Skip to content

Commit 6688620

Browse files
authored
Merge pull request #208854 from MicrosoftDocs/main
8/23 AM Publish
2 parents afe5be3 + 0c8cc61 commit 6688620

File tree

170 files changed

+1858
-720
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

170 files changed

+1858
-720
lines changed

articles/active-directory/authentication/howto-authentication-passwordless-security-key-on-premises.md

Lines changed: 6 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: how-to
9-
ms.date: 02/22/2022
9+
ms.date: 08/22/2022
1010

1111
ms.author: justinha
1212
author: justinha
@@ -101,13 +101,11 @@ Run the following steps in each domain and forest in your organization that cont
101101
1. Run the following PowerShell commands to create a new Azure AD Kerberos Server object both in your on-premises Active Directory domain and in your Azure Active Directory tenant.
102102

103103
### Example 1 prompt for all credentials
104-
> [!NOTE]
105-
> Replace `contoso.corp.com` in the following example with your on-premises Active Directory domain name.
106104

107105
```powershell
108106
# Specify the on-premises Active Directory domain. A new Azure AD
109107
# Kerberos Server object will be created in this Active Directory domain.
110-
$domain = "contoso.corp.com"
108+
$domain = $env:USERDNSDOMAIN
111109
112110
# Enter an Azure Active Directory global administrator username and password.
113111
$cloudCred = Get-Credential -Message 'An Active Directory user who is a member of the Global Administrators group for Azure AD.'
@@ -127,7 +125,7 @@ Run the following steps in each domain and forest in your organization that cont
127125
```powershell
128126
# Specify the on-premises Active Directory domain. A new Azure AD
129127
# Kerberos Server object will be created in this Active Directory domain.
130-
$domain = "contoso.corp.com"
128+
$domain = $env:USERDNSDOMAIN
131129
132130
# Enter an Azure Active Directory global administrator username and password.
133131
$cloudCred = Get-Credential
@@ -147,7 +145,7 @@ Run the following steps in each domain and forest in your organization that cont
147145
```powershell
148146
# Specify the on-premises Active Directory domain. A new Azure AD
149147
# Kerberos Server object will be created in this Active Directory domain.
150-
$domain = "contoso.corp.com"
148+
$domain = $env:USERDNSDOMAIN
151149
152150
# Enter a UPN of an Azure Active Directory global administrator
153151
$userPrincipalName = "[email protected]"
@@ -164,13 +162,12 @@ Run the following steps in each domain and forest in your organization that cont
164162
### Example 4 prompt for cloud credentials using modern authentication
165163
> [!NOTE]
166164
> If you are working on a domain-joined machine with an account that has domain administrator privileges and your organization protects password-based sign-in and enforces modern authentication methods such as multifactor authentication, FIDO2, or smart card technology, you must use the `-UserPrincipalName` parameter with the User Principal Name (UPN) of a global administrator. And you can skip the "-DomainCredential" parameter.
167-
> - Replace `contoso.corp.com` in the following example with your on-premises Active Directory domain name.
168-
> - Replace `[email protected]` in the following example with the UPN of a global administrator.
165+
> - Replace `[email protected]` in the following example with the UPN of a global administrator.
169166
170167
```powershell
171168
# Specify the on-premises Active Directory domain. A new Azure AD
172169
# Kerberos Server object will be created in this Active Directory domain.
173-
$domain = "contoso.corp.com"
170+
$domain = $env:USERDNSDOMAIN
174171
175172
# Enter a UPN of an Azure Active Directory global administrator
176173
$userPrincipalName = "[email protected]"

articles/active-directory/identity-protection/concept-identity-protection-b2b.md

Lines changed: 16 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: identity-protection
88
ms.topic: conceptual
9-
ms.date: 05/03/2021
9+
ms.date: 08/22/2022
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -17,61 +17,61 @@ ms.collection: M365-identity-device-management
1717
---
1818
# Identity Protection and B2B users
1919

20-
Identity Protection detects compromised credentials for Azure AD users. If your credential is detected as compromised, it means that someone else may have your password and be using it illegitimately. To prevent further risk to your account, it is important to securely reset your password so that the bad actor can no longer use your compromised password. Identity Protection marks accounts that may be compromised as "at risk."
20+
Identity Protection detects compromised credentials for Azure AD users. If your credential is detected as compromised, it means that someone else may have your password and be using it illegitimately. To prevent further risk to your account, it's important to securely reset your password so that the bad actor can no longer use your compromised password. Identity Protection marks accounts that may be compromised as "at risk."
2121

