Skip to content

Commit 6923829

Browse files
authored
Merge pull request #177239 from MicrosoftDocs/master
10/22 PM Publish
2 parents 3987832 + fd9c912 commit 6923829

File tree

271 files changed

+1508
-1001
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

271 files changed

+1508
-1001
lines changed

.github/workflows/stale.yml

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -19,8 +19,7 @@ jobs:
1919
close-pr-label: auto-close
2020
exempt-pr-labels: keep-open
2121
operations-per-run: 1200
22-
ascending: true
23-
start-date: '2021-08-10'
22+
ascending: false
2423
stale-pr-message: >
2524
This pull request has been inactive for at least 14 days.
2625
If you are finished with your changes, don't forget to sign off. See the [contributor guide](https://review.docs.microsoft.com/help/contribute/contribute-how-to-write-pull-request-automation) for instructions.

.openpublishing.redirection.json

Lines changed: 0 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -5483,11 +5483,6 @@
54835483
"redirect_url": "/azure/partner-solutions/overview",
54845484
"redirect_document_id": false
54855485
},
5486-
{
5487-
"source_path_from_root": "/articles/partner-solutions/apache-kafka-confluent-cloud/index.md",
5488-
"redirect_url": "/azure/partner-solutions/apache-kafka-confluent-cloud/overview",
5489-
"redirect_document_id": false
5490-
},
54915486
{
54925487
"source_path_from_root": "/articles/fxt-edge-filer/fxt-add-nodes.md",
54935488
"redirect_url": "/azure/fxt-edge-filer/add-nodes",

articles/active-directory-b2c/service-limits.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -12,6 +12,7 @@ ms.topic: reference
1212
ms.date: 06/02/2021
1313
ms.author: kengaderdus
1414
ms.subservice: B2C
15+
ms.custom: "b2c-support"
1516
---
1617

1718
# Azure Active Directory B2C service limits and restrictions
@@ -42,8 +43,8 @@ The following table lists the administrative configuration limits in the Azure A
4243
|String Limit per Attribute |250 Chars |
4344
|Number of B2C tenants per subscription |20 |
4445
|Levels of [inheritance](custom-policy-overview.md#inheritance-model) in custom policies |10 |
45-
|Number of policies per Azure AD B2C tenant |200 |
46-
|Maximum policy file size |400 KB |
46+
|Number of policies per Azure AD B2C tenant (user flows + custom policies) |200 |
47+
|Maximum policy file size |1024 KB |
4748

4849
<sup>1</sup> See also [Azure AD service limits and restrictions](../active-directory/enterprise-users/directory-service-limits-restrictions.md).
4950

articles/active-directory-b2c/user-overview.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: CelesteDG
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: conceptual
11-
ms.date: 10/01/2021
11+
ms.date: 10/22/2021
1212
ms.author: kengaderdus
1313
ms.subservice: B2C
1414
ms.custom: b2c-support
@@ -21,7 +21,7 @@ In Azure Active Directory B2C (Azure AD B2C), there are several types of account
2121
The following types of accounts are available:
2222

2323
- **Work account** - A work account can access resources in a tenant, and with an administrator role, can manage tenants.
24-
- **Guest account** - A guest account can only be a Microsoft account or an Azure AD user that can be used to access applications or manage tenants.
24+
- **Guest account** - A guest account can only be a Microsoft account or an Azure AD user that can be used to share administration responsibilities such as [managing a tenant](tenant-management.md).
2525
- **Consumer account** - A consumer account is used by a user of the applications you've registered with Azure AD B2C. Consumer accounts can be created by:
2626
- The user going through a sign-up user flow in an Azure AD B2C application
2727
- Using Microsoft Graph API

articles/active-directory/authentication/how-to-authentication-sms-supported-apps.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -32,6 +32,7 @@ SMS-based authentication is available to Microsoft apps integrated with the Micr
3232
| Microsoft Stream || |
3333
| Microsoft Power Apps || |
3434
| Microsoft Azure |||
35+
| Microsoft Authenticator | ||
3536
| Azure Virtual Desktop || |
3637

