Skip to content

Commit 6e5834d

Browse files
committed
Making first two step updates
1 parent f3b6e68 commit 6e5834d

26 files changed

+158
-138
lines changed

articles/active-directory/enterprise-users/domains-admin-takeover.md

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: enterprise-users
1010
ms.topic: how-to
1111
ms.workload: identity
12-
ms.date: 09/06/2023
12+
ms.date: 09/08/2023
1313
ms.author: barclayn
1414
ms.reviewer: sumitp
1515
ms.custom: it-pro, seo-update-azuread-jan, has-azure-ad-ps-ref
@@ -18,7 +18,7 @@ ms.collection: M365-identity-device-management
1818
---
1919
# Take over an unmanaged directory as administrator in Azure Active Directory
2020

21-
This article describes two ways to take over a DNS domain name in an unmanaged directory in Microsoft Entra ID (Azure AD). When a self-service user signs up for a cloud service that uses Microsoft Entra ID, they're added to an unmanaged Entra ID directory based on their email domain. For more about self-service or "viral" sign-up for a service, see [What is self-service sign-up for Microsoft Entra ID?](directory-self-service-signup.md)
21+
This article describes two ways to take over a DNS domain name in an unmanaged directory in Microsoft Entra ID formerly known as Azure AD. When a self-service user signs up for a cloud service that uses Microsoft Entra ID, they're added to an unmanaged Entra ID directory based on their email domain. For more about self-service or "viral" sign-up for a service, see [What is self-service sign-up for Microsoft Entra ID?](directory-self-service-signup.md)
2222

2323

2424
> [!VIDEO https://www.youtube.com/embed/GOSpjHtrRsg]
@@ -106,7 +106,6 @@ External admin takeover isn't supported for any service that has service plans t
106106
> [!NOTE]
107107
> External admin takeover is not supported cross cloud boundaries (ex. Azure Commercial to Azure Government). In these scenarios it is recommended to perform External admin takeover into another Azure Commercial tenant, and then delete the domain from this tenant so you may verify successfully into the destination Azure Government tenant.
108108
109-
You can optionally use the [**ForceTakeover** option](#azure-ad-powershell-cmdlets-for-the-forcetakeover-option) for removing the domain name from the unmanaged organization and verifying it on the desired organization.
110109

111110
#### More information about RMS for individuals
112111

articles/active-directory/enterprise-users/domains-manage.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -28,8 +28,8 @@ A domain name is an important part of the identifier for resources in many Azure
2828

2929
When your organization is created, the initial domain name, such as ‘contoso.onmicrosoft.com,’ is also the primary domain name. The primary domain is the default domain name for a new user when you create a new user. Setting a primary domain name streamlines the process for an administrator to create new users in the portal. To change the primary domain name:
3030

31-
1. Sign in to the [Azure portal](https://portal.azure.com) with an account that's a Global Administrator for the organization.
32-
2. Select **Azure Active Directory**.
31+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Global Administrator](../roles/permissions-reference.md#global-administrator).
32+
1. Select Microsoft Entra ID (Azure AD).
3333
3. Select **Custom domain names**.
3434

3535
![Opening the user management page](./media/domains-manage/add-custom-domain.png)

