Skip to content

Commit 379a7ec

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into FAQ-new
2 parents 0485a0e + 2e8bb6d commit 379a7ec

File tree

98 files changed

+668
-514
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

98 files changed

+668
-514
lines changed

.openpublishing.redirection.azure-monitor.json

Lines changed: 45 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -431,6 +431,51 @@
431431
"redirect_url": "/azure/key-vault/key-vault-insights-overview",
432432
"redirect_document_id": false
433433
},
434+
{
435+
"source_path_from_root": "/articles/azure-monitor/app/proactive-diagnostics.md" ,
436+
"redirect_url": "/azure/azure-monitor/alerts/proactive-diagnostics",
437+
"redirect_document_id": false
438+
},
439+
{
440+
"source_path_from_root": "/articles/azure-monitor/app/proactive-failure-diagnostics.md" ,
441+
"redirect_url": "/azure/azure-monitor/alerts/proactive-failure-diagnostics",
442+
"redirect_document_id": false
443+
},
444+
{
445+
"source_path_from_root": "/articles/azure-monitor/app/proactive-performance-diagnostics.md" ,
446+
"redirect_url": "/azure/azure-monitor/alerts/proactive-performance-diagnostics",
447+
"redirect_document_id": false
448+
},
449+
{
450+
"source_path_from_root": "/articles/azure-monitor/app/proactive-trace-severity.md" ,
451+
"redirect_url": "/azure/azure-monitor/alerts/proactive-trace-severity",
452+
"redirect_document_id": false
453+
},
454+
{
455+
"source_path_from_root": "/articles/azure-monitor/app/proactive-exception-volume.md" ,
456+
"redirect_url": "/azure/azure-monitor/alerts/proactive-exception-volume",
457+
"redirect_document_id": false
458+
},
459+
{
460+
"source_path_from_root": "/articles/azure-monitor/app/proactive-potential-memory-leak.md" ,
461+
"redirect_url": "/azure/azure-monitor/alerts/proactive-potential-memory-leak",
462+
"redirect_document_id": false
463+
},
464+
{
465+
"source_path_from_root": "/articles/azure-monitor/app/proactive-application-security-detection-pack.md" ,
466+
"redirect_url": "/azure/azure-monitor/alerts/proactive-application-security-detection-pack",
467+
"redirect_document_id": false
468+
},
469+
{
470+
"source_path_from_root": "/articles/azure-monitor/app/proactive-arm-config.md" ,
471+
"redirect_url": "/azure/azure-monitor/alerts/proactive-arm-config",
472+
"redirect_document_id": false
473+
},
474+
{
475+
"source_path_from_root": "/articles/azure-monitor/app/proactive-email-notification.md" ,
476+
"redirect_url": "/azure/azure-monitor/alerts/proactive-email-notification",
477+
"redirect_document_id": false
478+
},
434479
{
435480
"source_path_from_root": "/articles/azure-monitor/app/cloudservices.md" ,
436481
"redirect_url": "/azure/azure-monitor/app/azure-web-apps-net-core",

articles/active-directory/governance/TOC.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@
1818
items:
1919
- name: Azure portal tutorials
2020
items:
21-
- name: Manage access to resources - Azure portal
21+
- name: Manage access to resources
2222
href: entitlement-management-access-package-first.md
2323
- name: Manage the lifecycle of your group-based licenses in Azure AD
2424
href: entitlement-management-group-licenses.md

articles/active-directory/governance/entitlement-management-access-package-first.md

Lines changed: 79 additions & 85 deletions
Large diffs are not rendered by default.

articles/active-directory/governance/entitlement-management-access-reviews-create.md

Lines changed: 7 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ ms.workload: identity
1111
ms.tgt_pltfrm: na
1212
ms.topic: how-to
1313
ms.subservice: compliance
14-
ms.date: 10/26/2021
14+
ms.date: 08/01/2022
1515
ms.author: owinfrey
1616
ms.reviewer:
1717
ms.collection: M365-identity-device-management
@@ -37,6 +37,12 @@ For more information, see [License requirements](entitlement-management-overview
3737

3838
You can enable access reviews when [creating a new access package](entitlement-management-access-package-create.md) or [editing an existing access package assignment policy](entitlement-management-access-package-lifecycle-policy.md) policy. If you have multiple policies, for different communities of users to request access, you can have independent access review schedules for each policy. Follow these steps to enable access reviews of an access package's assignments:
3939

