You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/authentication/concept-authentication-authenticator-app.md
+17-1Lines changed: 17 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ services: active-directory
6
6
ms.service: active-directory
7
7
ms.subservice: authentication
8
8
ms.topic: conceptual
9
-
ms.date: 06/23/2022
9
+
ms.date: 11/16/2022
10
10
11
11
ms.author: justinha
12
12
author: justinha
@@ -57,8 +57,24 @@ Users may have a combination of up to five OATH hardware tokens or authenticator
57
57
>
58
58
> When two methods are required, users can reset using either a notification or verification code in addition to any other enabled methods.
59
59
60
+
61
+
## FIPS 140 compliant for Azure AD authentication
62
+
63
+
Beginning with version 6.6.8, Microsoft Authenticator for iOS is compliant with [Federal Information Processing Standard (FIPS) 140](https://csrc.nist.gov/publications/detail/fips/140/3/final?azure-portal=true) for all Azure AD authentications using push multi-factor authentications (MFA), passwordless Phone Sign-In (PSI), and time-based one-time passcodes (TOTP).
64
+
65
+
Consistent with the guidelines outlined in [NIST SP 800-63B](https://pages.nist.gov/800-63-3/sp800-63b.html?azure-portal=true), authenticators are required to use FIPS 140 validated cryptography. This helps federal agencies meet the requirements of [Executive Order (EO) 14028](https://www.whitehouse.gov/briefing-room/presidential-actions/2021/05/12/executive-order-on-improving-the-nations-cybersecurity/?azure-portal=true) and healthcare organizations working with [Electronic Prescriptions for Controlled Substances (EPCS)](/azure/compliance/offerings/offering-epcs-us).
66
+
67
+
FIPS 140 is a US government standard that defines minimum security requirements for cryptographic modules in information technology products and systems. Testing against the FIPS 140 standard is maintained by the [Cryptographic Module Validation Program (CMVP)](https://csrc.nist.gov/Projects/cryptographic-module-validation-program?azure-portal=true).
68
+
69
+
No changes in configurations are required in Microsoft Authenticator or the Azure portal to enable FIPS 140 compliance. Beginning with Microsoft Authenticator for iOS version 6.6.8, Azure AD authentications will be FIPS 140 compliant by default.
70
+
71
+
Authenticator leverages the native Apple cryptography to achieve FIPS 140, Security Level 1 compliance on Apple iOS devices beginning with Microsoft Authenticator version 6.6.8. For more information about the certifications being used, see the [Apple CoreCrypto module](https://support.apple.com/guide/sccc/security-certifications-for-ios-scccfa917cb49/web?azure-portal=true).
72
+
73
+
FIPS 140 compliance for Microsoft Authenticator on Android is in progress and will follow soon.
74
+
60
75
## Next steps
61
76
62
77
- To get started with passwordless sign-in, see [Enable passwordless sign-in with the Microsoft Authenticator](howto-authentication-passwordless-phone.md).
63
78
64
79
- Learn more about configuring authentication methods using the [Microsoft Graph REST API](/graph/api/resources/authenticationmethods-overview).
Copy file name to clipboardExpand all lines: articles/active-directory/hybrid/plan-connect-topologies.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -46,7 +46,7 @@ The most common topology is a single on-premises forest, with one or multiple do
46
46
### Single forest, multiple sync servers to one Azure AD tenant
47
47

48
48
49
-
Having multiple Azure AD Connect sync servers connected to the same Azure AD tenant is not supported, except for a [staging server](#staging-server). It's unsupported even if these servers are configured to synchronize with a mutually exclusive set of objects. You might have considered this topology if you can't reach all domains in the forest from a single server, or if you want to distribute load across several servers.
49
+
Having multiple Azure AD Connect sync servers connected to the same Azure AD tenant is not supported, except for a [staging server](#staging-server). It's unsupported even if these servers are configured to synchronize with a mutually exclusive set of objects. You might have considered this topology if you can't reach all domains in the forest from a single server, or if you want to distribute load across several servers. (No errors occur when a new Azure AD Sync Server is configured for a new Azure AD forest and a new verified child domain.)