articles/active-directory/enterprise-users/groups-assign-sensitivity-labels.md

Lines changed: 14 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: enterprise-users
1010
ms.workload: identity
1111
ms.topic: how-to
12-
ms.date: 06/28/2023
12+
ms.date: 09/08/2023
1313
ms.author: barclayn
1414
ms.reviewer: krbain
1515
ms.custom: it-pro, has-azure-ad-ps-ref
@@ -81,10 +81,9 @@ You will also need to synchronize your sensitivity labels to Azure AD. For instr
8181
8282
## Assign a label to a new group in Azure portal
8383
84-
[!INCLUDE [portal updates](~/articles/active-directory/includes/portal-update.md)]
85-
86-
1. Sign in to the [Azure portal](https://portal.azure.com).
87-
1. Browse to **Azure Active Directory** > **Groups**, and then select **New group**.
84+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Global Administrator](../roles/permissions-reference.md#global-administrator).
85+
1. Select Microsoft Entra ID (Azure AD).
86+
1. Choose **Groups** > **All groups** > **New group**.
8887
1. On the **New Group** page, select **Office 365**, and then fill out the required information for the new group and select a sensitivity label from the list.
8988
9089
![Assign a sensitivity label in the New groups page](./media/groups-assign-sensitivity-labels/new-group-page.png)
@@ -95,8 +94,9 @@ Your group is created and the site and group settings associated with the select
9594
9695
## Assign a label to an existing group in Azure portal
9796
98-
1. Sign in to the [Azure portal](https://portal.azure.com) with a Groups admin account, or as a group owner.
99-
1. Browse to **Azure Active Directory** > **Groups**.
97+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Global Administrator](../roles/permissions-reference.md#global-administrator).
98+
1. Select Microsoft Entra ID (Azure AD).
99+
1. Select **Groups**.
100100
1. From the **All groups** page, select the group that you want to label.
101101
1. On the selected group's page, select **Properties** and select a sensitivity label from the list.
102102
@@ -106,8 +106,9 @@ Your group is created and the site and group settings associated with the select
106106
107107
## Remove a label from an existing group in Azure portal
108108
109-
1. Sign in to the [Azure portal](https://portal.azure.com) with a Global Administrator or Groups admin account, or as a group owner.
110-
1. Browse to **Azure Active Directory** > **Groups**.
109+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Global Administrator](../roles/permissions-reference.md#global-administrator).
110+
1. Select Microsoft Entra ID (Azure AD).
111+
1. Select **Groups** > **All groups**.
111112
1. From the **All groups** page, select the group that you want to remove the label from.
112113
1. On the **Group** page, select **Properties**.
113114
1. Select **Remove**.
@@ -146,9 +147,10 @@ If the label you are looking for is not in the list, this could be the case for
146147
147148
Labels can be swapped at any time using the same steps as assigning a label to an existing group, as follows:
148149
149-
1. Sign in to the [Azure portal](https://portal.azure.com) with a Global or Group administrator account or as group owner.
150-
1. Browse to **Azure Active Directory** > **Groups**.
151-
1. From the **All groups** page, select the group that you want to label.
150+
1. 1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Global Administrator](../roles/permissions-reference.md#global-administrator).
151+
1. Select Microsoft Entra ID (Azure AD).
152+
1. Select **Groups**.
153+
1. Choose **All groups**, select the group that you want to label.
152154
1. On the selected group's page, select **Properties** and select a new sensitivity label from the list.
153155
1. Select **Save**.
154156

articles/active-directory/enterprise-users/groups-bulk-download.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -27,8 +27,9 @@ You can download a list of all the groups in your organization to a comma-separa
2727
>[!NOTE]
2828
> The columns downloaded are pre-defined
2929
30-
1. Sign in to the [Azure portal](https://portal.azure.com) with an account in your organization.
31-
1. In Azure AD, select **Groups** > **Download groups**.
30+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Global Administrator](../roles/permissions-reference.md#global-administrator).
31+
1. Select Microsoft Entra ID (Azure AD).
32+
1. Select **Groups** > **Download groups**.
3233
1. On the **Groups download** page, select **Start** to receive a CSV file listing your groups.
3334

3435
![The download groups command is on the All groups page](./media/groups-bulk-download/bulk-download.png)

articles/active-directory/enterprise-users/groups-bulk-remove-members.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: active-directory
55
author: barclayn
66
ms.author: barclayn
77
manager: amycolannino
8-
ms.date: 09/22/2021
8+
ms.date: 09/08/2023
99
ms.topic: how-to
1010
ms.service: active-directory
1111
ms.subservice: enterprise-users
@@ -44,8 +44,9 @@ The rows in a downloaded CSV template are as follows:
4444

4545
[!INCLUDE [portal updates](~/articles/active-directory/includes/portal-update.md)]
4646

47-
1. Sign in to the [Azure portal](https://portal.azure.com) with a User administrator account in the organization. Group owners can also bulk remove members of groups they own.
48-
1. In Azure AD, select **Groups** > **All groups**.
47+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Global Administrator](../roles/permissions-reference.md#global-administrator).
48+
1. Select Microsoft Entra ID (Azure AD).
49+
1. Select **Groups** > **All groups**.
4950
1. Open the group from which you're removing members and then select **Members**.
5051
1. On the **Members** page, select **Remove members**.
5152
1. On the **Bulk remove group members** page, select **Download** to get the CSV file template with required group member properties.

