Skip to content

Commit 76b3e76

Browse files
authored
Merge pull request #241058 from MicrosoftDocs/main
6/09/2023 10AM Publishing
2 parents 7aed9ba + 928f819 commit 76b3e76

File tree

220 files changed

+2467
-1649
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

220 files changed

+2467
-1649
lines changed

.openpublishing.redirection.active-directory.json

Lines changed: 36 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -12093,6 +12093,12 @@
1209312093
"redirect_url": "/azure/active-directory/hybrid/connect/how-to-connect-sync-change-serviceacct-pass",
1209412094
"redirect_document_id": false
1209512095
},
12096+
12097+
{
12098+
"source_path_from_root": "/articles/active-directory-b2c/azure-ad-external-identities-videos.md",
12099+
"redirect_url": "/azure/active-directory-b2c/external-identities-videos",
12100+
"redirect_document_id": true
12101+
},
1209612102

1209712103
{
1209812104
"source_path_from_root": "/articles/active-directory/hybrid/how-to-connect-sync-change-the-configuration.md",
@@ -12679,6 +12685,24 @@
1267912685
"redirect_document_id": true
1268012686
},
1268112687

12688+
{
12689+
"source_path_from_root": "/articles/active-directory/standards/azure-ad-pci-dss-guidance.md",
12690+
"redirect_url": "/azure/active-directory/standards/pci-dss-guidance",
12691+
"redirect_document_id": true
12692+
},
12693+
12694+
{
12695+
"source_path_from_root": "/articles/active-directory/standards/azure-ad-pci-dss-mfa.md",
12696+
"redirect_url": "/azure/active-directory/standards/pci-dss-mfa",
12697+
"redirect_document_id": true
12698+
},
12699+
12700+
{
12701+
"source_path_from_root": "/articles/active-directory/standards/hipaa-configure-azure-active-directory-for-compliance.md",
12702+
"redirect_url": "/azure/active-directory/standards/hipaa-configure-for-compliance",
12703+
"redirect_document_id": true
12704+
},
12705+
1268212706
{
1268312707
"source_path_from_root": "/articles/active-directory/fundamentals/secure-with-azure-ad-introduction.md",
1268412708
"redirect_url": "/azure/active-directory/fundamentals/secure-introduction",
@@ -12774,6 +12798,18 @@
1277412798
"redirect_document_id": true
1277512799
},
1277612800

12801+
{
12802+
"source_path_from_root": "/articles/active-directory-b2c/azure-sentinel.md",
12803+
"redirect_url": "/azure/active-directory-b2c/configure-security-analytics-sentinel",
12804+
"redirect_document_id": true
12805+
},
12806+
12807+
{
12808+
"source_path_from_root": "/articles/active-directory-b2c/partner-azure-web-application-firewall.md",
12809+
"redirect_url": "/azure/active-directory-b2c/partner-web-application-firewall",
12810+
"redirect_document_id": true
12811+
},
12812+
1277712813
{
1277812814
"source_path_from_root": "/articles/active-directory/external-identities/customers/microsoft-graph-operations-custom-extensions.md",
1277912815
"redirect_url": "/azure/active-directory/external-identities/customers/microsoft-graph-operations",

.openpublishing.redirection.json

Lines changed: 1 addition & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -9037,22 +9037,7 @@
90379037
"source_path_from_root": "/articles/container-instances/container-instances-quotas.md",
90389038
"redirect_url": "/azure/container-instances/container-instances-resource-and-quota-limits",
90399039
"redirect_document_id": false
9040-
},
9041-
{
9042-
"source_path_from_root": "/articles/container-instances/container-instances-tutorial-deploy-spot-containers-portal.md",
9043-
"redirect_url": "/azure/container-instances/container-instances-overview",
9044-
"redirect_document_id": false
9045-
},
9046-
{
9047-
"source_path_from_root": "/articles/container-instances/container-instances-tutorial-deploy-spot-containers-cli.md",
9048-
"redirect_url": "/azure/container-instances/container-instances-overview",
9049-
"redirect_document_id": false
9050-
},
9051-
{
9052-
"source_path_from_root": "/articles/container-instances/container-instances-spot-containers-overview.md",
9053-
"redirect_url": "/azure/container-instances/container-instances-overview",
9054-
"redirect_document_id": false
9055-
},
9040+
},
90569041
{
90579042
"source_path_from_root": "/articles/container-registry/container-registry-managed-get-started-azure-cli.md",
90589043
"redirect_url": "/azure/container-registry/container-registry-get-started-azure-cli",