40+
1. In the Azure portal, select **Azure Active Directory** and then select **Identity Governance**.
41+
42+
1. To create a new access policy, in the left menu, select **Access packages**, then select **New access** package.
43+
44+
1. To edit an existing access policy, in the left menu, select **Access packages** and open the access package you want to edit. Then, in the left menu, select **Policies** and select the policy that has the lifecycle settings you want to edit.
45+
4046
1. Open the **Lifecycle** tab for an access package assignment policy to specify when a user's assignment to the access package expires. You can also specify whether users can extend their assignments.
4147

4248
1. In the **Expiration** section, set Access package assignments expires to **On date**, **Number of days**, **Number of hours**, or **Never**.

articles/active-directory/governance/entitlement-management-overview.md

Lines changed: 15 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ ms.workload: identity
1111
ms.tgt_pltfrm: na
1212
ms.topic: overview
1313
ms.subservice: compliance
14-
ms.date: 11/23/2020
14+
ms.date: 08/01/2022
1515
ms.author: owinfrey
1616
ms.reviewer: markwahl-msft
1717
ms.collection: M365-identity-device-management
@@ -25,7 +25,7 @@ ms.custom: contperf-fy21q1
2525

2626
Azure Active Directory (Azure AD) entitlement management is an [identity governance](identity-governance-overview.md) feature that enables organizations to manage identity and access lifecycle at scale, by automating access request workflows, access assignments, reviews, and expiration.
2727

28-
Employees in organizations need access to various groups, applications, and sites to perform their job. Managing this access is challenging, as requirements change - new applications are added or users need additional access rights. This scenario gets more complicated when you collaborate with outside organizations - you may not know who in the other organization needs access to your organization's resources, and they won't know what applications, groups, or sites your organization is using.
28+
Employees in organizations need access to various groups, applications, and SharePoint Online sites to perform their job. Managing this access is challenging, as requirements change. New applications are added or users need more access rights. This scenario gets more complicated when you collaborate with outside organizations. You may not know who in the other organization needs access to your organization's resources, and they won't know what applications, groups, or sites your organization is using.
2929

3030
Azure AD entitlement management can help you more efficiently manage access to groups, applications, and SharePoint Online sites for internal users, and also for users outside your organization who need access to those resources.
3131

@@ -49,9 +49,9 @@ Azure AD entitlement management can help address these challenges. To learn mor
4949

5050
Here are some of capabilities of entitlement management:
5151

52-
- Control who can get access to applications, groups, Teams and SharePoint sites, with multi-stage approval, and ensure users do not retain access indefinitely through time-limited assignments and recurring access reviews.
52+
- Control who can get access to applications, groups, Teams and SharePoint sites, with multi-stage approval, and ensure users don't retain access indefinitely through time-limited assignments and recurring access reviews.
5353
- Delegate to non-administrators the ability to create access packages. These access packages contain resources that users can request, and the delegated access package managers can define policies with rules for which users can request, who must approve their access, and when access expires.
54-
- Select connected organizations whose users can request access. When a user who is not yet in your directory requests access, and is approved, they are automatically invited into your directory and assigned access. When their access expires, if they have no other access package assignments, their B2B account in your directory can be automatically removed.
54+
- Select connected organizations whose users can request access. When a user who isn't yet in your directory requests access, and is approved, they're automatically invited into your directory and assigned access. When their access expires, if they have no other access package assignments, their B2B account in your directory can be automatically removed.
5555

5656
>[!NOTE]
5757
>If you are ready to try Entitlement management you can get started with our [tutorial to create your first access package](entitlement-management-access-package-first.md).
@@ -85,11 +85,11 @@ With an access package, an administrator or delegated access package manager lis
8585

8686
Access packages also include one or more *policies*. A policy defines the rules or guardrails for assignment to access package. Each policy can be used to ensure that only the appropriate users are able to have access assignments, and the access is time-limited and will expire if not renewed.
8787

88-
![Access package and policies](./media/entitlement-management-overview/elm-overview-access-package.png)
88+
![Diagram of access package and policies.](./media/entitlement-management-overview/elm-overview-access-package.png)
8989

9090
You can have policies for users to request access. In these kinds of policies, an administrator or access package manager defines
9191

92-
- Either the already-existing users (typically employees or already-invited guests), or the partner organizations of external users, that are eligible to request access
92+
- Either the already-existing users (typically employees or already-invited guests), or the partner organizations of external users that are eligible to request access
9393
- The approval process and the users that can approve or deny access
9494
- The duration of a user's access assignment, once approved, before the assignment expires
9595

