Skip to content

Commit 45a1b84

Browse files
authored
Merge pull request #187911 from MicrosoftDocs/main
2/08 AM Publish
2 parents fe5ef54 + adfa47e commit 45a1b84

File tree

166 files changed

+1419
-1306
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

166 files changed

+1419
-1306
lines changed

articles/active-directory/app-provisioning/on-premises-application-provisioning-architecture.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.author: billmath
1313
ms.collection: M365-identity-device-management
1414
---
1515

16-
# Azure AD on-premises application provisioning architecture
16+
# Azure AD on-premises application provisioning architecture (preview)
1717

1818
## Overview
1919

articles/active-directory/app-provisioning/on-premises-ldap-connector-configure.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Azure AD Provisioning to LDAP directories
2+
title: Azure AD Provisioning to LDAP directories (preview)
33
description: This document describes how to configure Azure AD to provision users into an LDAP directory.
44
services: active-directory
55
author: billmath
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: app-provisioning
99
ms.topic: how-to
1010
ms.workload: identity
11-
ms.date: 10/15/2021
11+
ms.date: 02/08/2022
1212
ms.author: billmath
1313
ms.reviewer: arvinh
1414
---

articles/active-directory/app-provisioning/tutorial-ecma-sql-connector.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,13 @@
11
---
2-
title: Azure AD Provisioning to SQL applications
2+
title: Azure AD Provisioning to SQL applications (preview)
33
description: This tutorial describes how to provision users from Azure AD into a SQL database.
44
services: active-directory
55
author: billmath
66
manager: karenhoran
77
ms.service: active-directory
88
ms.workload: identity
99
ms.topic: tutorial
10-
ms.date: 10/21/2021
10+
ms.date: 02/08/2022
1111
ms.subservice: hybrid
1212
ms.author: billmath
1313
ms.reviewer: arvinh

articles/active-directory/conditional-access/overview.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: conditional-access
88
ms.topic: overview
9-
ms.date: 12/02/2021
9+
ms.date: 02/08/2022
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -51,6 +51,7 @@ Common signals that Conditional Access can take in to account when making a poli
5151
- Administrators can specify entire countries/regions IP ranges to block or allow traffic from.
5252
- Device
5353
- Users with devices of specific platforms or marked with a specific state can be used when enforcing Conditional Access policies.
54+
- Use filters for devices to target policies to specific devices like privileged access workstations.
5455
- Application
5556
- Users attempting to access specific applications can trigger different Conditional Access policies.
5657
- Real-time and calculated risk detection
@@ -88,7 +89,7 @@ Many organizations have [common access concerns that Conditional Access policies
8889

8990
Customers with [Microsoft 365 Business Premium licenses](/office365/servicedescriptions/office-365-service-descriptions-technet-library) also have access to Conditional Access features.
9091

91-
[Sign-in Risk](concept-conditional-access-conditions.md#sign-in-risk) requires access to [Identity Protection](../identity-protection/overview-identity-protection.md)
92+
Risk-based policies require access to [Identity Protection](../identity-protection/overview-identity-protection.md), which is an Azure AD P2 feature.
9293

9394
## Next steps
9495

articles/active-directory/devices/assign-local-admin.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -73,7 +73,8 @@ Starting with Windows 10 version 2004, you can use Azure AD groups to manage adm
7373
> [!NOTE]
7474
> Starting in the Windows 10 20H2 update, we recommend using [Local Users and Groups](/windows/client-management/mdm/policy-csp-localusersandgroups) policy instead of the Restricted Groups policy.
7575
76-
Currently, there's no UI in Intune to manage these policies and they need to be configured using [Custom OMA-URI Settings](/mem/intune/configuration/custom-settings-windows-10). A few considerations for using either of these policies:
76+
These policies can be configured in Intune using either [Custom OMA-URI Settings](/mem/intune/configuration/custom-settings-windows-10) or the [Local user group membership profile](/mem/intune/protect/endpoint-security-account-protection-policy#manage-local-groups-on-windows-devices) which is currently in preview as per the following [blog](https://techcommunity.microsoft.com/t5/intune-customer-success/new-settings-available-to-configure-local-user-group-membership/ba-p/3093207).
77+
A few considerations for using either of these policies:
7778

7879
- Adding Azure AD groups through the policy requires the group's SID that can be obtained by executing the [Microsoft Graph API for Groups](/graph/api/resources/group). The SID is defined by the property `securityIdentifier` in the API response.
7980

articles/active-directory/devices/azuread-join-sso.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: devices
88
ms.topic: conceptual
9-
ms.date: 02/07/2022
9+
ms.date: 02/08/2022
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -17,7 +17,7 @@ ms.collection: M365-identity-device-management
1717
---
1818
# How SSO to on-premises resources works on Azure AD joined devices
1919

