Skip to content

Commit 6d5f0ba

Browse files
authored
Merge pull request #202847 from curtand/entra062403
Azure AD Entra PIM rebranding 03
2 parents 1695da8 + eaa22a7 commit 6d5f0ba

10 files changed

+19
-21
lines changed

articles/active-directory/privileged-identity-management/pim-how-to-configure-security-alerts.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -11,15 +11,15 @@ ms.service: active-directory
1111
ms.topic: how-to
1212
ms.workload: identity
1313
ms.subservice: pim
14-
ms.date: 04/18/2022
14+
ms.date: 06/24/2022
1515
ms.author: curtand
1616
ms.reviewer: shaunliu
1717
ms.custom: pim
1818
ms.collection: M365-identity-device-management
1919
---
2020
# Configure security alerts for Azure AD roles in Privileged Identity Management
2121

22-
Privileged Identity Management (PIM) generates alerts when there is suspicious or unsafe activity in your Azure Active Directory (Azure AD) organization. When an alert is triggered, it shows up on the Privileged Identity Management dashboard. Select the alert to see a report that lists the users or roles that triggered the alert.
22+
Privileged Identity Management (PIM) generates alerts when there is suspicious or unsafe activity in your organization in Azure Active Directory (Azure AD), part of Microsoft Entra. When an alert is triggered, it shows up on the Privileged Identity Management dashboard. Select the alert to see a report that lists the users or roles that triggered the alert.
2323

2424
![Screenshot that shows the "Alerts" page with a list of alerts and their severity.](./media/pim-how-to-configure-security-alerts/view-alerts.png)
2525

articles/active-directory/privileged-identity-management/pim-how-to-renew-extend.md

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -11,18 +11,16 @@ ms.workload: identity
1111
ms.tgt_pltfrm: na
1212
ms.topic: how-to
1313
ms.subservice: pim
14-
ms.date: 10/19/2021
14+
ms.date: 06/24/2022
1515
ms.author: curtand
1616
ms.reviewer: shaunliu
1717
ms.custom: pim
1818
ms.collection: M365-identity-device-management
1919
---
2020

21-
22-
2321
# Extend or renew Azure AD role assignments in Privileged Identity Management
2422

25-
Azure Active Directory (Azure AD) Privileged Identity Management (PIM) provides controls to manage the access and assignment lifecycle for Azure AD roles. Administrators can assign roles using start and end date-time properties. When the assignment end approaches, Privileged Identity Management sends email notifications to the affected users or groups. It also sends email notifications to Azure AD administrators to ensure that appropriate access is maintained. Assignments might be renewed and remain visible in an expired state for up to 30 days, even if access is not extended.
23+
Privileged Identity Management (PIM) provides controls to manage the access and assignment lifecycle for roles in Azure Active Directory (Azure AD), part of Microsoft Entra. Administrators can assign roles using start and end date-time properties. When the assignment end approaches, Privileged Identity Management sends email notifications to the affected users or groups. It also sends email notifications to Azure AD administrators to ensure that appropriate access is maintained. Assignments might be renewed and remain visible in an expired state for up to 30 days, even if access is not extended.
2624

2725
## Who can extend and renew?
2826

articles/active-directory/privileged-identity-management/pim-how-to-require-mfa.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ ms.service: active-directory
1111
ms.topic: how-to
1212
ms.workload: identity
1313
ms.subservice: pim
14-
ms.date: 10/07/2021
14+
ms.date: 06/24/2022
1515
ms.author: curtand
1616
ms.reviewer: shaunliu
1717
ms.custom: pim
@@ -21,7 +21,7 @@ ms.collection: M365-identity-device-management
2121

2222
We recommend that you require multifactor authentication (MFA or 2FA) for all your administrators. Multifactor authentication reduces the risk of an attack using a compromised password.
2323

24-
You can require that users complete a multifactor authentication challenge when they sign in. You can also require that users complete a multifactor authentication challenge when they activate a role in Azure Active Directory (Azure AD) Privileged Identity Management (PIM). This way, even if the user didn't complete multifactor authentication when they signed in, they'll be asked to do it by Privileged Identity Management.
24+
You can require that users complete a multifactor authentication challenge when they sign in. You can also require that users complete a multifactor authentication challenge when they activate a role in Privileged Identity Management (PIM) in Azure Active Directory (Azure AD), part of Microsoft Entra. This way, even if the user didn't complete multifactor authentication when they signed in, they'll be asked to do it by Privileged Identity Management.
2525