3738
*_SMS sign-in isn't available for office applications, such as Word, Excel, etc., when accessed directly on the web, but is available when accessed through the [Office 365 web app](https://www.office.com)_

articles/active-directory/authentication/multi-factor-authentication-faq.yml

Lines changed: 8 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -247,11 +247,18 @@ sections:
247247
248248
A workaround for this error is to have separate user accounts for admin-related and non-admin operations. Later, you can link mailboxes between your admin account and non-admin account so that you can sign in to Outlook by using your non-admin account. For more details about this solution, learn how to [give an administrator the ability to open and view the contents of a user's mailbox](https://help.outlook.com/141/gg709759.aspx?sl=1).
249249
250+
- question: |
251+
What are the possible reasons why a user fails, with the error code "LsaLogonUser failed with NTSTATUS -1073741715 for MFA Server"?
252+
answer: |
253+
Error 1073741715 = Status Logon Failure -> The attempted logon is invalid. This is due to either a bad username or authentication.
254+
255+
A plausible reason for this error: If the primary credentials entered are correct, there might be a mismatch between the supported NTLM version on the MFA server and the domain controller. MFA Server supports only NTLMv1 (LmCompatabilityLevel=1 thru 4) and not NTLMv2 (LmCompatabilityLevel=5).
256+
250257
additionalContent: |
251258
## Next steps
252259
If your question isn't answered here, the following support options are available:
253260
254261
* Search the [Microsoft Support Knowledge Base](https://support.microsoft.com) for solutions to common technical issues.
255262
* Search for and browse technical questions and answers from the community, or ask your own question in the [Azure Active Directory Q&A](/answers/topics/azure-active-directory.html).
256263
* Contact Microsoft professional through [Azure Multi-Factor Authentication Server support](https://support.microsoft.com/oas/default.aspx?prid=14947). When contacting us, it's helpful if you can include as much information about your issue as possible. Information you can supply includes the page where you saw the error, the specific error code, the specific session ID, and the ID of the user who saw the error.
257-
* If you're a legacy PhoneFactor customer and you have questions or need help with resetting a password, use the [[email protected]](mailto:[email protected]) e-mail address to open a support case.
264+
* If you're a legacy PhoneFactor customer and you have questions or need help with resetting a password, use the [[email protected]](mailto:[email protected]) e-mail address to open a support case.

articles/active-directory/conditional-access/TOC.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@
3939
href: service-dependencies.md
4040
- name: Location conditions
4141
href: location-condition.md
42-
- name: Filters for devices
42+
- name: Filter for devices
4343
href: concept-condition-filters-for-devices.md
4444
- name: What if tool
4545
href: what-if-tool.md

articles/active-directory/conditional-access/concept-condition-filters-for-devices.md

Lines changed: 13 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,12 @@
11
---
22
title: Filter for devices as a condition in Conditional Access policy - Azure Active Directory
3-
description: Use Filter for devices in Conditional Access to enhance security posture
3+
description: Use filter for devices in Conditional Access to enhance security posture
44

55
services: active-directory
66
ms.service: active-directory
77
ms.subservice: conditional-access
88
ms.topic: conceptual
9-
ms.date: 06/03/2021
9+
ms.date: 10/22/2021
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -17,31 +17,31 @@ ms.collection: M365-identity-device-management
1717
---
1818
# Conditional Access: Filter for devices
1919

20-
When creating Conditional Access policies, administrators have asked for the ability to target or exclude specific devices in their environment. The condition Filter for devices give administrators this capability. Now you can target specific devices using [supported operators and properties for device filter](#supported-operators-and-device-properties-for-filters) and the other available assignment conditions in your Conditional Access policies.
20+
When creating Conditional Access policies, administrators have asked for the ability to target or exclude specific devices in their environment. The condition filter for devices give administrators this capability. Now you can target specific devices using [supported operators and properties for device filters](#supported-operators-and-device-properties-for-filters) and the other available assignment conditions in your Conditional Access policies.
2121

2222
:::image type="content" source="media/concept-condition-filters-for-devices/create-filter-for-devices-condition.png" alt-text="Creating a filter for device in Conditional Access policy conditions":::
2323

2424

2525
## Common scenarios
2626

27-
There are multiple scenarios that organizations can now enable using Filter for devices condition. Below are some core scenarios with examples of how to use this new condition.
27+
There are multiple scenarios that organizations can now enable using filter for devices condition. Below are some core scenarios with examples of how to use this new condition.
2828