50
50
51
51
## Multiple forests, single Azure AD tenant
52
52

@@ -78,7 +78,7 @@ You can find more details in [Understanding the default configuration](concept-a
78
78
79
79
Having more than one Azure AD Connect sync server connected to a single Azure AD tenant is not supported. The exception is the use of a [staging server](#staging-server).
80
80
81
-
This topology differs from the one below in that **multiple sync servers** connected to a single Azure AD tenant is not supported.
81
+
This topology differs from the one below in that **multiple sync servers** connected to a single Azure AD tenant is not supported. (While not supported, this still works.)
82
82
83
83
### Multiple forests, single sync server, users are represented in only one directory
84
84

@@ -142,8 +142,8 @@ We recommend having a single tenant in Azure AD for an organization. Before you
142
142
143
143
This topology implements the following use cases:
144
144
145
-
* AADConnect can synchronize the same users, groups, and contacts from a single Active Directory to multiple Azure AD tenants. These tenants can be in different Azure environments, such as the Azure China environment or the Azure Government environment, but they could also be in the same Azure environment, such as two tenants that are both in Azure Commercial.
146
-
* The same Source Anchor can be used for a single object in separate tenants (but not for multiple objects in the same tenant)
145
+
* AADConnect can synchronize the users, groups, and contacts from a single Active Directory to multiple Azure AD tenants. These tenants can be in different Azure environments, such as the Azure China environment or the Azure Government environment, but they could also be in the same Azure environment, such as two tenants that are both in Azure Commercial. For more details on options, see https://docs.microsoft.com/azure/azure-government/documentation-government-plan-identity.
146
+
* The same Source Anchor can be used for a single object in separate tenants (but not for multiple objects in the same tenant). (The verified domain can't be the same in two tenants. More details are needed to enable the same object to have two UPNs.)
147
147
* You will need to deploy an AADConnect server for every Azure AD tenant you want to synchronize to - one AADConnect server cannot synchronize to more than one Azure AD tenant.
148
148
* It is supported to have different sync scopes and different sync rules for different tenants.
149
149
* Only one Azure AD tenant sync can be configured to write back to Active Directory for the same object. This includes device and group writeback as well as Hybrid Exchange configurations – these features can only be configured in one tenant. The only exception here is Password Writeback – see below.
Copy file name to clipboardExpand all lines: articles/active-directory/saas-apps/timetabling-solutions-tutorial.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
9
9
ms.subservice: saas-app-tutorial
10
10
ms.workload: identity
11
11
ms.topic: tutorial
12
-
ms.date: 06/04/2022
12
+
ms.date: 11/16/2022
13
13
ms.author: jeedes
14
14
---
15
15
@@ -147,7 +147,7 @@ In this section, you create a user called Britta Simon in the Timetabling Soluti
147
147
148
148
149
149
> [!NOTE]
150
-
> Work with [Timetabling Solutions support team](https://www.timetabling.com.au/contact-us/) to add the users in the Timetabling Solutions platform. Users must be created and activated before you use single sign-on.
150
+
> To add the users in the Timetabling Solutions platform. Users must be created and activated before you use single sign-on.
Copy file name to clipboardExpand all lines: articles/azure-monitor/alerts/alerts-create-new-alert-rule.md
+52-6Lines changed: 52 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -176,14 +176,34 @@ And then defining these elements for the resulting alert actions using:
