Skip to content

Commit 595b7a3

Browse files
authored
Merge pull request #211197 from MicrosoftDocs/main
9/14 PM Publish
2 parents 1ec6f99 + 6fd17c3 commit 595b7a3

File tree

105 files changed

+1712
-557
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

105 files changed

+1712
-557
lines changed

.openpublishing.redirection.defender-for-cloud.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -710,6 +710,11 @@
710710
"redirect_url": "/azure/defender-for-cloud/defender-for-containers-usage",
711711
"redirect_document_id": true
712712
},
713+
{
714+
"source_path_from_root": "/articles/defender-for-cloud/file-integrity-monitoring-usage.md",
715+
"redirect_url": "/azure/defender-for-cloud/file-integrity-monitoring-enable-log-analytics",
716+
"redirect_document_id": true
717+
},
713718
{
714719
"source_path_from_root": "/articles/defender-for-cloud/release-notes.md#auto-deployment-of-azure-monitor-agent-preview",
715720
"redirect_url": "/azure/defender-for-cloud/release-notes#azure-monitor-agent-integration-now-in-preview",

articles/active-directory/governance/TOC.yml

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -233,12 +233,14 @@
233233
- name: Reference
234234
expanded: true
235235
items:
236+
- name: Identity Governance - PowerShell
237+
href: /powershell/module/microsoft.graph.identity.governance/?view=graph-powershell-beta
236238
- name: Access reviews - Microsoft Graph API
237239
href: /graph/api/resources/accessreviewsv2-overview
238240
- name: Entitlement management - Microsoft Graph API
239241
href: /graph/api/resources/entitlementmanagement-overview
240242
- name: Lifecycle Workflows - Microsoft Graph API
241-
href: /graph/api/resources/identitygovernance-lifecycleworkflows-overview?view=graph-rest-beta
243+
href: /graph/api/resources/identitygovernance-lifecycleworkflows-overview
242244
- name: Lifecycle Workflows - FAQs (Preview)
243245
href: workflows-faqs.md
244246
- name: Developer API reference Lifecycle Workflows- Azure Active Directory

articles/active-directory/hybrid/howto-troubleshoot-upn-changes.md

Lines changed: 12 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: hybrid
88
ms.topic: how-to
9-
ms.date: 03/13/2020
9+
ms.date: 09/13/2022
1010

1111
ms.author: gasinh
1212
author: gargi-sinha
@@ -165,6 +165,17 @@ The user will need to [re-enroll](/windows/security/identity-protection/hello-fo
165165
Windows 7 and 8.1 devices are not affected by this issue after UPN changes.
166166

167167

168+
## Mobile Application Management (MAM) app protection policies known issues and workarounds
169+
170+
**Known Issues**
171+
172+
Your organization may use [MAM app protection policies](https://docs.microsoft.com/mem/intune/apps/app-protection-policy) to protect corporate data in apps on end users' devices.
173+
MAM app protection policies are currently not resiliant to UPN changes. UPN changes can break the connection between existing MAM enrollments and active users in MAM integrated applications, resulting in undefined behavior. This could leave data in an unprotected state.
174+
175+
**Work Around**
176+
177+
IT admins should [issue a selective wipe](https://docs.microsoft.com/mem/intune/apps/apps-selective-wipe) to impacted users following UPN changes. This will force impacted end users to reauthenticate and reenroll with their new UPNs.
178+
168179
## Microsoft Authenticator known issues and workarounds
169180

170181
Your organization might require the use of the [Microsoft Authenticator app](https://support.microsoft.com/account-billing/how-to-use-the-microsoft-authenticator-app-9783c865-0308-42fb-a519-8cf666fe0acc) to sign in and access organizational applications and data. Although a username might appear in the app, the account isn't set up to function as a verification method until the user completes the registration process.

articles/active-directory/identity-protection/howto-identity-protection-graph-api.md

Lines changed: 21 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: identity-protection
88
ms.topic: how-to
9-
ms.date: 08/23/2022
9+
ms.date: 09/13/2022
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -21,24 +21,30 @@ Microsoft Graph is the Microsoft unified API endpoint and the home of [Azure Act
2121