22-
You can use your organizational credentials to sign-in to another organization as a guest. This process is referred to [business-to-business or B2B collaboration](../external-identities/what-is-b2b.md). Organizations can configure policies to block users from signing-in if their credentials are considered [at risk](concept-identity-protection-risks.md). If your account is at risk and you are blocked from signing-in to another organization as a guest, you may be able to self-remediate your account using the following steps. If your organization has not enabled self-service password reset, your administrator will need to manually remediate your account.
22+
You can use your organizational credentials to sign-in to another organization as a guest. This process is referred to [business-to-business or B2B collaboration](../external-identities/what-is-b2b.md). Organizations can configure policies to block users from signing-in if their credentials are considered [at risk](concept-identity-protection-risks.md). If your account is at risk and you're blocked from signing-in to another organization as a guest, you may be able to self-remediate your account using the following steps. If your organization hasn't enabled self-service password reset, your administrator will need to manually remediate your account.
2323

2424
## How to unblock your account
2525

26-
If you are attempting to sign-in to another organization as a guest and are blocked due to risk, you will see the following block message: "Your account is blocked. We've detected suspicious activity on your account."
26+
If you're attempting to sign-in to another organization as a guest and are blocked due to risk, you'll see the following block message: "Your account is blocked. We've detected suspicious activity on your account."
2727

2828
![Guest account blocked, contact your organization's administrator](./media/concept-identity-protection-b2b/risky-guest-user-blocked.png)
2929

3030
If your organization enables it, you can use self-service password reset unblock your account and get your credentials back to a safe state.
31-
1. Go to the [Password reset portal](https://passwordreset.microsoftonline.com/) and initiate the password reset. If self-service password reset is not enabled for your account and you cannot proceed, reach out to your IT administrator with the information [below](#how-to-remediate-a-users-risk-as-an-administrator).
32-
2. If self-service password reset is enabled for your account, you will be prompted to verify your identity using security methods prior to changing your password. For assistance, see the [Reset your work or school password](https://support.microsoft.com/account-billing/reset-your-work-or-school-password-using-security-info-23dde81f-08bb-4776-ba72-e6b72b9dda9e) article.
31+
1. Go to the [Password reset portal](https://passwordreset.microsoftonline.com/) and initiate the password reset. If self-service password reset isn't enabled for your account and you can't proceed, reach out to your IT administrator with the information [below](#how-to-remediate-a-users-risk-as-an-administrator).
32+
2. If self-service password reset is enabled for your account, you'll be prompted to verify your identity using security methods prior to changing your password. For assistance, see the [Reset your work or school password](https://support.microsoft.com/account-billing/reset-your-work-or-school-password-using-security-info-23dde81f-08bb-4776-ba72-e6b72b9dda9e) article.
3333
3. Once you have successfully and securely reset your password, your user risk will be remediated. You can now try again to sign-in as a guest user.
3434

35-
If after resetting your password you are still blocked as a guest due to risk, reach out to your organization's IT administrator.
35+
If after resetting your password you're still blocked as a guest due to risk, reach out to your organization's IT administrator.
3636

3737
## How to remediate a user's risk as an administrator
3838

39-
Identity Protection automatically detects risky users for Azure AD tenants. If you have not previously checked the Identity Protection reports, there may be a large number of users with risk. Since resource tenants can apply user risk policies to guest users, your users can be blocked due to risk even if they were previously unaware of their risky state. If your user reports they have been blocked as a guest user in another tenant due to risk, it is important to remediate the user to protect their account and enable collaboration.
39+
Identity Protection automatically detects risky users for Azure AD tenants. If you haven't previously checked the Identity Protection reports, there may be a large number of users with risk. Since resource tenants can apply user risk policies to guest users, your users can be blocked due to risk even if they were previously unaware of their risky state. If your user reports they've been blocked as a guest user in another tenant due to risk, it's important to remediate the user to protect their account and enable collaboration.
4040

