Skip to content

Commit 63d3892

Browse files
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into pauljewell-java-resources
2 parents 6c3521c + 760c845 commit 63d3892

File tree

48 files changed

+790
-282
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

48 files changed

+790
-282
lines changed

articles/active-directory/cloud-infrastructure-entitlement-management/how-to-add-remove-user-to-group.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ This article describes how you can add or remove a new user for a group in Permi
2121
2222
## Add a user
2323

24-
1. Navigate to the [Microsoft Entra admin center](https://entra.microsoft.com/#home).
24+
1. Navigate to the [Microsoft Entra admin center](https://entra.microsoft.com/#home).
2525
1. From the Azure Active Directory tile, select **Go to Azure Active Directory**.
2626
1. From the navigation pane, select the **Groups** drop-down menu, then **All groups**.
2727
1. Select the group name for the group you want to add the user to.

articles/active-directory/cloud-infrastructure-entitlement-management/onboard-azure.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ ms.author: jfields
1717
This article describes how to onboard a Microsoft Azure subscription or subscriptions on Permissions Management. Onboarding a subscription creates a new authorization system to represent the Azure subscription in Permissions Management.
1818

1919
> [!NOTE]
20-
> A *global administrator* or *super admin* (an admin for all authorization system types) can perform the tasks in this article after the global administrator has initially completed the steps provided in [Enable Permissions Management on your Azure Active Directory tenant](onboard-enable-tenant.md).
20+
> A *global administrator* or *root user* (an admin for all authorization system types) can perform the tasks in this article after the global administrator has initially completed the steps provided in [Enable Permissions Management on your Azure Active Directory tenant](onboard-enable-tenant.md).
2121
2222
## Explanation
2323

Lines changed: 49 additions & 45 deletions
Original file line numberDiff line numberDiff line change
@@ -1,94 +1,98 @@
11
---
2-
title: Determine your security posture for external collaboration with Azure Active Directory
3-
description: Before you can execute an external access security plan, you must determine what you are trying to achieve.
2+
title: Determine your security posture for external access with Azure Active Directory
3+
description: Learn about governance of external access and assessing collaboration needs, by scenario
44
services: active-directory
5-
author: janicericketts
5+
author: jricketts
66
manager: martinco
77
ms.service: active-directory
88
ms.workload: identity
99
ms.subservice: fundamentals
1010
ms.topic: conceptual
11-
ms.date: 08/19/2022
11+
ms.date: 02/03/2023
1212
ms.author: jricketts
1313
ms.reviewer: ajburnle
1414
ms.custom: "it-pro, seodec18"
1515
ms.collection: M365-identity-device-management
1616
---
1717

18-
# Determine your security posture for external access
18+
# Determine your security posture for external access with Azure Active Directory
1919

20-
As you consider governing external access, you’ll need to assess the security and collaboration needs for your organization overall, and within each scenario. At the organizational level, consider the amount of control you need your IT team to have over day-to-day collaboration. Organizations in regulated industries may require more IT control. For example, a defense contractor may be required to positively identify and document each external user, their access, and the removal of access. This requirement may be on all access, or on specific scenarios or workloads. On the other end of the spectrum, a consulting firm may generally allow end users to determine the external users they need to collaborate with, within certain IT guard rails.
20+
As you consider the governance of external access, assess your organization's security and collaboration needs, by scenario. You can start with the level of control the IT team has over the day-to-day collaboration of end users. Organizations in highly regulated industries might require more IT team control. For example, defense contractors can have a requirement to positively identify and document external users, their access, and access removal: all access, scenario-based, or workloads. Consulting agencies can use certain features to allow end users to determine the external users they collaborate with.
2121

22-
![IT versus end-user control of collaboration](media/secure-external-access/1-overall-control.png)
22+
![Bar graph of the span from full IT team control, to end-user self service.](media/secure-external-access/1-overall-control.png)
2323

24-
> [!NOTE]
25-
> Overly tight control on collaboration can lead to higher IT budgets, reduced productivity, and delayed business outcomes. When official collaboration channels are perceived as too onerous, end users tend to go around IT provided systems to get their jobs done, by for example emailing unsecured documents.
26-
27-
## Think in terms of scenarios
24+
> [!NOTE]
25+
> A high degree of control over collaboration can lead to higher IT budgets, reduced productivity, and delayed business outcomes. When official collaboration channels are perceived as onerous, end users tend to evade official channels. An example is end users sending unsecured documents by email.
2826
29-
In many cases IT can delegate partner access, at least in some scenarios, while providing guard rails for security. The IT guard rails can be help ensure that intellectual property stays secure, while empowering employees to collaborate with partners to get work done.
27+
## Scenario-based planning
3028