articles/active-directory-b2c/TOC.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -555,7 +555,7 @@
555555
- name: Akamai
556556
href: partner-akamai.md
557557
- name: Azure WAF
558-
href: partner-azure-web-application-firewall.md
558+
href: partner-web-application-firewall.md
559559
- name: Cloudflare
560560
href: partner-cloudflare.md
561561
- name: Fraud protection partners
@@ -640,7 +640,7 @@
640640
- name: Azure Monitor
641641
href: azure-monitor.md
642642
- name: Microsoft Sentinel
643-
href: azure-sentinel.md
643+
href: configure-security-analytics-sentinel.md
644644
displayName: log, logs, logging, events, Azure Monitor, Microsoft Sentinel, SIEM, threat hunting, Security, Security Orchestration
645645
- name: Troubleshooting
646646
items:

articles/active-directory-b2c/azure-ad-external-identities-videos.md

Lines changed: 0 additions & 40 deletions
This file was deleted.

articles/active-directory-b2c/conditional-access-technical-profile.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -58,7 +58,7 @@ The **InputClaims** element contains a list of claims to send to Conditional Acc
5858
| UserId | Yes | string | The identifier of the user who signs in. |
5959
| AuthenticationMethodsUsed | Yes |stringCollection | The list of methods the user used to sign in. Possible values: `Password`, and `OneTimePasscode`. |
6060
| IsFederated | Yes |boolean | Indicates whether or not a user signed in with a federated account. The value must be `false`. |
61-
| IsMfaRegistered | Yes |boolean | Indicates whether the user already enrolled a phone number for multi-factor authentication. |
61+
| IsMfaRegistered | Yes |boolean | Indicates whether the user already enrolled a method for multi-factor authentication. If the value is set to `false`, the Conditional Access policy evaluation returns a `block` challenge if action is required. |
6262

6363
The **InputClaimsTransformations** element may contain a collection of **InputClaimsTransformation** elements that are used to modify the input claims or generate new ones before sending them to the Conditional Access service.
6464

articles/active-directory-b2c/azure-sentinel.md renamed to articles/active-directory-b2c/configure-security-analytics-sentinel.md

Lines changed: 12 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -59,12 +59,12 @@ After you configure your Azure AD B2C instance to send logs to Azure Monitor, en
5959
2. Select the subscription where the Log Analytics workspace is created.
6060
3. Search for and select **Microsoft Sentinel**.
6161

62-
![Screenshot of Azure Sentinel entered into the search field and the Azure Sentinel option that appears.](./media/azure-sentinel/azure-sentinel-add.png)
62+
![Screenshot of Azure Sentinel entered into the search field and the Azure Sentinel option that appears.](./media/configure-security-analytics-sentinel/sentinel-add.png)
6363

6464
3. Select **Add**.
6565
4. In the **search workspaces** field, select the new workspace.
6666

67-
![Screenshot of the search workspaces field under Choose a workspace to add to Azure Sentinel.](./media/azure-sentinel/create-new-workspace.png)
67+
![Screenshot of the search workspaces field under Choose a workspace to add to Azure Sentinel.](./media/configure-security-analytics-sentinel/create-new-workspace.png)
6868

6969
5. Select **Add Microsoft Sentinel**.
7070

@@ -89,7 +89,7 @@ Use the following steps to receive notification about two or more unsuccessful,
8989
1. In Microsoft Sentinel, from the left menu, select **Analytics**.
9090
2. On the top bar, select **+ Create** > **Scheduled query rule**.
9191

92-
![Screenshot of the Create option under Analytics.](./media/azure-sentinel/create-scheduled-rule.png)
92+
![Screenshot of the Create option under Analytics.](./media/configure-security-analytics-sentinel/create-scheduled-rule.png)
9393

9494
3. In the Analytics Rule wizard, go to **General**.
9595
4. For **Name**, enter a name for unsuccessful logins.
@@ -98,12 +98,12 @@ Use the following steps to receive notification about two or more unsuccessful,
9898
7. For **Severity**, select a severity level.
9999
8. **Status** is **Enabled** by default. To change a rule, go to the **Active rules** tab.
100100

101-
![Screenshot of Create new rule with options and selections.](./media/azure-sentinel/create-new-rule.png)
101+
![Screenshot of Create new rule with options and selections.](./media/configure-security-analytics-sentinel/create-new-rule.png)
102102

