Skip to content

Commit 7829812

Browse files
authored
Merge pull request #220495 from MicrosoftDocs/main
12/05 AM Publish
2 parents e2f3c12 + f1b4ed7 commit 7829812

File tree

139 files changed

+1486
-813
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

139 files changed

+1486
-813
lines changed

articles/active-directory/conditional-access/concept-conditional-access-policy-common.md

Lines changed: 42 additions & 36 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,12 @@
11
---
2-
title: Common Conditional Access policies - Azure Active Directory
3-
description: Commonly used Conditional Access policies for organizations
2+
title: Conditional Access templates - Azure Active Directory
3+
description: Deploy commonly used Conditional Access policies with templates
44

55
services: active-directory
66
ms.service: active-directory
77
ms.subservice: conditional-access
88
ms.topic: conceptual
9-
ms.date: 08/22/2022
9+
ms.date: 11/29/2022
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -15,57 +15,63 @@ ms.reviewer: calebb, lhuangnorth
1515

1616
ms.collection: M365-identity-device-management
1717
---
18-
# Common Conditional Access policies
18+
# Conditional Access templates (Preview)
1919

20-
[Security defaults](../fundamentals/concept-fundamentals-security-defaults.md) are great for some but many organizations need more flexibility than they offer. Many organizations need to exclude specific accounts like their emergency access or break-glass administration accounts from Conditional Access policies. The policies referenced in this article can be customized based on organizational needs. Organizations can [use report-only mode for Conditional Access to determine the results of new policy decisions.](concept-conditional-access-report-only.md)
21-
22-
## Conditional Access templates (Preview)
23-
24-
Conditional Access templates are designed to provide a convenient method to deploy new policies aligned with Microsoft recommendations. These templates are designed to provide maximum protection aligned with commonly used policies across various customer types and locations.
20+
Conditional Access templates provide a convenient method to deploy new policies aligned with Microsoft recommendations. These templates are designed to provide maximum protection aligned with commonly used policies across various customer types and locations.
2521

2622
:::image type="content" source="media/concept-conditional-access-policy-common/conditional-access-policies-azure-ad-listing.png" alt-text="Conditional Access policies and templates in the Azure portal." lightbox="media/concept-conditional-access-policy-common/conditional-access-policies-azure-ad-listing.png":::
2723

28-
The 14 policy templates are split into policies that would be assigned to user identities or devices. Find the templates in the **Azure portal** > **Azure Active Directory** > **Security** > **Conditional Access** > **Create new policy from template**.
24+
There are 14 Conditional Access policy templates, filtered by six different scenarios:
2925

30-
Organizations not comfortable allowing Microsoft to create these policies can create them manually by copying the settings from **View policy summary** or use the linked articles to create policies themselves.
26+
- Secure foundation
27+
- Zero Trust
28+
- Remote work
29+
- Protect administrators
30+
- Emerging threats
31+
- All
32+
33+
Find the templates in the **Azure portal** > **Azure Active Directory** > **Security** > **Conditional Access** > **New policy from template (Preview)**. Select **Show more** to see all policy templates in each scenario.
3134

3235
:::image type="content" source="media/concept-conditional-access-policy-common/create-policy-from-template-identity.png" alt-text="Create a Conditional Access policy from a preconfigured template in the Azure portal." lightbox="media/concept-conditional-access-policy-common/create-policy-from-template-identity.png":::
3336