20-
It's probably not a surprise that an Azure Active Directory (Azure AD) joined device gives you a single sign-on (SSO) experience to your tenant's cloud apps. If your environment has an on-premises Active Directory (AD), you can also get SSO experience on Azure AD joined devices to resources and applications that rely on on-premises AD.
20+
It's probably not a surprise that an Azure Active Directory (Azure AD) joined device gives you a single sign-on (SSO) experience to your tenant's cloud apps. If your environment has on-premises Active Directory Domain Services (AD DS), you can also get SSO experience on Azure AD joined devices to resources and applications that rely on on-premises AD.
2121

2222
This article explains how this works.
2323

@@ -66,11 +66,11 @@ You can use:
6666

6767
## What you should know
6868

69-
You may have to adjust your [domain-based filtering](../hybrid/how-to-connect-sync-configure-filtering.md#domain-based-filtering) in Azure AD Connect to ensure that the data about the required domains is synchronized if you have multiple domains.
70-
71-
Apps and resources that depend on Active Directory machine authentication don't work because Azure AD joined devices don't have a computer object in AD.
72-
73-
You can't share files with other users on an Azure AD-joined device.
69+
- You may have to adjust your [domain-based filtering](../hybrid/how-to-connect-sync-configure-filtering.md#domain-based-filtering) in Azure AD Connect to ensure that the data about the required domains is synchronized if you have multiple domains.
70+
- Apps and resources that depend on Active Directory machine authentication don't work because Azure AD joined devices don't have a computer object in AD.
71+
- You can't share files with other users on an Azure AD-joined device.
72+
- Applications running on your Azure AD joined device may authenticate users. They must use the implicit UPN or the NT4 type syntax with the domain FQDN name as the domain part, for example: [email protected] or contoso.corp.com\user.
73+
- If applications use the NETBIOS or legacy name like contoso\user, the errors the application gets would be either, NT error STATUS_BAD_VALIDATION_CLASS - 0xc00000a7, or Windows error ERROR_BAD_VALIDATION_CLASS - 1348 “The validation information class requested was invalid.” This happens even if you can resolve the legacy domain name.
7474

7575
## Next steps
7676

articles/active-directory/external-identities/cross-tenant-access-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -105,7 +105,7 @@ The output is a list of outbound sign-ins initiated by your users to apps in ext
105105

106106
### Azure Monitor
107107

108-
If your organization subscribes to the Azure Monitor service, you can use the [Cross-tenant access activity workbook](/reports-monitoring/workbook-cross-tenant-access-activity.md) (available in the Monitoring workbooks gallery in the Azure portal) to visually explore inbound and outbound sign-ins for longer time periods.
108+
If your organization subscribes to the Azure Monitor service, you can use the [Cross-tenant access activity workbook](../reports-monitoring/workbook-cross-tenant-access-activity.md) (available in the Monitoring workbooks gallery in the Azure portal) to visually explore inbound and outbound sign-ins for longer time periods.
109109