2929
- Restrict access to privileged resources like Microsoft Azure Management, to privileged users, accessing from [privileged or secure admin workstations](/security/compass/privileged-access-devices). For this scenario, organizations would create two Conditional Access policies:
3030
- Policy 1: All users with the directory role of Global administrator, accessing the Microsoft Azure Management cloud app, and for Access controls, Grant access, but require multifactor authentication and require device to be marked as compliant.
31-
- Policy 2: All users with the directory role of Global administrator, accessing the Microsoft Azure Management cloud app, excluding filters for devices using rule expression device.extensionAttribute1 equals SAW and for Access controls, Block.
31+
- Policy 2: All users with the directory role of Global administrator, accessing the Microsoft Azure Management cloud app, excluding a filter for devices using rule expression device.extensionAttribute1 equals SAW and for Access controls, Block.
3232
- Block access to organization resources from devices running an unsupported Operating System version like Windows 7. For this scenario, organizations would create the following two Conditional Access policies:
3333
- Policy 1: All users, accessing all cloud apps and for Access controls, Grant access, but require device to be marked as compliant or require device to be hybrid Azure AD joined.
34-
- Policy 2: All users, accessing all cloud apps, including filters for devices using rule expression device.operatingSystem equals Windows and device.operatingSystemVersion startsWith "6.1" and for Access controls, Block.
34+
- Policy 2: All users, accessing all cloud apps, including a filter for devices using rule expression device.operatingSystem equals Windows and device.operatingSystemVersion startsWith "6.1" and for Access controls, Block.
3535
- Do not require multifactor authentication for specific accounts like service accounts when used on specific devices like Teams phones or Surface Hub devices. For this scenario, organizations would create the following two Conditional Access policies:
3636
- Policy 1: All users excluding service accounts, accessing all cloud apps, and for Access controls, Grant access, but require multifactor authentication.
37-
- Policy 2: Select users and groups and include group that contains service accounts only, accessing all cloud apps, excluding filters for devices using rule expression device.extensionAttribute2 not equals TeamsPhoneDevice and for Access controls, Block.
37+
- Policy 2: Select users and groups and include group that contains service accounts only, accessing all cloud apps, excluding a filter for devices using rule expression device.extensionAttribute2 not equals TeamsPhoneDevice and for Access controls, Block.
3838

3939
## Create a Conditional Access policy
4040

4141
Filter for devices is an option when creating a Conditional Access policy in the Azure portal or using the Microsoft Graph API.
4242

4343
> [!IMPORTANT]
44-
> Device state and Filter for devices cannot be used together in Conditional Access policy.
44+
> Device state and filter for devices cannot be used together in Conditional Access policy.
4545
4646
The following steps will help create two Conditional Access policies to support the first scenario under [Common scenarios](#common-scenarios).
4747

@@ -64,7 +64,7 @@ Policy 1: All users with the directory role of Global administrator, accessing t
6464
1. Confirm your settings and set **Enable policy** to **On**.
6565
1. Select **Create** to create to enable your policy.
6666

67-
Policy 2: All users with the directory role of Global administrator, accessing the Microsoft Azure Management cloud app, excluding filter for devices using rule expression device.extensionAttribute1 equals SAW and for Access controls, Block.
67+
Policy 2: All users with the directory role of Global administrator, accessing the Microsoft Azure Management cloud app, excluding a filter for devices using rule expression device.extensionAttribute1 equals SAW and for Access controls, Block.
6868

6969
1. Select **New policy**.
7070
1. Give your policy a name. We recommend that organizations create a meaningful standard for the names of their policies.
@@ -88,7 +88,7 @@ Policy 2: All users with the directory role of Global administrator, accessing t
8888

