Skip to content

Commit 533ca5b

Browse files
authored
Merge pull request #222496 from MicrosoftDocs/main
12/27 PM Publish
2 parents 72eb6a3 + 31ecc29 commit 533ca5b

File tree

140 files changed

+665
-355
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

140 files changed

+665
-355
lines changed

articles/active-directory/governance/access-reviews-overview.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: What are access reviews? - Microsoft Entra | Microsoft Docs
3-
description: Using Microsoft Entra access reviews, you can control group membership and application access to meet governance, risk management, and compliance initiatives in your organization.
3+
description: Using access reviews, you can control group membership and application access to meet governance, risk management, and compliance initiatives in your organization.
44
services: active-directory
55
documentationcenter: ''
66
author: amsliu
@@ -11,7 +11,7 @@ ms.workload: identity
1111
ms.tgt_pltfrm: na
1212
ms.topic: overview
1313
ms.subservice: compliance
14-
ms.date: 10/29/2020
14+
ms.date: 12/27/2022
1515
ms.author: amsliu
1616
ms.reviewer: mwahl
1717
ms.collection: M365-identity-device-management
@@ -20,7 +20,7 @@ ms.custom: contperf-fy21q1
2020

2121
# What are access reviews?
2222

23-
Microsoft Entra access reviews enable organizations to efficiently manage group memberships, access to enterprise applications, and role assignments. User's access can be reviewed on a regular basis to make sure only the right people have continued access.
23+
Access reviews in Azure Active Directory (Azure AD), part of Microsoft Entra, enable organizations to efficiently manage group memberships, access to enterprise applications, and role assignments. User's access can be reviewed regularly to make sure only the right people have continued access.
2424

2525
Here's a video that provides a quick overview of access reviews:
2626

@@ -38,7 +38,7 @@ Azure AD enables you to collaborate with users from inside your organization and
3838

3939
## When should you use access reviews?
4040

41-
- **Too many users in privileged roles:** It's a good idea to check how many users have administrative access, how many of them are Global Administrators, and if there are any invited guests or partners that have not been removed after being assigned to do an administrative task. You can recertify the role assignment users in [Azure AD roles](../privileged-identity-management/pim-perform-azure-ad-roles-and-resource-roles-review.md?toc=%2fazure%2factive-directory%2fgovernance%2ftoc.json) such as Global Administrators, or [Azure resources roles](../privileged-identity-management/pim-perform-azure-ad-roles-and-resource-roles-review.md?toc=%2fazure%2factive-directory%2fgovernance%2ftoc.json) such as User Access Administrator in the [Microsoft Entra Privileged Identity Management (PIM)](../privileged-identity-management/pim-configure.md) experience.
41+
- **Too many users in privileged roles:** It's a good idea to check how many users have administrative access, how many of them are Global Administrators, and if there are any invited guests or partners that haven't been removed after being assigned to do an administrative task. You can recertify the role assignment users in [Azure AD roles](../privileged-identity-management/pim-perform-azure-ad-roles-and-resource-roles-review.md?toc=%2fazure%2factive-directory%2fgovernance%2ftoc.json) such as Global Administrators, or [Azure resources roles](../privileged-identity-management/pim-perform-azure-ad-roles-and-resource-roles-review.md?toc=%2fazure%2factive-directory%2fgovernance%2ftoc.json) such as User Access Administrator in the [Microsoft Entra Privileged Identity Management (PIM)](../privileged-identity-management/pim-configure.md) experience.
4242
- **When automation is not possible:** You can create rules for dynamic membership on security groups or Microsoft 365 Groups, but what if the HR data is not in Azure AD or if users still need access after leaving the group to train their replacement? You can then create a review on that group to ensure those who still need access should have continued access.
4343
- **When a group is used for a new purpose:** If you have a group that is going to be synced to Azure AD, or if you plan to enable the application Salesforce for everyone in the Sales team group, it would be useful to ask the group owner to review the group membership prior to the group being used in a different risk content.
4444
- **Business critical data access:** for certain resources, such as [business critical applications](identity-governance-applications-prepare.md), it might be required as part of compliance processes to ask people to regularly reconfirm and give a justification on why they need continued access.
@@ -51,7 +51,7 @@ Azure AD enables you to collaborate with users from inside your organization and
5151
5252
## Where do you create reviews?
5353