31-
As you consider the scenarios within your organization, assess the need for employee versus business partner access to resources. A bank may have compliance needs that restrict access to certain resources, like user account information, to a small group of internal employees. Conversely, the same bank may enable delegated access for partners working on a marketing campaign.
29+
IT teams can delegate partner access to empower employees to collaborate with partners. This delegation can occur while maintaining sufficient security to protect intellectual property.
3230

33-
![continuum of governance per scenario](media\secure-external-access\1-scenarios.png)
31+
Compile and assess your organizations scenarios to help assess employee versus business partner access to resources. Financial institutions might have compliance standards that restrict employee access to resources such as account information. Conversely, the same institutions can enable delegated partner access for projects such as marketing campaigns.
3432

35-
In each scenario, consider
33+
![Diagram of a balance of IT team goverened access to partner self-service.](media/secure-external-access/1-scenarios.png)
3634

37-
* the sensitivity of the information at risk
35+
### Scenario considerations
3836

39-
* whether you need to restrict what partners can see about other users
37+
Use the following list to help measure the level of access control.
4038

41-
* the cost of a breach vs the weight of centralized control and end-user friction
39+
* Information sensitivity, and associated risk of its exposure
40+
* Partner access to information about other end users
41+
* The cost of a breach versus the overhead of centralized control and end-user friction
4242

43-
You may also start with centrally managed controls to meet compliance targets and delegate control to end users over time. All access management models may simultaneously coexist within an organization.
43+
Organizations can start with highly managed controls to meet compliance targets, and then delegate some control to end users, over time. There can be simultaneous access-management models in an organization.
4444

45-
The use of [partner managed credentials](../external-identities/what-is-b2b.md) provides your organization with an essential signal that terminates access to your resources once the external user has lost access to the resources of their own company.
45+
> [!NOTE]
46+
> Partner-managed credentials are a method to signal the termination of access to resources, when an external user loses access to resources in their own company. Learn more: [B2B collaboration overview](../external-identities/what-is-b2b.md)
4647
47-
## Goals of securing external access
48+
## External-access security goals
4849

49-
The goals of IT-governed and delegated access differ.
50+
The goals of IT-governed and delegated access differ. The primary goals of IT-governed access are:
5051

51-
**The primary goals of IT-governed access are to:**
52+
* Meet governance, regulatory, and compliance (GRC) targets
53+
* High level of control over partner access to information about end users, groups, and other partners
5254

53-
* Meet governance, regulatory, and compliance (GRC) targets.
55+
The primary goals of delegating access are:
5456

55-
* Tightly control partner access and what partners can see about member users, groups, and other partners.
57+
* Enable business owners to determine collaboration partners, with security constraints
58+
* Enable partners to request access, based on rules defined by business owners
5659

57-
**The primary goals of delegating access are to:**
60+
### Common goals
5861

59-
* Enable business owners to govern who they collaborate with, within IT constraints.
62+
#### Control access to applications, data, and content
6063

61-
* Enable business partners to request access based on rules defined by business owners.
64+
Levels of control can be accomplished through various methods, depending on your version of Azure AD and Microsoft 365.
6265

63-
Whichever you enact for your organization and scenarios you'll need to:
66+
* [Azure AD plans and pricing](https://www.microsoft.com/security/business/identity-access-management/azure-ad-pricing)
67+
* [Microsoft 365](https://www.microsoft.com/microsoft-365/compare-microsoft-365-enterprise-plans).
6468

65-
* **Control access to applications, data, and content**. This can be accomplished through a variety of methods, depending on your versions of [Azure AD](https://www.microsoft.com/security/business/identity-access-management/azure-ad-pricing) and [Microsoft 365](https://www.microsoft.com/microsoft-365/compare-microsoft-365-enterprise-plans).
69+
#### Reduce attack surface
6670

67-
* **Reduce the attack surface**. [Privileged identity management](../privileged-identity-management/pim-configure.md), [data loss prevention (DLP),](/exchange/security-and-compliance/data-loss-prevention/data-loss-prevention) and [encryption capabilities](/exchange/security-and-compliance/data-loss-prevention/data-loss-prevention) reduce the attack surface.
71+
* [What is Azure AD Privileged Identity Management?](../privileged-identity-management/pim-configure.md) - manage, control, and monitor access to resources in Azure AD, Azure, and other Microsoft Online Services such as Microsoft 365 or Microsoft Intune
72+
* [Data loss prevention in Exchange Server](/exchange/policy-and-compliance/data-loss-prevention/data-loss-prevention?view=exchserver-2019&preserve-view=true)
6873

69-
* **Regularly review activity and audit log to confirm compliance**. IT can delegate access decisions to business owners through entitlement management while access reviews provide a way to periodically confirm continued access. Automated data classification with sensitivity labels helps to automate encryption of sensitive content making it easy for employee end users to comply.
74+
#### Confirm compliance with activity and audit log reviews
7075