2222
To successfully complete this tutorial, make sure you have the required prerequisites:
2323

24-
- Microsoft Graph PowerShell SDK is installed. Follow the [installation guide](/powershell/microsoftgraph/installation?view=graph-powershell-1.0) for more info on how to do this.
24+
- Microsoft Graph PowerShell SDK is installed. For more information, see the article [Install the Microsoft Graph PowerShell SDK](/powershell/microsoftgraph/installation?view=graph-powershell-1.0&preserve-view=true).
2525
- Identity Protection is available in the beta version of Microsoft Graph PowerShell. Run the following command to set your profile to beta.
26+
2627
```powershell
2728
# Connect to Graph beta Endpoint
2829
Select-MgProfile -Name 'beta'
2930
```
31+
3032
- Microsoft Graph PowerShell using a global administrator role and the appropriate permissions. The IdentityRiskEvent.Read.All, IdentityRiskyUser.ReadWrite.All Or IdentityRiskyUser.ReadWrite.All delegated permissions are required. To set the permissions to IdentityRiskEvent.Read.All and IdentityRiskyUser.ReadWrite.All, run:
33+
3134
```powershell
3235
Connect-MgGraph -Scopes "IdentityRiskEvent.Read.All","IdentityRiskyUser.ReadWrite.All"
3336
```
3437

35-
Or, if you use app-only authentication, you may follow this [guide](/powershell/microsoftgraph/app-only?view=graph-powershell-1.0&tabs=azure-portal). To register an application with the required application permissions, prepare a certificate and run:
38+
If you use app-only authentication, see the article [Use app-only authentication with the Microsoft Graph PowerShell SDK](/powershell/microsoftgraph/app-only?view=graph-powershell-1.0&tabs=azure-portal&preserve-view=true). To register an application with the required application permissions, prepare a certificate and run:
39+
3640
```powershell
3741
Connect-MgGraph -ClientID YOUR_APP_ID -TenantId YOUR_TENANT_ID -CertificateName YOUR_CERT_SUBJECT ## Or -CertificateThumbprint instead of -CertificateName
3842
```
3943

4044
## List risky detections using PowerShell
45+
4146
You can retrieve the risk detections by the properties of a risk detection in Identity Protection.
47+
4248
```powershell
4349
# List all anonymizedIPAddress risk detections
4450
Get-MgRiskDetection -Filter "RiskType eq 'anonymizedIPAddress'" | Format-Table UserDisplayName, RiskType, RiskLevel, DetectedDateTime
@@ -47,8 +53,11 @@ Get-MgRiskDetection -Filter "RiskType eq 'anonymizedIPAddress'" | Format-Table U
4753
Get-MgRiskDetection -Filter "UserDisplayName eq 'User01' and Risklevel eq 'high'" | Format-Table UserDisplayName, RiskType, RiskLevel, DetectedDateTime
4854
4955
```
56+
5057
## List risky users using PowerShell
58+
5159
You can retrieve the risky users and their risky histories in Identity Protection.
60+
5261
```powershell
5362
# List all high risk users
5463
Get-MgRiskyUser -Filter "RiskLevel eq 'high'" | Format-Table UserDisplayName, RiskDetail, RiskLevel, RiskLastUpdatedDateTime
@@ -57,20 +66,27 @@ Get-MgRiskyUser -Filter "RiskLevel eq 'high'" | Format-Table UserDisplayName, Ri
5766
Get-MgRiskyUserHistory -RiskyUserId 375844b0-2026-4265-b9f1-ee1708491e05| Format-Table RiskDetail, RiskLastUpdatedDateTime, @{N="RiskDetection";E={($_). Activity.RiskEventTypes}}, RiskState, UserDisplayName
5867
5968
```
60-
## Confirm users compromised using Powershell
69+
70+
## Confirm users compromised using PowerShell
71+
6172
You can confirm users compromised and flag them as high risky users in Identity Protection.
73+
6274
```powershell
6375
# Confirm Compromised on two users
6476
Confirm-MgRiskyUserCompromised -UserIds "577e09c1-5f26-4870-81ab-6d18194cbb51","bf8ba085-af24-418a-b5b2-3fc71f969bf3"
6577
```
66-
## Dimiss risky users using Powershell
78+
79+
## Dismiss risky users using PowerShell
80+
6781
You can bulk dismiss risky users in Identity Protection.
82+
6883
```powershell
6984
# Get a list of high risky users which are more than 90 days old
7085
$riskyUsers= Get-MgRiskyUser -Filter "RiskLevel eq 'high'" | where RiskLastUpdatedDateTime -LT (Get-Date).AddDays(-90)
7186
# bulk dimmiss the risky users
7287
Invoke-MgDismissRiskyUser -UserIds $riskyUsers.Id
7388
```
89+
7490
## Next steps
7591