54-
Depending on what you want to review, you will create your access review in access reviews, Azure AD enterprise apps (in preview), PIM, or entitlement management.
54+
Depending on what you want to review, you'll either create your access review in access reviews, Azure AD enterprise apps (in preview), PIM, or entitlement management.
5555

5656
| Access rights of users | Reviewers can be | Review created in | Reviewer experience |
5757
| --- | --- | --- | --- |

articles/active-directory/governance/conditional-access-exclusion.md

Lines changed: 18 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Manage users excluded from Conditional Access policies
3-
description: Learn how to use Microsoft Entra access reviews to manage users that have been excluded from Conditional Access policies
3+
description: Learn how to use access reviews to manage users that have been excluded from Conditional Access policies
44
services: active-directory
55
documentationcenter: ''
66
author: amsliu
@@ -11,7 +11,7 @@ ms.workload: identity
1111
ms.tgt_pltfrm: na
1212
ms.topic: conceptual
1313
ms.subservice: compliance
14-
ms.date: 12/23/2020
14+
ms.date: 12/27/2022
1515
ms.author: amsliu
1616
ms.reviewer: mwahl
1717
ms.collection: M365-identity-device-management
@@ -41,52 +41,52 @@ Another example might be that you have a Conditional Access policy [blocking leg
4141
4242
## Why are exclusions challenging?
4343

44-
In Azure AD, you can scope a Conditional Access policy to a set of users. You can also configure exclusions by selecting Azure AD roles, individual users, or guests. You should keep in mind that when exclusions are configured, the policy intent can't be enforced on excluded users. If exclusions are configured using a list of users or using legacy on-premises security groups, you will have limited visibility into the exclusions. As a result:
44+
In Azure AD, you can scope a Conditional Access policy to a set of users. You can also configure exclusions by selecting Azure AD roles, individual users, or guests. You should keep in mind that when exclusions are configured, the policy intent can't be enforced on excluded users. If exclusions are configured using a list of users or using legacy on-premises security groups, you'll have limited visibility into the exclusions. As a result:
4545

46-
- Users may not know that they are excluded.
46+
- Users may not know that they're excluded.
4747

4848
- Users can join the security group to bypass the policy.
4949

5050
- Excluded users may have qualified for the exclusion before but may no longer qualify for it.
5151

52-
Frequently, when you first configure an exclusion, there is a shortlist of users who bypass the policy. Over time, more and more users get added to the exclusion, and the list grows. At some point, you need to review the list and confirm that each of these users is still eligible for exclusion. Managing the exclusion list, from a technical point of view, can be relatively easy, but who makes the business decisions, and how do you make sure it is all auditable? However, if you configure the exclusion using an Azure AD group, you can use access reviews as a compensating control, to drive visibility, and reduce the number of excluded users.
52+
Frequently, when you first configure an exclusion, there's a shortlist of users who bypass the policy. Over time, more users get added to the exclusion, and the list grows. At some point, you need to review the list and confirm that each of these users is still eligible for exclusion. Managing the exclusion list, from a technical point of view, can be relatively easy, but who makes the business decisions, and how do you make sure it's all auditable? However, if you configure the exclusion using an Azure AD group, you can use access reviews as a compensating control, to drive visibility, and reduce the number of excluded users.
5353

5454
## How to create an exclusion group in a Conditional Access policy
5555

56-
Follow these steps to create a new Azure AD group and a Conditional Access policy that does not apply to that group.
56+
Follow these steps to create a new Azure AD group and a Conditional Access policy that doesn't apply to that group.
5757