71-
## Next steps
76+
IT teams can delegate access decisions to business owners through entitlement management, while access reviews help confirm continued access. You can use automated data classification with sensitivity labels to automate the encryption of sensitive content, easing compliance for end users.
7277

73-
See the following articles on securing external access to resources. We recommend you take the actions in the listed order.
78+
## Next steps
7479

75-
1. [Determine your security posture for external access](1-secure-access-posture.md) (You are here.)
80+
See the following articles to learn more about securing external access to resources. We recommend you follow the listed order.
7681

77-
2. [Discover your current state](2-secure-access-current-state.md)
82+
1. [Determine your security posture for external access with Azure AD](1-secure-access-posture.md) (You're here)
7883

79-
3. [Create a governance plan](3-secure-access-plan.md)
84+
2. [Discover the current state of external collaboration in your organization](2-secure-access-current-state.md)
8085

81-
4. [Use groups for security](4-secure-access-groups.md)
86+
3. [Create a security plan for external access](3-secure-access-plan.md)
8287

83-
5. [Transition to Azure AD B2B](5-secure-access-b2b.md)
88+
4. [Secure external access with groups in Azure AD and Microsoft 365](4-secure-access-groups.md)
8489

85-
6. [Secure access with Entitlement Management](6-secure-access-entitlement-managment.md)
90+
5. [Transition to governed collaboration with Azure AD B2B collaboration](5-secure-access-b2b.md)
8691

87-
7. [Secure access with Conditional Access policies](7-secure-access-conditional-access.md)
92+
6. [Manage external access with Azure AD entitlement management](6-secure-access-entitlement-managment.md)
8893

89-
8. [Secure access with Sensitivity labels](8-secure-access-sensitivity-labels.md)
94+
7. [Manage external access with Conditional Access policies](7-secure-access-conditional-access.md)
9095

91-
9. [Secure access to Microsoft Teams, OneDrive, and SharePoint](9-secure-access-teams-sharepoint.md)
92-
96+
8. [Control external access to resources in Azure AD with sensitivity labels](8-secure-access-sensitivity-labels.md)
9397

94-
98+
9. [Secure external access to Microsoft Teams, SharePoint, and OneDrive with Azure AD](9-secure-access-teams-sharepoint.md)

articles/active-directory/fundamentals/whats-deprecated-azure-ad.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: What's deprecated in Azure Active Directory?
33
description: Learn about features being deprecated in Azure Active Directory
4-
author: jricketts
4+
author: janicericketts
55
manager: martinco
66
ms.service: active-directory
77
ms.subservice: fundamentals

articles/active-directory/reports-monitoring/how-to-view-applied-conditional-access-policies.md

Lines changed: 19 additions & 41 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.topic: how-to
1010
ms.workload: identity
1111
ms.subservice: report-monitor
12-
ms.date: 10/31/2022
12+
ms.date: 02/03/2023
1313
ms.author: sarahlipsey
1414
ms.reviewer: besiler
1515

@@ -32,41 +32,30 @@ As an Azure AD administrator, you can use the sign-in logs to:
3232

3333
Some scenarios require you to get an understanding of how your Conditional Access policies were applied to a sign-in event. Common examples include:
3434

35-
- *Helpdesk administrators* who need to look at applied Conditional Access policies to understand if a policy is the root cause of a ticket that a user opened.
35+
- Helpdesk administrators who need to look at applied Conditional Access policies to understand if a policy is the root cause of a ticket that a user opened.
3636

37-
- *Tenant administrators* who need to verify that Conditional Access policies have the intended effect on the users of a tenant.
37+
- Tenant administrators who need to verify that Conditional Access policies have the intended effect on the users of a tenant.
3838

3939
You can access the sign-in logs by using the Azure portal, Microsoft Graph, and PowerShell.
4040

4141
## Required administrator roles
4242

43-
To see applied Conditional Access policies in the sign-in logs, administrators must have permissions to view both the logs and the policies.
43+
To see applied Conditional Access policies in the sign-in logs, administrators must have permissions to view *both* the logs and the policies. The least privileged built-in role that grants *both* permissions is *Security Reader*. As a best practice, your Global Administrator should add the Security Reader role to the related administrator accounts.
4444

45-
The least privileged built-in role that grants both permissions is *Security Reader*. As a best practice, your global administrator should add the Security Reader role to the related administrator accounts.
46-
47-
The following built-in roles grant permissions to read Conditional Access policies:
45+
The following built-in roles grant permissions to *read Conditional Access policies*:
4846

4947
- Global Administrator
50-
5148
- Global Reader
52-
5349
- Security Administrator
54-
5550
- Security Reader
56-
5751
- Conditional Access Administrator
5852