7692
- [Get started with the Microsoft Graph PowerShell SDK](/powershell/microsoftgraph/get-started)
Lines changed: 145 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,145 @@
1+
---
2+
3+
title: How to view applied conditional access policies in the Azure AD sign-in logs | Microsoft Docs
4+
description: Learn how to view applied conditional access policies in the Azure AD sign-in logs
5+
services: active-directory
6+
documentationcenter: ''
7+
author: MarkusVi
8+
manager: amycolannino
9+
editor: ''
10+
11+
ms.service: active-directory
12+
ms.topic: how-to
13+
ms.workload: identity
14+
ms.subservice: report-monitor
15+
ms.date: 09/14/2022
16+
ms.author: markvi
17+
ms.reviewer: besiler
18+
19+
ms.collection: M365-identity-device-management
20+
---
21+
22+
# How to: View applied conditional access policies in the Azure AD sign-in logs
23+
24+
With conditional access policies, you can control, how your users get access to the resources of your Azure tenant. As a tenant admin, you need to be able to determine what impact your conditional access policies have on sign-ins to your tenant, so that you can take action if necessary. The sign-in logs in Azure AD provide you with the information you need to assess the impact of your policies.
25+
26+
27+
This article explains how you can get access to the information about applied conditional access policies.
28+
29+
30+
## What you should know
31+
32+
As an Azure AD administrator, you can use the sign-in logs to:
33+
34+
- Troubleshoot sign in problems
35+
- Check on feature performance
36+
- Evaluate security of a tenant
37+
38+
Some scenarios require you to get an understanding for how your conditional access policies were applied to a sign-in event. Common examples include:
39+
40+
- **Helpdesk administrators** who need to look at applied conditional access policies to understand if a policy is the root cause of a ticket opened by a user.
41+
42+
- **Tenant administrators** who need to verify that conditional access policies have the intended impact on the users of a tenant.
43+
44+
45+
You can access the sign-in logs using the Azure portal, MS Graph, and PowerShell.
46+
47+
48+
49+
## Required administrator roles
50+
51+
52+
To see applied conditional access policies in the sign-in logs, administrators must have permissions to:
53+
54+
- View sign-in logs
55+
- View conditional access policies
56+
57+
The least privileged built-in role that grants both permissions is the **Security Reader**. As a best practice, your global administrator should add the **Security Reader** role to the related administrator accounts.
58+
59+
60+
The following built in roles grant permissions to read conditional access policies:
61+
62+
- Global Administrator
63+
64+
- Global Reader
65+
66+
- Security Administrator
67+
68+
- Security Reader
69+
70+
- Conditional Access Administrator
71+
72+
73+
The following built in roles grant permission to view sign-in logs:
74+
75+
- Global Administrator
76+
77+
- Security Administrator
78+
79+
- Security Reader
80+
81+
- Global Reader
82+
83+
- Reports Reader
84+
85+
86+
## Permissions for client apps
87+
88+
If you use a client app to pull sign-in logs from Graph, your app needs permissions to receive the **appliedConditionalAccessPolicy** resource from Graph. As a best practice, assign **Policy.Read.ConditionalAccess** because it's the least privileged permission. Any of the following permissions is sufficient for a client app to access applied CA policies in sign-in logs through Graph:
89+
90+
- Policy.Read.ConditionalAccess
91+
92+
- Policy.ReadWrite.ConditionalAccess
93+
94+
- Policy.Read.All
95+
96+
97+
98+
## Permissions for PowerShell
99+
100+
Like any other client app, the Microsoft Graph PowerShell module needs client permissions to access applied conditional access policies in the sign-in logs. To successfully pull applied conditional access in the sign-in logs, you must consent to the necessary permissions with your administrator account for MS Graph PowerShell. As a best practice, consent to:
101+
102+
- Policy.Read.ConditionalAccess
103+
- AuditLog.Read.All
104+
- Directory.Read.All
105+
106+
These permissions are the least privileged permissions with the necessary access.
107+
108+
To consent to the necessary permissions, use:
109+
110+
` Connect-MgGraph -Scopes Policy.Read.ConditionalAccess, AuditLog.Read.All, Directory.Read.All `
111+
112+
To view the sign-in logs, use:
113+
114+
`Get-MgAuditLogSignIn `
115+
116+
The output of this cmdlet contains a **AppliedConditionalAccessPolicies** property that shows all the conditional access policies applied to the sign-in.
117+
118+
For more information about this cmdlet, see [Get-MgAuditLogSignIn](https://docs.microsoft.com/powershell/module/microsoft.graph.reports/get-mgauditlogsignin?view=graph-powershell-1.0).
119+
120+
The AzureAD Graph PowerShell module doesn't support viewing applied conditional access policies; only the Microsoft Graph PowerShell module returns applied conditional access policies.
121+
122+
## Confirming access
123+
124+
In the **Conditional Access** tab, you see a list of conditional access policies applied to that sign-in event.
125+
126+
127+
To confirm that you have admin access to view applied conditional access policies in the sign-ins logs, do:
128+
129+
1. Navigate to the Azure portal.
130+
131+
2. In the top-right corner, select your directory, and then select **Azure Active Directory** in the left navigation pane.
132+
133+
3. In the **Monitoring** section, select **Sign-in logs**.
134+
135+
4. Click an item in the sign-in row table to bring up the Activity Details: Sign-ins context pane.
136+
137+
5. Click on the Conditional Access tab in the context pane. If your screen is small, you may need to click the ellipsis [] to see all context pane tabs.
138+
139+
140+
141+
142+
## Next steps
143+
144+
* [Sign-ins error codes reference](./concept-sign-ins.md)
145+
* [Sign-ins report overview](concept-sign-ins.md)