103103
9. Select the **Set rule logic** tab.
104104
10. Enter a query in the **Rule query** field. The query example organizes the sign-ins by `UserPrincipalName`.
105105

106-
![Screenshot of query text in the Rule query field under Set rule logic.](./media/azure-sentinel/rule-query.png)
106+
![Screenshot of query text in the Rule query field under Set rule logic.](./media/configure-security-analytics-sentinel/rule-query.png)
107107

108108
11. Go to **Query scheduling**.
109109
12. For **Run query every**, enter **5** and **Minutes**.
@@ -113,12 +113,12 @@ Use the following steps to receive notification about two or more unsuccessful,
113113
16. For **Stop running query after alert is generated**, select **Off**.
114114
17. Select **Next: Incident settings (Preview)**.
115115

116-
![Screenshot of Query scheduling selections and options.](./media/azure-sentinel/query-scheduling.png)
116+
![Screenshot of Query scheduling selections and options.](./media/configure-security-analytics-sentinel/query-scheduling.png)
117117

118118
18. Go to the **Review and create** tab to review rule settings.
119119
19. When the **Validation passed** banner appears, select **Create**.
120120

121-
![Screenshot of selected settings, the Validation passed banner, and the Create option.](./media/azure-sentinel/review-create.png)
121+
![Screenshot of selected settings, the Validation passed banner, and the Create option.](./media/configure-security-analytics-sentinel/review-create.png)
122122

123123
#### View a rule and related incidents
124124

@@ -130,7 +130,7 @@ View the rule and the incidents it generates. Find your newly created custom rul
130130

131131
You can edit, enable, disable, or delete the rule.
132132

133-
![Screenshot of active rules with Enable, Disable, Delete, and Edit options.](./media/azure-sentinel/rule-crud.png)
133+
![Screenshot of active rules with Enable, Disable, Delete, and Edit options.](./media/configure-security-analytics-sentinel/rule-crud.png)
134134

135135
#### Triage, investigate, and remediate incidents
136136

@@ -142,17 +142,17 @@ Learn more: [Investigate incidents with Microsoft Sentinel](../sentinel/investig
142142
2. Select an incident.
143143
3. On the right, detailed incident information appears, including severity, entities, events, and the incident ID.
144144

145-
![Screenshot that shows incident information.](./media/azure-sentinel/select-incident.png)
145+
![Screenshot that shows incident information.](./media/configure-security-analytics-sentinel/select-incident.png)
146146

147147
4. On the **Incidents** pane, elect **View full details**.
148148
5. Review tabs that summarize the incident.
149149

150-
![Screenshot of a list of incidents.](./media/azure-sentinel/full-details.png)
150+
![Screenshot of a list of incidents.](./media/configure-security-analytics-sentinel/full-details.png)
151151

152152
6. Select **Evidence** > **Events** > **Link to Log Analytics**.
153153
7. In the results, see the identity `UserPrincipalName` value attempting sign-in.
154154

155-
![Screenshot of incident details.](./media/azure-sentinel/logs.png)
155+
![Screenshot of incident details.](./media/configure-security-analytics-sentinel/logs.png)
156156

157157
## Automated response
158158

@@ -170,7 +170,7 @@ For this task, use a playbook from the Microsoft Sentinel GitHub repository.
170170

171171
Learn more: [Incident-Email-Notification](https://github.com/Azure/Azure-Sentinel/tree/master/Playbooks/Incident-Email-Notification)
172172

173-
![Screenshot of automated response options for a rule.](./media/azure-sentinel/automation-tab.png)
173+
![Screenshot of automated response options for a rule.](./media/configure-security-analytics-sentinel/automation-tab.png)
174174

175175
## Resources
176176

articles/active-directory-b2c/custom-domain.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -352,7 +352,7 @@ After you add the custom domain and configure your application, users will still
352352

353353
## (Optional) Azure Front Door advanced configuration
354354

355-
You can use Azure Front Door advanced configuration, such as [Azure Web Application Firewall (WAF)](partner-azure-web-application-firewall.md). Azure WAF provides centralized protection of your web applications from common exploits and vulnerabilities.
355+
You can use Azure Front Door advanced configuration, such as [Azure Web Application Firewall (WAF)](partner-web-application-firewall.md). Azure WAF provides centralized protection of your web applications from common exploits and vulnerabilities.
356356

357357
When using custom domains, consider the following points:
358358

0 commit comments

Comments
 (0)