4141
### Reset the user's password
4242

43-
From the [Risky users report](https://portal.azure.com/#blade/Microsoft_AAD_IAM/SecurityMenuBlade/RiskyUsers) in the Azure AD Security menu, search for the impacted user using the 'User' filter. Select the impacted user in the report and click "Reset password" in the top toolbar. The user will be assigned a temporary password that must be changed on the next sign in. This process will remediate their user risk and bring their credentials back to a safe state.
43+
From the [Risky users report](https://portal.azure.com/#blade/Microsoft_AAD_IAM/SecurityMenuBlade/RiskyUsers) in the Azure AD Security menu, search for the impacted user using the 'User' filter. Select the impacted user in the report and select "Reset password" in the top toolbar. The user will be assigned a temporary password that must be changed on the next sign-in. This process will remediate their user risk and bring their credentials back to a safe state.
4444

4545
### Manually dismiss user's risk
4646

47-
If password reset is not an option for you from the Azure AD portal, you can choose to manually dismiss user risk. Dismissing user risk does not have any impact on the user's existing password, but this process will change the user's Risk State from At Risk to Dismissed. It is important that you change the user's password using whatever means are available to you in order to bring the identity back to a safe state.
47+
If password reset isn't an option for you from the Azure AD portal, you can choose to manually dismiss user risk. Dismissing user risk doesn't have any impact on the user's existing password, but this process will change the user's Risk State from At Risk to Dismissed. It's important that you change the user's password using whatever means are available to you in order to bring the identity back to a safe state.
4848

49-
To dismiss user risk, go to the [Risky users report](https://portal.azure.com/#blade/Microsoft_AAD_IAM/SecurityMenuBlade/RiskyUsers) in the Azure AD Security menu. Search for the impacted user using the 'User' filter and click on the user. Click on "dismiss user risk" option from the top toolbar. This action may take a few minutes to complete and update the user risk state in the report.
49+
To dismiss user risk, go to the [Risky users report](https://portal.azure.com/#blade/Microsoft_AAD_IAM/SecurityMenuBlade/RiskyUsers) in the Azure AD Security menu. Search for the impacted user using the 'User' filter and select the user. Select the "dismiss user risk" option from the top toolbar. This action may take a few minutes to complete and update the user risk state in the report.
5050

5151
To learn more about Identity Protection, see [What is Identity Protection](overview-identity-protection.md).
5252

5353
## How does Identity Protection work for B2B users?
5454

5555
The user risk for B2B collaboration users is evaluated at their home directory. The real-time sign-in risk for these users is evaluated at the resource directory when they try to access the resource. With Azure AD B2B collaboration, organizations can enforce risk-based policies for B2B users using Identity Protection. These policies be configured in two ways:
5656

57-
- Administrators can configure the built-in Identity Protection risk-based policies, that apply to all apps, that include guest users.
58-
- Administrators can configure their Conditional Access policies, using sign-in risk as a condition, that includes guest users.
57+
- Administrators can configure the built-in Identity Protection risk-based policies, that apply to all apps, and include guest users.
58+
- Administrators can configure their Conditional Access policies, using sign-in risk as a condition, and includes guest users.
5959

6060
## Limitations of Identity Protection for B2B collaboration users
6161

62-
There are limitations in the implementation of Identity Protection for B2B collaboration users in a resource directory due to their identity existing in their home directory. The main limitations are as follows:
62+
There are limitations in the implementation of Identity Protection for B2B collaboration users in a resource directory, due to their identity existing in their home directory. The main limitations are as follows:
6363

6464
- If a guest user triggers the Identity Protection user risk policy to force password reset, **they will be blocked**. This block is due to the inability to reset passwords in the resource directory.
6565
- **Guest users do not appear in the risky users report**. This limitation is due to the risk evaluation occurring in the B2B user's home directory.
6666
- Administrators **cannot dismiss or remediate a risky B2B collaboration user** in their resource directory. This limitation is due to administrators in the resource directory not having access to the B2B user's home directory.
6767

6868
### Why can't I remediate risky B2B collaboration users in my directory?
6969

70-
The risk evaluation and remediation for B2B users occurs in their home directory. Due to this fact, the guest users do not appear in the risky users report in the resource directory and admins in the resource directory cannot force a secure password reset for these users.
70+
The risk evaluation and remediation for B2B users occurs in their home directory. Due to this fact, the guest users don't appear in the risky users report in the resource directory and admins in the resource directory can't force a secure password reset for these users.
7171

7272
### What do I do if a B2B collaboration user was blocked due to a risk-based policy in my organization?
7373