176
176
177
177
1. In the **Conditions** pane, select the **Chart period**.
178
178
1. The **Preview** chart shows you the results of your selection.
179
-
1.In the **Alert logic** section:
179
+
1.Select values for each of these fields in the **Alert logic** section:
180
180
181
181
|Field |Description |
182
182
|---------|---------|
183
-
|Event level| Select the level of the events that this alert rule monitors. Values are: **Critical**, **Error**, **Warning**, **Informational**, **Verbose** and **All**.|
184
-
|Status|Select the status levels for which the alert is evaluated.|
183
+
|Event level| Select the level of the events for this alert rule. Values are: **Critical**, **Error**, **Warning**, **Informational**, **Verbose** and **All**.|
184
+
|Status|Select the status levels for the alert.|
185
185
|Event initiated by|Select the user or service principal that initiated the event.|
186
186
187
+
### [Resource Health alert](#tab/resource-health)
188
+
189
+
1. In the **Conditions** pane, select values for each of these fields:
190
+
191
+
|Field |Description |
192
+
|---------|---------|
193
+
|Event status| Select the statuses of Resource Health events. Values are: **Active**, **In Progress**, **Resolved**, and **Updated**.|
194
+
|Current resource status|Select the current resource status. Values are: **Available**, **Degraded**, and **Unavailable**.|
195
+
|Previous resource status|Select the previous resource status. Values are: **Available**, **Degraded**, **Unavailable**, and **Unknown**.|
196
+
|Reason type|Select the cause(s) of the Resource Health events. Values are: **Platform Initiated**, **Unknown**, and **User Initiated**.|
197
+
### [Service Health alert](#tab/service-health)
198
+
199
+
1. In the **Conditions** pane, select values for each of these fields:
200
+
201
+
|Field |Description |
202
+
|---------|---------|
203
+
|Services| Select the Azure services.|
204
+
|Regions|Select the Azure regions.|
205
+
|Event types|Select the type(s) of Service Health events. Values are: **Service issue**, **Planned maintenance**, **Health advisories**, and **Security advisories**.|
206
+
187
207
---
188
208
189
209
From this point on, you can select the **Review + create** button at any time.
@@ -253,6 +273,14 @@ And then defining these elements for the resulting alert actions using:
253
273
1. (Optional) If you have configured action groups for this alert rule, you can add custom properties to the alert payload to add additional information to the payload. In the **Custom properties** section, add the property **Name** and **Value** for the custom property you want included in the payload.
254
274
255
275
:::image type="content" source="media/alerts-create-new-alert-rule/alerts-activity-log-rule-details-tab.png" alt-text="Screenshot of the actions tab when creating a new activity log alert rule.":::
276
+
### [Resource Health alert](#tab/resource-health)
277
+
278
+
1. Enter values for the **Alert rule name** and the **Alert rule description**.
279
+
1. (Optional) In the **Advanced options** section, select **Enable upon creation** for the alert rule to start running as soon as you're done creating it.
280
+
### [Service Health alert](#tab/service-health)
281
+
282
+
1. Enter values for the **Alert rule name** and the **Alert rule description**.
283
+
1. (Optional) In the **Advanced options** section, select **Enable upon creation** for the alert rule to start running as soon as you're done creating it.
256
284
257
285
---
258
286
@@ -292,14 +320,32 @@ You can create a new alert rule using the [Azure CLI](/cli/azure/get-started-wit
292
320
293
321
### [Activity log alert](#tab/activity-log)
294
322
295
-
To create an activity log alert rule, use the **az monitor activity-log alert create** command. You can see detailed documentation on the metric alert rule create command in the **az monitor activity-log alert create** section of the [CLI reference documentation for activity log alerts](/cli/azure/monitor/activity-log/alert).
296
-
297
323
To create a new activity log alert rule, use the following commands:
298
324
- [az monitor activity-log alert create](/cli/azure/monitor/activity-log/alert#az-monitor-activity-log-alert-create): Create a new activity log alert rule resource.
299
325
- [az monitor activity-log alert scope](/cli/azure/monitor/activity-log/alert/scope): Add scope for the created activity log alert rule.
300
326
- [az monitor activity-log alert action-group](/cli/azure/monitor/activity-log/alert/action-group): Add an action group to the activity log alert rule.
301
327
302
-
---
328
+
You can find detailed documentation on the activity log alert rule create command in the **az monitor activity-log alert create** section of the [CLI reference documentation for activity log alerts](/cli/azure/monitor/activity-log/alert).