articles/active-directory/enterprise-users/groups-change-type.md

Lines changed: 8 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: enterprise-users
1010
ms.workload: identity
1111
ms.topic: how-to
12-
ms.date: 06/23/2022
12+
ms.date: 09/06/2023
1313
ms.author: barclayn
1414
ms.reviewer: krbain
1515
ms.custom: it-pro, has-azure-ad-ps-ref
@@ -27,13 +27,14 @@ You can change a group's membership from static to dynamic (or vice-versa) In Az
2727
2828
## Change the membership type for a group
2929

30-
[!INCLUDE [portal updates](~/articles/active-directory/includes/portal-update.md)]
30+
The following steps can be performed using an account that has either the Global administrator, user administrator or groups administrator roles assigned.
3131

32-
1. Sign in to the [Azure portal](https://portal.azure.com) with an account that is a Global Administrator, User Administrator, or Groups Administrator in your Azure AD organization.
33-
2. Browse to **Azure Active Directory** > **Groups**.
34-
3. From the **All groups** list, open the group that you want to change.
35-
4. Select **Properties**.
36-
5. On the **Properties** page for the group, select a **Membership type** of either Assigned (static), Dynamic User, or Dynamic Device, depending on your desired membership type. For dynamic membership, you can use the rule builder to select options for a simple rule or write a membership rule yourself.
32+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Groups Administrator](../roles/permissions-reference.md#groups-administrator).
33+
1. Select Microsoft Entra ID (Azure AD).
34+
1. **Groups**.
35+
1. From the **All groups** list, open the group that you want to change.
36+
1. Select **Properties**.
37+
1. On the **Properties** page for the group, select a **Membership type** of either Assigned (static), Dynamic User, or Dynamic Device, depending on your desired membership type. For dynamic membership, you can use the rule builder to select options for a simple rule or write a membership rule yourself.
3738

3839
The following steps are an example of changing a group from static to dynamic membership for a group of users.
3940

articles/active-directory/enterprise-users/groups-create-rule.md

Lines changed: 6 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.service: active-directory
1010
ms.subservice: enterprise-users
1111
ms.workload: identity
1212
ms.topic: how-to
13-
ms.date: 11/14/2022
13+
ms.date: 09/08/2023
1414
ms.author: barclayn
1515
ms.reviewer: krbain
1616
ms.custom: it-pro
@@ -43,8 +43,8 @@ For examples of syntax, supported properties, operators, and values for a member
4343

4444
[!INCLUDE [portal updates](~/articles/active-directory/includes/portal-update.md)]
4545

46-
1. Sign in to the [Azure portal](https://portal.azure.com) with an account that is in the Global Administrator, Intune Administrator, or User Administrator role in the Azure AD organization.
47-
1. Browse to **Azure Active Directory** > **Groups**.
46+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Global Administrator](../roles/permissions-reference.md#global-administrator).
47+
1. Select Microsoft Entra ID (Azure AD).> **Groups**.
4848
1. Select **All groups**, and select **New group**.
4949

5050
![Screenshot showing how to select the "add new group" action](./media/groups-create-rule/create-new-group.png)
@@ -63,8 +63,9 @@ If the rule you entered isn't valid, an explanation of why the rule couldn't be
6363

6464
## To update an existing rule
6565

66-
1. Sign in to the [Azure portal](https://portal.azure.com) with an account that is in the Global Administrator, Group Administrator, Intune Administrator, or User Administrator role in the Azure AD organization.
67-
1. Browse to **Azure Active Directory** > **Groups** > **All groups**.
66+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Global Administrator](../roles/permissions-reference.md#global-administrator).
67+
1. Select Microsoft Entra ID (Azure AD).
68+
1. Select **Groups** > **All groups**.
6869
1. Select a group to open its profile.
6970
1. On the profile page for the group, select **Dynamic membership rules**. The rule builder supports up to five expressions. To add more than five expressions, you must use the text box.
7071

articles/active-directory/enterprise-users/groups-dynamic-tutorial.md

Lines changed: 10 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: enterprise-users
1010
ms.workload: identity
1111
ms.topic: tutorial
12-
ms.date: 06/24/2022
12+
ms.date: 09/08/2023
1313
ms.author: barclayn
1414
ms.reviewer: krbain
1515
ms.custom: "it-pro;seo-update-azuread-jan"
@@ -41,8 +41,9 @@ You're not required to assign licenses to the users for them to be members in dy
4141