2626
> [!IMPORTANT]
2727
> Right now, Azure AD Multi-Factor Authentication only works with work or school accounts, not Microsoft personal accounts (usually a personal account that's used to sign in to Microsoft services such as Skype, Xbox, or Outlook.com). Because of this, anyone using a personal account can't be an eligible administrator because they can't use multifactor authentication to activate their roles. If these users need to continue managing workloads using a Microsoft account, elevate them to permanent administrators for now.

articles/active-directory/privileged-identity-management/pim-how-to-use-audit-log.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.service: active-directory
1010
ms.topic: how-to
1111
ms.workload: identity
1212
ms.subservice: pim
13-
ms.date: 10/07/2021
13+
ms.date: 06/24/2022
1414
ms.author: curtand
1515
ms.reviewer: shaunliu
1616
ms.custom: pim
@@ -19,7 +19,7 @@ ms.collection: M365-identity-device-management
1919
---
2020
# View audit history for Azure AD roles in Privileged Identity Management
2121

22-
You can use the Privileged Identity Management (PIM) audit history to see all role assignments and activations within the past 30 days for all privileged roles. If you want to retain audit data for longer than the default retention period, you can use Azure Monitor to route it to an Azure storage account. For more information, see [Archive Azure AD logs to an Azure storage account](../reports-monitoring/quickstart-azure-monitor-route-logs-to-storage-account.md). If you want to see the full audit history of activity in your Azure Active Directory (Azure AD) organization, including administrator, end user, and synchronization activity, you can use the [Azure Active Directory security and activity reports](../reports-monitoring/overview-reports.md).
22+
You can use the Privileged Identity Management (PIM) audit history to see all role assignments and activations within the past 30 days for all privileged roles. If you want to retain audit data for longer than the default retention period, you can use Azure Monitor to route it to an Azure storage account. For more information, see [Archive Azure AD logs to an Azure storage account](../reports-monitoring/quickstart-azure-monitor-route-logs-to-storage-account.md). If you want to see the full audit history of activity in your organization in Azure Active Directory (Azure AD), part of Microsoft Entra, including administrator, end user, and synchronization activity, you can use the [Azure Active Directory security and activity reports](../reports-monitoring/overview-reports.md).
2323

2424
Follow these steps to view the audit history for Azure AD roles.
2525

articles/active-directory/privileged-identity-management/pim-perform-azure-ad-roles-and-resource-roles-review.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ ms.collection: M365-identity-device-management
2020

2121
# Perform an access review of Azure resource and Azure AD roles in PIM
2222

23-
Privileged Identity Management (PIM) simplifies how enterprises manage privileged access to resources in Azure Active Directory (AD) and other Microsoft online services like Microsoft 365 or Microsoft Intune. Follow the steps in this article to perform reviews of access to roles.
23+
Privileged Identity Management (PIM) simplifies how enterprises manage privileged access to resources in Azure Active Directory (AD), part of Microsoft Entra, and other Microsoft online services like Microsoft 365 or Microsoft Intune. Follow the steps in this article to perform reviews of access to roles.
2424

2525
If you are assigned to an administrative role, your organization's privileged role administrator may ask you to regularly confirm that you still need that role for your job. You might get an email that includes a link, or you can go straight to the [Azure portal](https://portal.azure.com) and begin.
2626

articles/active-directory/privileged-identity-management/pim-resource-roles-activate-your-roles.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.topic: how-to
1010
ms.tgt_pltfrm: na
1111
ms.workload: identity
1212
ms.subservice: pim
13-
ms.date: 02/02/2022
13+
ms.date: 06/24/2022
1414
ms.author: curtand
1515
ms.reviewer: shaunliu
1616
ms.custom: pim
@@ -19,7 +19,7 @@ ms.collection: M365-identity-device-management
1919

2020
# Activate my Azure resource roles in Privileged Identity Management
2121

22-
Use Privileged Identity Management (PIM) to allow eligible role members for Azure resources to schedule activation for a future date and time. They can also select a specific activation duration within the maximum (configured by administrators).
22+
Use Privileged Identity Management (PIM) in Azure Active Diretory (Azure AD), part of Microsoft Entra, to allow eligible role members for Azure resources to schedule activation for a future date and time. They can also select a specific activation duration within the maximum (configured by administrators).
2323

2424
This article is for members who need to activate their Azure resource role in Privileged Identity Management.
2525

articles/active-directory/privileged-identity-management/pim-resource-roles-approval-workflow.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.topic: how-to
1010
ms.tgt_pltfrm: na
1111
ms.workload: identity
1212
ms.subservice: pim
13-
ms.date: 10/07/2021
13+
ms.date: 06/24/2022
1414
ms.author: curtand
1515
ms.reviewer: shaunliu
1616
ms.custom: pim
@@ -19,7 +19,7 @@ ms.collection: M365-identity-device-management
1919