@@ -100,13 +100,13 @@ The following diagram shows an example of the different elements in entitlement
100100
- **Access package 1** includes a single group as a resource. Access is defined with a policy that enables a set of users in the directory to request access.
101101
- **Access package 2** includes a group, an application, and a SharePoint Online site as resources. Access is defined with two different policies. The first policy enables a set of users in the directory to request access. The second policy enables users in an external directory to request access.
102102

103-
![Entitlement management overview](./media/entitlement-management-overview/elm-overview.png)
103+
![Entitlement management overview diagram](./media/entitlement-management-overview/elm-overview.png)
104104

105105
## When should I use access packages?
106106

107-
Access packages do not replace other mechanisms for access assignment. They are most appropriate in situations such as:
107+
Access packages don't replace other mechanisms for access assignment. They're most appropriate in situations such as:
108108

109-
- Employees need time-limited access for a particular task. For example, you might use group-based licensing and a dynamic group to ensure all employees have an Exchange Online mailbox, and then use access packages for situations in which employees need additional access, such as to read departmental resources from another department.
109+
- Employees need time-limited access for a particular task. For example, you might use group-based licensing and a dynamic group to ensure all employees have an Exchange Online mailbox, and then use access packages for situations in which employees need more access rights. For example, rights to read departmental resources from another department.
110110
- Access that requires the approval of an employee's manager or other designated individuals.
111111
- Departments wish to manage their own access policies for their resources without IT involvement.
112112
- Two or more organizations are collaborating on a project, and as a result, multiple users from one organization will need to be brought in via Azure AD B2B to access another organization's resources.
@@ -130,14 +130,14 @@ To better understand entitlement management and its documentation, you can refer
130130
| policy | A set of rules that defines the access lifecycle, such as how users get access, who can approve, and how long users have access through an assignment. A policy is linked to an access package. For example, an access package could have two policies - one for employees to request access and a second for external users to request access. |
131131
| resource | An asset, such as an Office group, a security group, an application, or a SharePoint Online site, with a role that a user can be granted permissions to. |
132132
| resource directory | A directory that has one or more resources to share. |
133-
| resource role | A collection of permissions associated with and defined by a resource. A group has two roles - member and owner. SharePoint sites typically have 3 roles but may have additional custom roles. Applications can have custom roles. |
133+
| resource role | A collection of permissions associated with and defined by a resource. A group has two roles - member and owner. SharePoint sites typically have three roles but may have other custom roles. Applications can have custom roles. |
134134

135135

136136
## License requirements
137137

138138
[!INCLUDE [Azure AD Premium P2 license](../../../includes/active-directory-p2-license.md)]
139139

140-
Specialized clouds, such as Azure Germany, and Azure China 21Vianet, are not currently available for use.
140+
Specialized clouds, such as Azure Germany, and Azure China 21Vianet, aren't currently available for use.
141141

142142
### How many licenses must you have?
143143

@@ -169,14 +169,14 @@ Here are some example license scenarios to help you determine the number of lice
169169

170170
| Scenario | Calculation | Number of licenses |
171171
| --- | --- | --- |
172-
| A Global Administrator at Woodgrove Bank creates initial catalogs and delegates administrative tasks to 6 other users. One of the policies specifies that **All employees** (2,000 employees) can request a specific set of access packages. 150 employees request the access packages. | 2,000 employees who **can** request the access packages | 2,000 |
173-
| A Global Administrator at Woodgrove Bank creates initial catalogs and delegates administrative tasks to 6 other users. One of the policies specifies that **All employees** (2,000 employees) can request a specific set of access packages. Another policy specifies that some users from **Users from partner Contoso** (guests) can request the same access packages subject to approval. Contoso has 30,000 users. 150 employees request the access packages and 10,500 users from Contoso request access. | 2,000 employees need licenses, guest users are billed on a monthly active user basis and no additional licenses are required for them. * | 2,000 |
172+
| A Global Administrator at Woodgrove Bank creates initial catalogs and delegates administrative tasks to six other users. One of the policies specifies that **All employees** (2,000 employees) can request a specific set of access packages. 150 employees request the access packages. | 2,000 employees who **can** request the access packages | 2,000 |
173+
| A Global Administrator at Woodgrove Bank creates initial catalogs and delegates administrative tasks to six other users. One of the policies specifies that **All employees** (2,000 employees) can request a specific set of access packages. Another policy specifies that some users from **Users from partner Contoso** (guests) can request the same access packages subject to approval. Contoso has 30,000 users. 150 employees request the access packages and 10,500 users from Contoso request access. | 2,000 employees need licenses, guest users are billed on a monthly active user basis and no additional licenses are required for them. * | 2,000 |
174174