8989
### Filter for devices Graph API
9090

91-
The filter for devices API is available in Microsoft Graph v1.0 endpoint and can be accessed using https://graph.microsoft.com/v1.0/identity/conditionalaccess/policies/. You can configure filter for devices when creating a new Conditional Access policy or you can update an existing policy to configure filter for devices condition. To update an existing policy, you can do a patch call on the Microsoft Graph v1.0 endpoint mentioned above by appending the policy ID of an existing policy and executing the following request body. The example here shows configuring a filter for devices condition excluding device that are not marked as SAW devices. The rule syntax can consist of more than one single expression. To learn more about the syntax, see [dynamic membership rules for groups in Azure Active Directory](https://docs.microsoft.com/azure/active-directory/enterprise-users/groups-dynamic-membership).
91+
The filter for devices API is available in Microsoft Graph v1.0 endpoint and can be accessed using https://graph.microsoft.com/v1.0/identity/conditionalaccess/policies/. You can configure a filter for devices when creating a new Conditional Access policy or you can update an existing policy to configure the filter for devices condition. To update an existing policy, you can do a patch call on the Microsoft Graph v1.0 endpoint mentioned above by appending the policy ID of an existing policy and executing the following request body. The example here shows configuring a filter for devices condition excluding device that are not marked as SAW devices. The rule syntax can consist of more than one single expression. To learn more about the syntax, see [dynamic membership rules for groups in Azure Active Directory](https://docs.microsoft.com/azure/active-directory/enterprise-users/groups-dynamic-membership).
9292

9393
```json
9494
{
@@ -105,7 +105,7 @@ The filter for devices API is available in Microsoft Graph v1.0 endpoint and can
105105

106106
## Supported operators and device properties for filters
107107

108-
The following device attributes can be used with filters for devices condition in Conditional Access.
108+
The following device attributes can be used with the filter for devices condition in Conditional Access.
109109

110110
| Supported device attributes | Supported operators | Supported values | Example |
111111
| --- | --- | --- | --- |
@@ -120,11 +120,11 @@ The following device attributes can be used with filters for devices condition i
120120
| profileType | Equals, NotEquals | A valid profile type set for a device. Supported values are: RegisteredDevice (default), SecureVM (used for Windows VMs in Azure enabled with Azure AD sign in.), Printer (used for printers), Shared (used for shared devices), IoT (used for IoT devices) | (device.profileType -notIn [“Printer”, “Shared”, “IoT”] |
121121
| systemLabels | Contains, NotContains | List of labels applied to the device by the system. Some of the supported values are: AzureResource (used for Windows VMs in Azure enabled with Azure AD sign in), M365Managed (used for devices managed using Microsoft Managed Desktop), MultiUser (used for shared devices) | (device.systemLabels -contains "M365Managed") |
122122
| trustType | Equals, NotEquals | A valid registered state for devices. Supported values are: AzureAD (used for Azure AD joined devices), ServerAD (used for Hybrid Azure AD joined devices), Workplace (used for Azure AD registered devices) | (device.trustType -notIn ‘ServerAD, Workplace’) |
123-
| extensionAttribute1-15 | Equals, NotEquals, StartsWith, NotStartsWith, EndsWith, NotEndsWith, Contains, NotContains, In, NotIn | extensionAttributes1-15 are attributes that customers can use for device objects. Customers can update any of the extensionAttributes1 through 15 with custom values and use them in filters for devices condition in Conditional Access. Any string value can be used. | (device.extensionAttribute1 -eq ‘SAW’) |
123+
| extensionAttribute1-15 | Equals, NotEquals, StartsWith, NotStartsWith, EndsWith, NotEndsWith, Contains, NotContains, In, NotIn | extensionAttributes1-15 are attributes that customers can use for device objects. Customers can update any of the extensionAttributes1 through 15 with custom values and use them in the filter for devices condition in Conditional Access. Any string value can be used. | (device.extensionAttribute1 -eq ‘SAW’) |
124124

125125
## Policy behavior with filter for devices
126126

127-
Filter for devices condition in Conditional Access evaluates policy based on device attributes of a registered device in Azure AD and hence it is important to understand under what circumstances the policy is applied or not applied. The table below illustrates the behavior when filters for devices condition are configured.
127+
The filter for devices condition in Conditional Access evaluates policy based on device attributes of a registered device in Azure AD and hence it is important to understand under what circumstances the policy is applied or not applied. The table below illustrates the behavior when a filter for devices condition are configured.
128128

129129
| Filter for devices condition | Device registration state | Device filter Applied
130130
| --- | --- | --- |
Loading
Loading

0 commit comments

Comments
 (0)