You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/governance/access-reviews-overview.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
---
2
2
title: What are access reviews? - Microsoft Entra | Microsoft Docs
3
-
description: Using Microsoft Entra access reviews, you can control group membership and application access to meet governance, risk management, and compliance initiatives in your organization.
3
+
description: Using access reviews, you can control group membership and application access to meet governance, risk management, and compliance initiatives in your organization.
4
4
services: active-directory
5
5
documentationcenter: ''
6
6
author: amsliu
@@ -11,7 +11,7 @@ ms.workload: identity
11
11
ms.tgt_pltfrm: na
12
12
ms.topic: overview
13
13
ms.subservice: compliance
14
-
ms.date: 10/29/2020
14
+
ms.date: 12/27/2022
15
15
ms.author: amsliu
16
16
ms.reviewer: mwahl
17
17
ms.collection: M365-identity-device-management
@@ -20,7 +20,7 @@ ms.custom: contperf-fy21q1
20
20
21
21
# What are access reviews?
22
22
23
-
Microsoft Entra access reviews enable organizations to efficiently manage group memberships, access to enterprise applications, and role assignments. User's access can be reviewed on a regular basis to make sure only the right people have continued access.
23
+
Access reviews in Azure Active Directory (Azure AD), part of Microsoft Entra, enable organizations to efficiently manage group memberships, access to enterprise applications, and role assignments. User's access can be reviewed regularly to make sure only the right people have continued access.
24
24
25
25
Here's a video that provides a quick overview of access reviews:
26
26
@@ -38,7 +38,7 @@ Azure AD enables you to collaborate with users from inside your organization and
38
38
39
39
## When should you use access reviews?
40
40
41
-
-**Too many users in privileged roles:** It's a good idea to check how many users have administrative access, how many of them are Global Administrators, and if there are any invited guests or partners that have not been removed after being assigned to do an administrative task. You can recertify the role assignment users in [Azure AD roles](../privileged-identity-management/pim-perform-azure-ad-roles-and-resource-roles-review.md?toc=%2fazure%2factive-directory%2fgovernance%2ftoc.json) such as Global Administrators, or [Azure resources roles](../privileged-identity-management/pim-perform-azure-ad-roles-and-resource-roles-review.md?toc=%2fazure%2factive-directory%2fgovernance%2ftoc.json) such as User Access Administrator in the [Microsoft Entra Privileged Identity Management (PIM)](../privileged-identity-management/pim-configure.md) experience.
41
+
-**Too many users in privileged roles:** It's a good idea to check how many users have administrative access, how many of them are Global Administrators, and if there are any invited guests or partners that haven't been removed after being assigned to do an administrative task. You can recertify the role assignment users in [Azure AD roles](../privileged-identity-management/pim-perform-azure-ad-roles-and-resource-roles-review.md?toc=%2fazure%2factive-directory%2fgovernance%2ftoc.json) such as Global Administrators, or [Azure resources roles](../privileged-identity-management/pim-perform-azure-ad-roles-and-resource-roles-review.md?toc=%2fazure%2factive-directory%2fgovernance%2ftoc.json) such as User Access Administrator in the [Microsoft Entra Privileged Identity Management (PIM)](../privileged-identity-management/pim-configure.md) experience.
42
42
-**When automation is not possible:** You can create rules for dynamic membership on security groups or Microsoft 365 Groups, but what if the HR data is not in Azure AD or if users still need access after leaving the group to train their replacement? You can then create a review on that group to ensure those who still need access should have continued access.
43
43
-**When a group is used for a new purpose:** If you have a group that is going to be synced to Azure AD, or if you plan to enable the application Salesforce for everyone in the Sales team group, it would be useful to ask the group owner to review the group membership prior to the group being used in a different risk content.
44
44
-**Business critical data access:** for certain resources, such as [business critical applications](identity-governance-applications-prepare.md), it might be required as part of compliance processes to ask people to regularly reconfirm and give a justification on why they need continued access.