74-
If a risky B2B user in your directory is blocked by your risk-based policy, the user will need to remediate that risk in their home directory. Users can remediate their risk by performing a secure password reset in their home directory [as outlined above](#how-to-unblock-your-account). If they do not have self-service password reset enabled in their home directory, they will need to contact their own organization's IT Staff to have an administrator manually dismiss their risk or reset their password.
74+
If a risky B2B user in your directory is blocked by your risk-based policy, the user will need to remediate that risk in their home directory. Users can remediate their risk by performing a secure password reset in their home directory [as outlined above](#how-to-unblock-your-account). If they don't have self-service password reset enabled in their home directory, they'll need to contact their own organization's IT Staff to have an administrator manually dismiss their risk or reset their password.
7575

7676
### How do I prevent B2B collaboration users from being impacted by risk-based policies?
7777

articles/active-directory/identity-protection/concept-identity-protection-policies.md

Lines changed: 12 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: identity-protection
88
ms.topic: conceptual
9-
ms.date: 05/20/2020
9+
ms.date: 08/22/2022
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -23,18 +23,22 @@ Azure Active Directory Identity Protection includes three default policies that
2323

2424
## Azure AD MFA registration policy
2525

26-
Identity Protection can help organizations roll out Azure AD Multi-Factor Authentication (MFA) using a Conditional Access policy requiring registration at sign-in. Enabling this policy is a great way to ensure new users in your organization have registered for MFA on their first day. Multi-factor authentication is one of the self-remediation methods for risk events within Identity Protection. Self-remediation allows your users to take action on their own to reduce helpdesk call volume.
26+
Identity Protection can help organizations roll out Azure AD Multifactor Authentication (MFA) using a Conditional Access policy requiring registration at sign-in. Enabling this policy is a great way to ensure new users in your organization have registered for MFA on their first day. Multifactor authentication is one of the self-remediation methods for risk events within Identity Protection. Self-remediation allows your users to take action on their own to reduce helpdesk call volume.
2727

28-
More information about Azure AD Multi-Factor Authentication can be found in the article, [How it works: Azure AD Multi-Factor Authentication](../authentication/concept-mfa-howitworks.md).
28+
More information about Azure AD Multifactor Authentication can be found in the article, [How it works: Azure AD Multifactor Authentication](../authentication/concept-mfa-howitworks.md).
2929

3030
## Sign-in risk policy
3131

32-
Identity Protection analyzes signals from each sign-in, both real-time and offline, and calculates a risk score based on the probability that the sign-in wasn't performed by the user. Administrators can make a decision based on this risk score signal to enforce organizational requirements. Administrators can choose to block access, allow access, or allow access but require multi-factor authentication.
32+
Identity Protection analyzes signals from each sign-in, both real-time and offline, and calculates a risk score based on the probability that the sign-in wasn't really the user. Administrators can make a decision based on this risk score signal to enforce organizational requirements like:
3333

34-
If risk is detected, users can perform multi-factor authentication to self-remediate and close the risky sign-in event to prevent unnecessary noise for administrators.
34+
- Block access
35+
- Allow access
36+
- Require multifactor authentication
37+
38+
If risk is detected, users can perform multifactor authentication to self-remediate and close the risky sign-in event to prevent unnecessary noise for administrators.
3539

3640
> [!NOTE]
37-
> Users must have previously registered for Azure AD Multi-Factor Authentication before triggering the sign-in risk policy.
41+
> Users must have previously registered for Azure AD Multifactor Authentication before triggering the sign-in risk policy.
3842
3943
### Custom Conditional Access policy
4044

@@ -54,9 +58,6 @@ If risk is detected, users can perform self-service password reset to self-remed
5458
## Next steps
5559

5660
- [Enable Azure AD self-service password reset](../authentication/howto-sspr-deployment.md)
57-
58-
- [Enable Azure AD Multi-Factor Authentication](../authentication/howto-mfa-getstarted.md)
59-
60-
- [Enable Azure AD Multi-Factor Authentication registration policy](howto-identity-protection-configure-mfa-policy.md)
61-
61+
- [Enable Azure AD Multifactor Authentication](../authentication/howto-mfa-getstarted.md)
62+
- [Enable Azure AD Multifactor Authentication registration policy](howto-identity-protection-configure-mfa-policy.md)
6263
- [Enable sign-in and user risk policies](howto-identity-protection-configure-risk-policies.md)

0 commit comments

Comments
 (0)