyone who isn't a privileged role administrator. These users have access to a special dashboard titled My view. The My view dashboard only displays information about the user accessing the dashboard, not the entire organization. |
68+
| **Azure resources** | Displays a dashboard and settings for Privileged role administrators to manage Azure resource role assignments. This dashboard is disabled for anyone who isn't a privileged role administrator. These users have access to a special dashboard titled My view. The My view dashboard only displays information about the user accessing the dashboard, not the entire organization. |
6969

7070
## Add a PIM tile to the dashboard
7171

articles/active-directory/privileged-identity-management/powershell-for-azure-ad-roles.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.devlang: na
1313
ms.topic: article
1414
ms.tgt_pltfrm: na
1515
ms.workload: identity
16-
ms.date: 02/26/2020
16+
ms.date: 04/28/2020
1717
ms.author: curtand
1818
ms.custom: pim
1919
ms.collection: M365-identity-device-management
@@ -42,16 +42,16 @@ This article contains instructions for using Azure Active Directory (Azure AD) P
4242
$AzureAdCred = Get-Credential
4343
Connect-AzureAD -Credential $AzureAdCred
4444

45-
1. Find your tenant ID by going to **Azure Active Directory** > **Properties** > **Directory ID**. In the cmdlets section, use this ID whenever you need to supply the resourceId.
45+
1. Find the tenant ID for your Azure AD organization by going to **Azure Active Directory** > **Properties** > **Directory ID**. In the cmdlets section, use this ID whenever you need to supply the resourceId.
4646

47-
![Find the tenant ID in the properties for the Azure AD organization](./media/powershell-for-azure-ad-roles/tenant-id-for-Azure-ad-org.png)
47+
![Find the organization ID in the properties for the Azure AD organization](./media/powershell-for-azure-ad-roles/tenant-id-for-Azure-ad-org.png)
4848

4949
> [!Note]
50-
> The following sections are simple examples that can help get you up and running. You can find more detailed documentation regarding the following cmdlets at https://docs.microsoft.com/powershell/module/azuread/?view=azureadps-2.0-preview#privileged_role_management. However, you will need to replace "azureResources" in the providerID parameter with "aadRoles". You will also need to remember to use the tenant ID for your Azure AD organization as the resourceId parameter.
50+
> The following sections are simple examples that can help get you up and running. You can find more detailed documentation regarding the following cmdlets at https://docs.microsoft.com/powershell/module/azuread/?view=azureadps-2.0-preview#privileged_role_management. However, you will need to replace "azureResources" in the providerID parameter with "aadRoles". You will also need to remember to use the organization ID for your Azure AD organization as the resourceId parameter.
5151
5252
## Retrieving role definitions
5353

54-
Use the following cmdlet to get all built-in and custom Azure AD roles in your Azure AD organization (tenant). This important step gives you the mapping between the role name and the roleDefinitionId. The roleDefinitionId is used throughout these cmdlets in order to reference a specific role.
54+
Use the following cmdlet to get all built-in and custom Azure AD roles in your Azure AD organization. This important step gives you the mapping between the role name and the roleDefinitionId. The roleDefinitionId is used throughout these cmdlets in order to reference a specific role.
5555

5656
The roleDefinitionId is specific to your Azure AD organization and is different from the roleDefinitionId returned by the role management API.
5757

0 commit comments

Comments
 (0)