59-
60-
The following built-in roles grant permission to view sign-in logs:
53+
The following built-in roles grant permission to *view sign-in logs*:
6154

6255
- Global Administrator
63-
6456
- Security Administrator
65-
6657
- Security Reader
67-
6858
- Global Reader
69-
7059
- Reports Reader
7160

7261
## Permissions for client apps
@@ -76,9 +65,7 @@ If you use a client app to pull sign-in logs from Microsoft Graph, your app need
7665
Any of the following permissions is sufficient for a client app to access applied certificate authority (CA) policies in sign-in logs through Microsoft Graph:
7766

7867
- `Policy.Read.ConditionalAccess`
79-
8068
- `Policy.ReadWrite.ConditionalAccess`
81-
8269
- `Policy.Read.All`
8370

8471
## Permissions for PowerShell
@@ -89,37 +76,28 @@ Like any other client app, the Microsoft Graph PowerShell module needs client pe
8976
- `AuditLog.Read.All`
9077
- `Directory.Read.All`
9178

92-
These permissions are the least privileged permissions with the necessary access.
93-
94-
To consent to the necessary permissions, use:
95-
96-
`Connect-MgGraph -Scopes Policy.Read.ConditionalAccess, AuditLog.Read.All, Directory.Read.All`
97-
98-
To view the sign-in logs, use:
79+
The following permissions are the least privileged permissions with the necessary access:
9980

100-
`Get-MgAuditLogSignIn`
81+
- To consent to the necessary permissions: `Connect-MgGraph -Scopes Policy.Read.ConditionalAccess, AuditLog.Read.All, Directory.Read.All`
82+
- To view the sign-in logs: `Get-MgAuditLogSignIn`
10183

10284
For more information about this cmdlet, see [Get-MgAuditLogSignIn](/powershell/module/microsoft.graph.reports/get-mgauditlogsignin).
10385

10486
The Azure AD Graph PowerShell module doesn't support viewing applied Conditional Access policies. Only the Microsoft Graph PowerShell module returns applied Conditional Access policies.
10587

106-
## Confirming access
107-
108-
On the **Conditional Access** tab, you see a list of Conditional Access policies applied to that sign-in event.
109-
110-
To confirm that you have admin access to view applied Conditional Access policies in the sign-in logs:
111-
112-
1. Go to the Azure portal.
113-
114-
2. In the upper-right corner, select your directory, and then select **Azure Active Directory** on the left pane.
88+
## View Conditional Access policies in Azure AD sign-in logs
11589

116-
3. In the **Monitoring** section, select **Sign-in logs**.
90+
The activity details of sign-in logs contain several tabs. The **Conditional Access** tab lists the Conditional Access policies applied to that sign-in event.
11791

118-
4. Select an item in the sign-in table to open the **Activity Details: Sign-ins context** pane.
92+
1. Sign in to the [Azure portal](https://portal.azure.com) using the Security Reader role.
93+
1. In the **Monitoring** section, select **Sign-in logs**.
94+
1. Select a sign-in item from the table to open the **Activity Details: Sign-ins context** pane.
95+
1. Select the **Conditional Access** tab.
11996

120-
5. Select the **Conditional Access** tab on the context pane. If your screen is small, you might need to select the ellipsis (**...**) to see all tabs on the context pane.
97+
If you don't see the Conditional Access policies, confirm you're using a role that provides access to both the sign-in logs and the Conditional Access policies.
12198

12299
## Next steps
123100

124-
* [Sign-in error code reference](./concept-sign-ins.md)
125-
* [Sign-in report overview](concept-sign-ins.md)
101+
* [Troubleshoot sign-in problems](../conditional-access/troubleshoot-conditional-access.md#azure-ad-sign-in-events)
102+
* [Review the Conditional Access sign-in logs FAQs](reports-faq.yml#conditional-access)
103+
* [Learn about the sign-in logs](concept-sign-ins.md)

articles/active-directory/reports-monitoring/overview-reports.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.topic: overview
1010
ms.workload: identity
1111
ms.subservice: report-monitor
12-
ms.date: 11/01/2022
12+
ms.date: 02/03/2023
1313
ms.author: sarahlipsey
1414
ms.reviewer: sarbar
1515

@@ -70,6 +70,6 @@ In addition to the user interface, Azure AD also provides you with [programmatic
7070

7171
## Next steps
7272

73-
- [Risky sign-ins report](../identity-protection/overview-identity-protection.md)
73+
- [Risky sign-ins report](../identity-protection/howto-identity-protection-investigate-risk.md#risky-sign-ins)
7474
- [Audit logs report](concept-audit-logs.md)
7575
- [Sign-ins logs report](concept-sign-ins.md)

0 commit comments

Comments
 (0)