329
+
### [Resource Health alert](#tab/resource-health)
330
+
331
+
To create a new activity log alert rule, use the following commands using the `Resource Health` category:
332
+
- [az monitor activity-log alert create](/cli/azure/monitor/activity-log/alert#az-monitor-activity-log-alert-create): Create a new activity log alert rule resource.
333
+
- [az monitor activity-log alert scope](/cli/azure/monitor/activity-log/alert/scope): Add scope for the created activity log alert rule.
334
+
- [az monitor activity-log alert action-group](/cli/azure/monitor/activity-log/alert/action-group): Add an action group to the activity log alert rule.
335
+
336
+
You can find detailed documentation on the alert rule create command in the **az monitor activity-log alert create** section of the [CLI reference documentation for activity log alerts](/cli/azure/monitor/activity-log/alert).
337
+
338
+
### [Service Health alert](#tab/service-health)
339
+
340
+
To create a new activity log alert rule, use the following commands using the `Service Health` category:
341
+
- [az monitor activity-log alert create](/cli/azure/monitor/activity-log/alert#az-monitor-activity-log-alert-create): Create a new activity log alert rule resource .
342
+
- [az monitor activity-log alert scope](/cli/azure/monitor/activity-log/alert/scope): Add scope for the created activity log alert rule.
343
+
- [az monitor activity-log alert action-group](/cli/azure/monitor/activity-log/alert/action-group): Add an action group to the activity log alert rule.
344
+
345
+
You can find detailed documentation on the alert rule create command in the **az monitor activity-log alert create** section of the [CLI reference documentation for activity log alerts](/cli/azure/monitor/activity-log/alert).
346
+
347
+
---
348
+
303
349
## Create a new alert rule using PowerShell
304
350
305
351
- To create a metric alert rule using PowerShell, use this cmdlet: [Add-AzMetricAlertRuleV2](/powershell/module/az.monitor/add-azmetricalertrulev2)
Copy file name to clipboardExpand all lines: articles/azure-monitor/alerts/alerts-overview.md
+3-2Lines changed: 3 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -45,15 +45,16 @@ You can see all alert instances in all your Azure resources generated in the las
45
45
46
46
## Types of alerts
47
47
48
-
There are four types of alerts. This table provides a brief description of each alert type.
48
+
This table provides a brief description of each alert type.
49
49
See [this article](alerts-types.md) for detailed information about each alert type and how to choose which alert type best suits your needs.
50
50
51
51
|Alert type|Description|
52
52
|:---------|:---------|
53
53
|[Metric alerts](alerts-types.md#metric-alerts)|Metric alerts evaluate resource metrics at regular intervals. Metrics can be platform metrics, custom metrics, logs from Azure Monitor converted to metrics or Application Insights metrics. Metric alerts have several additional features, such as the ability to apply multiple conditions and dynamic thresholds.|
54
54
|[Log alerts](alerts-types.md#log-alerts)|Log alerts allow users to use a Log Analytics query to evaluate resource logs at a predefined frequency.|
55
-
|[Activity log alerts](alerts-types.md#activity-log-alerts)|Activity log alerts are triggered when a new activity log event occurs that matches the defined conditions.|
55
+
|[Activity log alerts](alerts-types.md#activity-log-alerts)|Activity log alerts are triggered when a new activity log event occurs that matches defined conditions. **Resource Health** alerts and **Service Health** alerts are activity log alerts that report on your service and resource health.|
56
56
|[Smart detection alerts](alerts-types.md#smart-detection-alerts)|Smart detection on an Application Insights resource automatically warns you of potential performance problems and failure anomalies in your web application. You can migrate smart detection on your Application Insights resource to create alert rules for the different smart detection modules.|
57
+
|[Prometheus alerts (preview)](alerts-types.md#prometheus-alerts-preview)|Prometheus alerts are used for alerting on performance and health of Kubernetes clusters (including AKS). The alert rules are based on PromQL, which is an open source query language.|
0 commit comments