2020
# Approve or deny requests for Azure resource roles in Privileged Identity Management
2121

22-
With Privileged Identity Management (PIM) in Azure Active Directory (Azure AD), you can configure roles to require approval for activation, and choose users or groups from your Azure AD organization as delegated approvers. We recommend selecting two or more approvers for each role to reduce workload for the privileged role administrator. Delegated approvers have 24 hours to approve requests. If a request is not approved within 24 hours, then the eligible user must re-submit a new request. The 24 hour approval time window is not configurable.
22+
With Privileged Identity Management (PIM) in Azure Active Directory (Azure AD), part of Microsoft Entra, you can configure roles to require approval for activation, and choose users or groups from your Azure AD organization as delegated approvers. We recommend selecting two or more approvers for each role to reduce workload for the privileged role administrator. Delegated approvers have 24 hours to approve requests. If a request is not approved within 24 hours, then the eligible user must re-submit a new request. The 24 hour approval time window is not configurable.
2323

2424
Follow the steps in this article to approve or deny requests for Azure resource roles.
2525

articles/active-directory/privileged-identity-management/pim-resource-roles-assign-roles.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,15 +10,15 @@ ms.topic: how-to
1010
ms.tgt_pltfrm: na
1111
ms.workload: identity
1212
ms.subservice: pim
13-
ms.date: 04/18/2022
13+
ms.date: 06/24/2022
1414
ms.author: curtand
1515
ms.custom: pim
1616
ms.collection: M365-identity-device-management
1717
---
1818

1919
# Assign Azure resource roles in Privileged Identity Management
2020

21-
Azure Active Directory (Azure AD) Privileged Identity Management (PIM) can manage the built-in Azure resource roles, as well as custom roles, including (but not limited to):
21+
With Privileged Identity Management (PIM) in Azure Active Directory (Azure AD), part of Microsoft Entra, can manage the built-in Azure resource roles, as well as custom roles, including (but not limited to):
2222

2323
- Owner
2424
- User Access Administrator

articles/active-directory/privileged-identity-management/pim-resource-roles-configure-alerts.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.topic: how-to
1010
ms.tgt_pltfrm: na
1111
ms.workload: identity
1212
ms.subservice: pim
13-
ms.date: 06/03/2022
13+
ms.date: 06/24/2022
1414
ms.author: curtand
1515
ms.reviewer: shaunliu
1616
ms.custom: pim
@@ -19,7 +19,7 @@ ms.collection: M365-identity-device-management
1919

2020
# Configure security alerts for Azure roles in Privileged Identity Management
2121

22-
Privileged Identity Management (PIM) generates alerts when there is suspicious or unsafe activity in your Azure Active Directory (Azure AD) organization. When an alert is triggered, it shows up on the Alerts page.
22+
Privileged Identity Management (PIM) generates alerts when there is suspicious or unsafe activity in your organization in Azure Active Directory (Azure AD), part of Microsoft Entra. When an alert is triggered, it shows up on the Alerts page.
2323

2424
![Azure resources - Alerts page listing alert, risk level, and count](media/pim-resource-roles-configure-alerts/rbac-alerts-page.png)
2525

articles/active-directory/privileged-identity-management/pim-resource-roles-configure-role-settings.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.topic: how-to
1010
ms.tgt_pltfrm: na
1111
ms.workload: identity
1212
ms.subservice: pim
13-
ms.date: 12/06/2021
13+
ms.date: 06/24/2022
1414
ms.author: curtand
1515
ms.reviewer: shaunliu
1616
ms.custom: pim
@@ -19,7 +19,7 @@ ms.collection: M365-identity-device-management
1919

2020
# Configure Azure resource role settings in Privileged Identity Management
2121

22-
When you configure Azure resource role settings, you define the default settings that are applied to Azure resource role assignments in Azure Active Directory (Azure AD) Privileged Identity Management (PIM). Use the following procedures to configure the approval workflow and specify who can approve or deny requests.
22+
When you configure Azure resource role settings, you define the default settings that are applied to Azure role assignments in Privileged Identity Management (PIM) in Azure Active Directory (Azure AD), part of Microsoft Entra. Use the following procedures to configure the approval workflow and specify who can approve or deny requests.
2323

2424
## Open role settings
2525

0 commit comments

Comments
 (0)