175175
\* Azure AD External Identities (guest user) pricing is based on monthly active users (MAU), which is the count of unique users with authentication activity within a calendar month. This model replaces the 1:5 ratio billing model, which allowed up to five guest users for each Azure AD Premium license in your tenant. When your tenant is linked to a subscription and you use External Identities features to collaborate with guest users, you'll be automatically billed using the MAU-based billing model. For more information, see [Billing model for Azure AD External Identities](../external-identities/external-identities-pricing.md).
176176

177177

178178
## Next steps
179179

180-
- If you are interested in using the Azure portal to manage access to resources, see [Tutorial: Manage access to resources - Azure portal](entitlement-management-access-package-first.md).
181-
- if you are interested in using Microsoft Graph to manage access to resources, see [Tutorial: manage access to resources - Microsoft Graph](/graph/tutorial-access-package-api?toc=/azure/active-directory/governance/toc.json&bc=/azure/active-directory/governance/breadcrumb/toc.json)
180+
- If you're interested in using the Azure portal to manage access to resources, see [Tutorial: Manage access to resources - Azure portal](entitlement-management-access-package-first.md).
181+
- if you're interested in using Microsoft Graph to manage access to resources, see [Tutorial: manage access to resources - Microsoft Graph](/graph/tutorial-access-package-api?toc=/azure/active-directory/governance/toc.json&bc=/azure/active-directory/governance/breadcrumb/toc.json)
182182
- [Common scenarios](entitlement-management-scenarios.md)

articles/active-directory/governance/entitlement-management-process.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ ms.workload: identity
1111
ms.tgt_pltfrm: na
1212
ms.topic: conceptual
1313
ms.subservice: compliance
14-
ms.date: 5/17/2021
14+
ms.date: 08/01/2022
1515
ms.author: owinfrey
1616
ms.reviewer: mamkumar
1717
ms.collection: M365-identity-device-management
@@ -54,17 +54,17 @@ The following diagrams show when these email notifications are sent to either th
5454
### First approvers and alternate approvers
5555
The following diagram shows the experience of first approvers and alternate approvers, and the email notifications they receive during the request process:
5656

57-
![First and alternate approvers process flow](./media/entitlement-management-process/first-approvers-and-alternate-with-escalation-flow.png)
57+
:::image type="content" source="./media/entitlement-management-process/first-approvers-and-alternate-with-escalation-flow.png" alt-text="First and alternate approvers process flow" lightbox="./media/entitlement-management-process/first-approvers-and-alternate-with-escalation-flow.png":::
5858

5959
### Requestors
6060
The following diagram shows the experience of requestors and the email notifications they receive during the request process:
6161

62-
![Requestor process flow](./media/entitlement-management-process/requestor-approval-request-flow.png)
62+
:::image type="content" source="./media/entitlement-management-process/requestor-approval-request-flow.png" alt-text="Requestor process flow" lightbox="./media/entitlement-management-process/requestor-approval-request-flow.png":::
6363

6464
### Multi-stage approval
6565
The following diagram shows the experience of stage-1 and stage-2 approvers and the email notifications they receive during the request process:
6666

67-
![2-stage approval process flow](./media/entitlement-management-process/2stage-approval-with-request-timeout-flow.png)
67+
:::image type="content" source="./media/entitlement-management-process/2stage-approval-with-request-timeout-flow.png" alt-text="2-stage approval process flow" lightbox="./media/entitlement-management-process/2stage-approval-with-request-timeout-flow.png":::
6868

6969
### Email notifications table
7070
The following table provides more detail about each of these email notifications. To manage these emails, you can use rules. For example, in Outlook, you can create rules to move the emails to a folder if the subject contains words from this table. Note that the words will be based on the default language settings of the tenant where the user is requesting access.
@@ -143,7 +143,7 @@ When the request reaches its configured expiration date and expires, it can no l
143143

144144
An email notification is sent to the requestor, notifying them that their access request has expired, and that they need to resubmit the access request. The following diagram shows the experience of the requestor and the email notifications they receive when they request to extend access:
145145

146-
![Requestor extend access process flow](./media/entitlement-management-process/requestor-expiration-request-flow.png)
146+
:::image type="content" source="./media/entitlement-management-process/requestor-expiration-request-flow.png" alt-text="Requestor extend access process flow" lightbox="./media/entitlement-management-process/requestor-expiration-request-flow.png":::
147147

148148
Here is a sample email notification that is sent to a requestor when their access request has expired:
149149

3.1 KB
Loading
78 KB
Loading

0 commit comments

Comments
 (0)