articles/active-directory/reports-monitoring/toc.yml

Lines changed: 9 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -63,18 +63,20 @@
6363
items:
6464
- name: Access activity logs
6565
href: howto-access-activity-logs.md
66+
- name: Configure prerequisites for Reporting API
67+
href: howto-configure-prerequisites-for-reporting-api.md
6668
- name: Download logs
6769
href: howto-download-logs.md
68-
- name: Manage inactive user accounts in Azure AD
69-
href: howto-manage-inactive-user-accounts.md
7070
- name: Find activity reports
7171
href: howto-find-activity-reports.md
72+
- name: Manage inactive user accounts in Azure AD
73+
href: howto-manage-inactive-user-accounts.md
7274
- name: Troubleshoot sign-in errors for a user
7375
href: howto-troubleshoot-sign-in-errors.md
74-
- name: Configure prerequisites for Reporting API
75-
href: howto-configure-prerequisites-for-reporting-api.md
76-
- name: How to use Azure AD workbooks
76+
- name: Use Azure AD workbooks
7777
href: howto-use-azure-monitor-workbooks.md
78+
- name: View applied conditional access policies
79+
href: how-to-view-applied-conditional-access-policies.md
7880

7981
- name: Monitoring
8082
items:
@@ -125,6 +127,7 @@
125127
href: reports-faq.yml
126128
- name: Sign-in log schema
127129
href: reference-azure-monitor-sign-ins-log-schema.md
130+
128131
- name: Workbooks
129132
items:
130133
- name: Authentication prompts analysis
@@ -139,6 +142,7 @@
139142
href: workbook-risk-analysis.md
140143
- name: Sensitive Operations Report
141144
href: workbook-sensitive-operations-report.md
145+
142146
- name: Recommendations
143147
items:
144148
- name: Convert to conditional access MFA

0 commit comments

Comments
 (0)