@@ -51,7 +51,7 @@ Azure AD enables you to collaborate with users from inside your organization and
51
51
52
52
## Where do you create reviews?
53
53
54
-
Depending on what you want to review, you will create your access review in access reviews, Azure AD enterprise apps (in preview), PIM, or entitlement management.
54
+
Depending on what you want to review, you'll either create your access review in access reviews, Azure AD enterprise apps (in preview), PIM, or entitlement management.
55
55
56
56
| Access rights of users | Reviewers can be | Review created in | Reviewer experience |
Copy file name to clipboardExpand all lines: articles/active-directory/governance/conditional-access-exclusion.md
+18-18Lines changed: 18 additions & 18 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
---
2
2
title: Manage users excluded from Conditional Access policies
3
-
description: Learn how to use Microsoft Entra access reviews to manage users that have been excluded from Conditional Access policies
3
+
description: Learn how to use access reviews to manage users that have been excluded from Conditional Access policies
4
4
services: active-directory
5
5
documentationcenter: ''
6
6
author: amsliu
@@ -11,7 +11,7 @@ ms.workload: identity
11
11
ms.tgt_pltfrm: na
12
12
ms.topic: conceptual
13
13
ms.subservice: compliance
14
-
ms.date: 12/23/2020
14
+
ms.date: 12/27/2022
15
15
ms.author: amsliu
16
16
ms.reviewer: mwahl
17
17
ms.collection: M365-identity-device-management
@@ -41,52 +41,52 @@ Another example might be that you have a Conditional Access policy [blocking leg
41
41
42
42
## Why are exclusions challenging?
43
43
44
-
In Azure AD, you can scope a Conditional Access policy to a set of users. You can also configure exclusions by selecting Azure AD roles, individual users, or guests. You should keep in mind that when exclusions are configured, the policy intent can't be enforced on excluded users. If exclusions are configured using a list of users or using legacy on-premises security groups, you will have limited visibility into the exclusions. As a result:
44
+
In Azure AD, you can scope a Conditional Access policy to a set of users. You can also configure exclusions by selecting Azure AD roles, individual users, or guests. You should keep in mind that when exclusions are configured, the policy intent can't be enforced on excluded users. If exclusions are configured using a list of users or using legacy on-premises security groups, you'll have limited visibility into the exclusions. As a result:
45
45
46
-
- Users may not know that they are excluded.
46
+
- Users may not know that they're excluded.
47
47
48
48
- Users can join the security group to bypass the policy.
49
49
50
50
- Excluded users may have qualified for the exclusion before but may no longer qualify for it.
51
51
52
-
Frequently, when you first configure an exclusion, there is a shortlist of users who bypass the policy. Over time, more and more users get added to the exclusion, and the list grows. At some point, you need to review the list and confirm that each of these users is still eligible for exclusion. Managing the exclusion list, from a technical point of view, can be relatively easy, but who makes the business decisions, and how do you make sure it is all auditable? However, if you configure the exclusion using an Azure AD group, you can use access reviews as a compensating control, to drive visibility, and reduce the number of excluded users.
52
+
Frequently, when you first configure an exclusion, there's a shortlist of users who bypass the policy. Over time, more users get added to the exclusion, and the list grows. At some point, you need to review the list and confirm that each of these users is still eligible for exclusion. Managing the exclusion list, from a technical point of view, can be relatively easy, but who makes the business decisions, and how do you make sure it's all auditable? However, if you configure the exclusion using an Azure AD group, you can use access reviews as a compensating control, to drive visibility, and reduce the number of excluded users.
53
53
54
54
## How to create an exclusion group in a Conditional Access policy
55
55
56
-
Follow these steps to create a new Azure AD group and a Conditional Access policy that does not apply to that group.
56
+
Follow these steps to create a new Azure AD group and a Conditional Access policy that doesn't apply to that group.