5858
### Create an exclusion group
5959

6060
1. Sign in to the Azure portal.
6161

62-
2. In the left navigation, click **Azure Active Directory** and then click **Groups**.
62+
2. In the left navigation, select **Azure Active Directory** and then select **Groups**.
6363

64-
3. On the top menu, click **New Group** to open the group pane.
64+
3. On the top menu, select **New Group** to open the group pane.
6565

6666
4. In the **Group type** list, select **Security**. Specify a name and description.
6767

6868
5. Make sure to set the **Membership** type to **Assigned**.
6969

70-
6. Select the users that should be part of this exclusion group and then click **Create**.
70+
6. Select the users that should be part of this exclusion group and then select **Create**.
7171

7272
![New group pane in Azure Active Directory](./media/conditional-access-exclusion/new-group.png)
7373

7474
### Create a Conditional Access policy that excludes the group
7575

7676
Now you can create a Conditional Access policy that uses this exclusion group.
7777

78-
1. In the left navigation, click **Azure Active Directory** and then click **Conditional Access** to open the **Policies** blade.
78+
1. In the left navigation, select **Azure Active Directory** and then select **Conditional Access** to open the **Policies** blade.
7979

80-
2. Click **New policy** to open the **New** pane.
80+
2. Select **New policy** to open the **New** pane.
8181

8282
3. Specify a name.
8383

84-
4. Under Assignments click **Users and groups**.
84+
4. Under Assignments select **Users and groups**.
8585

8686
5. On the **Include** tab, select **All Users**.
8787

8888
6. On the **Exclude** tab, add a checkmark to **Users and groups** and then
89-
click **Select excluded users**.
89+
select **Select excluded users**.
9090

9191
7. Select the exclusion group you created.
9292

@@ -101,7 +101,7 @@ Let's cover two examples where you can use access reviews to manage exclusions i
101101

102102
## Example 1: Access review for users accessing from blocked countries/regions
103103

104-
Let's say you have a Conditional Access policy that blocks access from certain countries/regions. It includes a group that is excluded from the policy. Here is
104+
Let's say you have a Conditional Access policy that blocks access from certain countries/regions. It includes a group that is excluded from the policy. Here's
105105
a recommended access review where members of the group are reviewed.
106106

107107
> [!NOTE]
@@ -116,7 +116,7 @@ a recommended access review where members of the group are reviewed.
116116
4. Each user will need to self-attest that they still need access from these blocked countries/regions, therefore they still need to be a member of the
117117
group.
118118

119-
5. If the user doesn't respond to the review request, they will be automatically removed from the group, and they will no longer have access to the tenant while traveling to these countries/regions.
119+
5. If the user doesn't respond to the review request, they'll be automatically removed from the group, and they'll no longer have access to the tenant while traveling to these countries/regions.
120120

121121
6. Enable email notifications to let users know about the start and completion of the access review.
122122

@@ -146,17 +146,17 @@ that is excluded from the policy. Here is a recommended access review where memb
146146
147147
## Access review results and audit logs
148148

149-
Now that you have everything in place, group, Conditional Access policy, and access reviews, it is time to monitor and track the results of these reviews.
149+
Now that you have everything in place, group, Conditional Access policy, and access reviews, it's time to monitor and track the results of these reviews.
150150

151151
1. In the Azure portal, open the **Access reviews** blade.
152152

153153
2. Open the control and program you have created for managing the exclusion group.
154154

155-
3. Click **Results** to see who was approved to stay on the list and who was removed.
155+
3. Select **Results** to see who was approved to stay on the list and who was removed.
156156

157157
![Access reviews results show who was approved](./media/conditional-access-exclusion/access-reviews-results.png)
158158

159-
4. Then click **Audit logs** to see the actions that were taken during this review.
159+
4. Then select **Audit logs** to see the actions that were taken during this review.
160160

161161
![Access reviews audit logs listing actions](./media/conditional-access-exclusion/access-reviews-audit-logs.png)
162162

0 commit comments

Comments
 (0)