4242
First, you'll create a group for your guest users who all are from a single partner company. They need special licensing, so it's often more efficient to create a group for this purpose.
4343

44-
1. Sign in to the [Azure portal](https://portal.azure.com) with an account that is the global administrator for your organization.
45-
2. Select **Azure Active Directory** > **Groups** > **New group**.
44+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Global Administrator](../roles/permissions-reference.md#global-administrator).
45+
1. Select Microsoft Entra ID (Azure AD).
46+
2. Select **Groups** > **All groups** > **New group**.
4647
![select command to start a new group](./media/groups-dynamic-tutorial/new-group.png)
4748
3. On the **Group** blade:
4849

@@ -84,12 +85,14 @@ Perhaps your ultimate administrative plan is to assign all of your guest users t
8485

8586
## Clean up resources
8687

87-
**To remove the guest users group**
88+
### To remove the guest users group
8889

89-
1. Sign in to the [Azure portal](https://portal.azure.com) with an account that is the Global Administrator for your organization.
90-
2. Select **Azure Active Directory** > **Groups**. Select the **Guest users Contoso** group, select the ellipsis (...), and then select **Delete**. When you delete the group, any assigned licenses are removed.
90+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Global Administrator](../roles/permissions-reference.md#global-administrator).
91+
1. Select Microsoft Entra ID (Azure AD).
92+
2. Select **Groups**. Select the **Guest users Contoso** group, select the ellipsis (...), and then select **Delete**. When you delete the group, any assigned licenses are removed.
93+
94+
### To restore the All Users group
9195

92-
**To restore the All Users group**
9396
1. Select **Azure Active Directory** > **Groups**. Select the name of the **All users** group to open the group.
9497
1. Select **Dynamic membership rules**, clear all the text in the rule, and select **Save**.
9598

articles/active-directory/enterprise-users/groups-lifecycle.md

Lines changed: 4 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ ms.service: active-directory
1111
ms.subservice: enterprise-users
1212
ms.workload: identity
1313
ms.topic: how-to
14-
ms.date: 06/24/2022
14+
ms.date: 09/08/2023
1515
ms.author: barclayn
1616
ms.reviewer: jodah
1717
ms.custom: it-pro, has-azure-ad-ps-ref
@@ -71,11 +71,9 @@ For more information on permissions to restore a deleted group, see [Restore a d
7171

7272
## Set group expiration
7373

74-
[!INCLUDE [portal updates](~/articles/active-directory/includes/portal-update.md)]
75-
76-
1. Sign in to the [Azure portal](https://portal.azure.com) with an account that is a Global Administrator in your Azure AD organization.
77-
78-
2. Browse to **Azure Active Directory** > **Groups**, then select **Expiration** to open the expiration settings.
74+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Global Administrator](../roles/permissions-reference.md#global-administrator).
75+
1. Select Microsoft Entra ID (Azure AD).
76+
1. Select **Groups**, **All groups** then select **Expiration** to open the expiration settings.
7977

8078
![Expiration settings for groups](./media/groups-lifecycle/expiration-settings.png)
8179

articles/active-directory/enterprise-users/groups-naming-policy.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: enterprise-users
1010
ms.workload: identity
1111
ms.topic: how-to
12-
ms.date: 06/24/2022
12+
ms.date: 09/08/2023
1313
ms.author: barclayn
1414
ms.reviewer: krbain
1515
ms.custom: it-pro, seo-update-azuread-jan, has-azure-ad-ps-ref
@@ -77,10 +77,10 @@ Some administrator roles are exempted from these policies, across all group work
7777

7878
## Configure naming policy in Azure portal
7979

80-
[!INCLUDE [portal updates](~/articles/active-directory/includes/portal-update.md)]
80+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Groups Administrator](../roles/permissions-reference.md#groups-administrator).
81+
1. Select Microsoft Entra ID (Azure AD).
8182

82-
1. Sign in to the [Azure portal](https://portal.azure.com) with a Group Administrator account.
83-
1. Browse to **Azure Active Directory** > **Groups**, then select **Naming policy** to open the Naming policy page.
83+
1. Select **All groups** > **Groups**, then select **Naming policy** to open the Naming policy page.
8484

8585
![open the Naming policy page in the admin center](./media/groups-naming-policy/policy.png)
8686

0 commit comments

Comments
 (0)