57
57
58
58
### Create an exclusion group
59
59
60
60
1. Sign in to the Azure portal.
61
61
62
-
2. In the left navigation, click**Azure Active Directory** and then click**Groups**.
62
+
2. In the left navigation, select**Azure Active Directory** and then select**Groups**.
63
63
64
-
3. On the top menu, click**New Group** to open the group pane.
64
+
3. On the top menu, select**New Group** to open the group pane.
65
65
66
66
4. In the **Group type** list, select **Security**. Specify a name and description.
67
67
68
68
5. Make sure to set the **Membership** type to **Assigned**.
69
69
70
-
6. Select the users that should be part of this exclusion group and then click**Create**.
70
+
6. Select the users that should be part of this exclusion group and then select**Create**.
71
71
72
72

73
73
74
74
### Create a Conditional Access policy that excludes the group
75
75
76
76
Now you can create a Conditional Access policy that uses this exclusion group.
77
77
78
-
1. In the left navigation, click**Azure Active Directory** and then click**Conditional Access** to open the **Policies** blade.
78
+
1. In the left navigation, select**Azure Active Directory** and then select**Conditional Access** to open the **Policies** blade.
79
79
80
-
2.Click**New policy** to open the **New** pane.
80
+
2.Select**New policy** to open the **New** pane.
81
81
82
82
3. Specify a name.
83
83
84
-
4. Under Assignments click**Users and groups**.
84
+
4. Under Assignments select**Users and groups**.
85
85
86
86
5. On the **Include** tab, select **All Users**.
87
87
88
88
6. On the **Exclude** tab, add a checkmark to **Users and groups** and then
89
-
click**Select excluded users**.
89
+
select**Select excluded users**.
90
90
91
91
7. Select the exclusion group you created.
92
92
@@ -101,7 +101,7 @@ Let's cover two examples where you can use access reviews to manage exclusions i
101
101
102
102
## Example 1: Access review for users accessing from blocked countries/regions
103
103
104
-
Let's say you have a Conditional Access policy that blocks access from certain countries/regions. It includes a group that is excluded from the policy. Here is
104
+
Let's say you have a Conditional Access policy that blocks access from certain countries/regions. It includes a group that is excluded from the policy. Here's
105
105
a recommended access review where members of the group are reviewed.
106
106
107
107
> [!NOTE]
@@ -116,7 +116,7 @@ a recommended access review where members of the group are reviewed.
116
116
4. Each user will need to self-attest that they still need access from these blocked countries/regions, therefore they still need to be a member of the
117
117
group.
118
118
119
-
5. If the user doesn't respond to the review request, they will be automatically removed from the group, and they will no longer have access to the tenant while traveling to these countries/regions.
119
+
5. If the user doesn't respond to the review request, they'll be automatically removed from the group, and they'll no longer have access to the tenant while traveling to these countries/regions.
120
120
121
121
6. Enable email notifications to let users know about the start and completion of the access review.
122
122
@@ -146,17 +146,17 @@ that is excluded from the policy. Here is a recommended access review where memb
146
146
147
147
## Access review results and audit logs
148
148
149
-
Now that you have everything in place, group, Conditional Access policy, and access reviews, it is time to monitor and track the results of these reviews.
149
+
Now that you have everything in place, group, Conditional Access policy, and access reviews, it's time to monitor and track the results of these reviews.
150
150
151
151
1. In the Azure portal, open the **Access reviews** blade.
152
152
153
153
2. Open the control and program you have created for managing the exclusion group.
154
154
155
-
3.Click**Results** to see who was approved to stay on the list and who was removed.
155
+
3.Select**Results** to see who was approved to stay on the list and who was removed.
156
156
157
157

158
158
159
-
4. Then click**Audit logs** to see the actions that were taken during this review.
159
+
4. Then select**Audit logs** to see the actions that were taken during this review.
0 commit comments