110110
### Security Information and Event Management (SIEM) Systems
111111

articles/active-directory/identity-protection/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -15,6 +15,8 @@
1515
href: concept-identity-protection-policies.md
1616
- name: What is the sign-in experience?
1717
href: concept-identity-protection-user-experience.md
18+
- name: Securing workload identities
19+
href: concept-workload-identity-risk.md
1820
- name: Identity Protection and B2B users
1921
href: concept-identity-protection-b2b.md
2022
- name: How-to guides
Lines changed: 107 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,107 @@
1+
---
2+
title: Securing workload identities with Azure AD Identity Protection
3+
description: Workload identity risk in Azure Active Directory Identity Protection
4+
5+
services: active-directory
6+
ms.service: active-directory
7+
ms.subservice: identity-protection
8+
ms.topic: conceptual
9+
ms.date: 02/07/2022
10+
11+
ms.author: joflore
12+
author: MicrosoftGuyJFlo
13+
manager: karenhoran
14+
ms.reviewer: etbasser
15+
16+
ms.collection: M365-identity-device-management
17+
---
18+
# Securing workload identities with Identity Protection
19+
20+
Azure AD Identity Protection has historically protected users in detecting, investigating, and remediating identity-based risks. We're now extending these capabilities to workload identities to protect applications, service principals, and Managed Identities.
21+
22+
A workload identity is an identity that allows an application or service principal access to resources, sometimes in the context of a user. These workload identities differ from traditional user accounts as they:
23+
24+
- Can’t perform multi-factor authentication.
25+
- Often have no formal lifecycle process.
26+
- Need to store their credentials or secrets somewhere.
27+
28+
These differences make workload identities harder to manage and put them at higher risk for compromise.
29+
30+
> [!IMPORTANT]
31+
> In public preview, you can secure workload identities with Identity Protection and Azure Active Directory Premium P2 edition active in your tenant. After general availability, additional licenses might be required.
32+
33+
## Prerequisites
34+
35+
To make use of workload identity risk, including the new **Risky workload identities (preview)** blade and the **Workload identity detections** tab in the **Risk detections** blade, in the Azure portal you must have the following.
36+
37+
- Azure AD Premium P2 licensing
38+
- One of the following administrator roles assigned
39+
- Global administrator
40+
- Security administrator
41+
- Security operator
42+
- Security reader
43+
44+
## Workload identity risk detections
45+
46+
We detect risk on workload identities across sign-in behavior and offline indicators of compromise.
47+
48+
| Detection name | Detection type | Description |
49+
| --- | --- | --- |
50+
| Azure AD threat intelligence | Offline | This risk detection indicates some activity that is consistent with known attack patterns based on Microsoft's internal and external threat intelligence sources. |
51+
| Suspicious Sign-ins | Offline | This risk detection indicates sign-in properties or patterns that are unusual for this service principal. <br><br> The detection learns the baselines sign-in behavior for workload identities in your tenant in between 2 and 60 days, and fires if one or more of the following unfamiliar properties appear during a later sign-in: IP address / ASN, target resource, user agent, hosting/non-hosting IP change, IP country, credential type. <br><br> Because of the programmatic nature of workload identity sign-ins, we provide a timestamp for the suspicious activity instead of flagging a specific sign-in event. <br><br> Sign-ins that are initiated after an authorized configuration change may trigger this detection. |
52+
| Admin confirmed account compromised | Offline | This detection indicates an admin has selected 'Confirm compromised' in the Risky Workload Identities UI or using riskyServicePrincipals API. To see which admin has confirmed this account compromised, check the account’s risk history (via UI or API). |
53+
54+
## Identify risky workload identities
55+
56+
Organizations can find workload identities that have been flagged for risk in one of two locations:
57+
58+
1. Navigate to the [Azure portal](https://portal.azure.com).
59+
1. Browse to **Azure Active Directory** > **Security** > **Risky workload identities (preview)**.
60+
1. Or browse to **Azure Active Directory** > **Security** > **Risk detections**.
61+
1. Select the **Workload identity detections** tab.
62+
63+
:::image type="content" source="media/concept-workload-identity-risk/workload-identity-detections-in-risk-detections-report.png" alt-text="Screenshot showing risks detected against workload identities in the report." lightbox="media/concept-workload-identity-risk/workload-identity-detections-in-risk-detections-report.png":::
64+
65+
### Graph APIs
66+
67+
You can also query risky workload identities [using the Microsoft Graph API](/graph/use-the-api). There are two new collections in the [Identity Protection APIs](/graph/api/resources/identityprotection-root?view=graph-rest-beta&preserve-view=true)
68+
69+
- riskyServicePrincipals
70+
- servicePrincipalRiskDetections
71+
72+
### Export risk data
73+
74+
Organizations can export data by configurating [diagnostic settings in Azure AD](howto-export-risk-data.md) to send risk data to a Log Analytics workspace, archive it to a storage account, stream it to an event hub, or send it to a SIEM solution.
75+
76+
## Investigate risky workload identities
77+
78+
Identity Protection provides organizations with two reports they can use to investigate workload identity risk. These reports are the risky workload identities, and risk detections for workload identities. All reports allow for downloading of events in .CSV format for further analysis outside of the Azure portal.
79+
80+
Some of the key questions to answer during your investigation include:
81+
82+
- Do accounts show suspicious sign-in activity?
83+
- Have there been unauthorized changes to the credentials?
84+
- Have there been suspicious configuration changes to accounts?
85+
- Did the account acquire unauthorized application roles?
86+
87+
The [Azure Active Directory security operations guide for Applications](../fundamentals/security-operations-applications.md) provides detailed guidance on the above investigation areas.
88+
89+
Once you determine if the workload identity was compromised, dismiss the account’s risk or confirm the account as compromised in the Risky workload identities (preview) report. You can also select “Disable service principal” if you want to block the account from further sign-ins.
90+
91+
:::image type="content" source="media/concept-workload-identity-risk/confirm-compromise-or-dismiss-risk.png" alt-text="Confirm workload identity compromise or dismiss the risk in the Azure portal." lightbox="media/concept-workload-identity-risk/confirm-compromise-or-dismiss-risk.png":::
92+
93+
## Remediate risky workload identities
94+
95+
1. Inventory credentials assigned to the risky workload identity, whether for the service principal or application objects.
96+
1. Add a new credential. Microsoft recommends using x509 certificates.
97+
1. Remove the compromised credentials. If you believe the account is at risk, we recommend removing all existing credentials.
98+
1. Remediate any Azure KeyVault secrets that the Service Principal has access to by rotating them.
99+
100+
The [Azure AD Toolkit](https://github.com/microsoft/AzureADToolkit) is a PowerShell module that can help you perform some of these actions.
101+
102+
## Next steps
103+
104+
- [Conditional Access for workload identities](../conditional-access/workload-identity.md)
105+
- [Microsoft Graph API](/graph/use-the-api)
106+
- [Azure AD audit logs](../reports-monitoring/concept-audit-logs.md)
107+
- [Azure AD sign-in logs](../reports-monitoring/concept-sign-ins.md)
Loading

0 commit comments

Comments
 (0)