3437
> [!IMPORTANT]
35-
> Conditional Access template policies will exclude only the user creating the policy from the template. If your organization needs to [exclude other accounts](../roles/security-emergency-access.md) open the policy and modify the excluded users and groups to include them.
38+
> Conditional Access template policies will exclude only the user creating the policy from the template. If your organization needs to [exclude other accounts](../roles/security-emergency-access.md), you will be able to modify the policy once they are created. Simply navigate to **Azure portal** > **Azure Active Directory** > **Security** > **Conditional Access** > **Policies**, select the policy to open the editor and modify the excluded users and groups to select accounts you want to exclude.
3639
>
3740
> By default, each policy is created in [report-only mode](concept-conditional-access-report-only.md), we recommended organizations test and monitor usage, to ensure intended result, before turning each policy on.
3841
39-
- Identities
40-
- [Require multi-factor authentication for admins](howto-conditional-access-policy-admin-mfa.md)\*
41-
- [Securing security info registration](howto-conditional-access-policy-registration.md)
42-
- [Block legacy authentication](howto-conditional-access-policy-block-legacy.md)\*
43-
- [Require multi-factor authentication for all users](howto-conditional-access-policy-all-users-mfa.md)\*
44-
- [Require multi-factor authentication for guest access](howto-policy-guest-mfa.md)
45-
- [Require multi-factor authentication for Azure management](howto-conditional-access-policy-azure-management.md)\*
46-
- [Require multi-factor authentication for risky sign-in](howto-conditional-access-policy-risk.md) **Requires Azure AD Premium P2**
47-
- [Require password change for high-risk users](howto-conditional-access-policy-risk-user.md) **Requires Azure AD Premium P2**
48-
- Devices
49-
- [Require compliant or hybrid Azure AD joined device or multifactor authentication for all users](howto-conditional-access-policy-compliant-device.md)
50-
- [Block access for unknown or unsupported device platform](howto-policy-unknown-unsupported-device.md)
51-
- [No persistent browser session](howto-policy-persistent-browser-session.md)
52-
- [Require approved client apps or app protection](howto-policy-approved-app-or-app-protection.md)
53-
- [Require compliant or Hybrid Azure AD joined device for administrators](howto-conditional-access-policy-compliant-device-admin.md)
54-
- [Use application enforced restrictions for unmanaged devices](howto-policy-app-enforced-restriction.md)
42+
Organizations can select individual policy templates and:
5543

56-
> \* These four policies when configured together, provide similar functionality enabled by [security defaults](../fundamentals/concept-fundamentals-security-defaults.md).
44+
- View a summary of the policy settings.
45+
- Edit, to customize based on organizational needs.
46+
- Export the JSON definition for use in programmatic workflows.
47+
- These JSON definitions can be edited and then imported on the main Conditional Access policies page using the **Import policy file** option.
5748

58-
### Other policies
49+
## Conditional Access template policies
50+
51+
- [Block legacy authentication](howto-conditional-access-policy-block-legacy.md)\*
52+
- [Require multifactor authentication for admins](howto-conditional-access-policy-admin-mfa.md)\*
53+
- [Require multifactor authentication for all users](howto-conditional-access-policy-all-users-mfa.md)\*
54+
- [Require multifactor authentication for Azure management](howto-conditional-access-policy-azure-management.md)\*
55+
56+
> \* These four policies when configured together, provide similar functionality enabled by [security defaults](../fundamentals/concept-fundamentals-security-defaults.md).
5957
60-
* [Block access by location](howto-conditional-access-policy-location.md)
61-
* [Block access except specific apps](howto-conditional-access-policy-block-access.md)
58+
- [Block access for unknown or unsupported device platform](howto-policy-unknown-unsupported-device.md)
59+
- [No persistent browser session](howto-policy-persistent-browser-session.md)
60+
- [Require approved client apps or app protection](howto-policy-approved-app-or-app-protection.md)
61+
- [Require compliant or hybrid Azure AD joined device or multifactor authentication for all users](howto-conditional-access-policy-compliant-device.md)
62+
- [Require compliant or Hybrid Azure AD joined device for administrators](howto-conditional-access-policy-compliant-device-admin.md)
63+
- [Require multi-factor authentication for risky sign-in](howto-conditional-access-policy-risk.md) **Requires Azure AD Premium P2**
64+
- [Require multifactor authentication for guest access](howto-policy-guest-mfa.md)
65+
- [Require password change for high-risk users](howto-conditional-access-policy-risk-user.md) **Requires Azure AD Premium P2**
66+
- [Securing security info registration](howto-conditional-access-policy-registration.md)
67+
- [Use application enforced restrictions for unmanaged devices](howto-policy-app-enforced-restriction.md)
6268

63-
## Emergency access accounts
69+
## Other common policies
6470

65-
More information about emergency access accounts and why they're important can be found in the following articles:
71+
- [Block access by location](howto-conditional-access-policy-location.md)
72+
- [Block access except specific apps](howto-conditional-access-policy-block-access.md)
6673

67-
* [Manage emergency access accounts in Azure AD](../roles/security-emergency-access.md)
68-
* [Create a resilient access control management strategy with Azure Active Directory](../authentication/concept-resilient-controls.md)
74+
[!INCLUDE [active-directory-policy-exclusions](../../../includes/active-directory-policy-exclude-user.md)]
6975

7076
## Next steps
7177

articles/active-directory/conditional-access/concept-conditional-access-users-groups.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -97,7 +97,7 @@ If you do find yourself locked out, see [What to do if you're locked out of the
9797

9898
Conditional Access policies that target external users may interfere with service provider access, for example granular delegated admin privileges [Introduction to granular delegated admin privileges (GDAP)](/partner-center/gdap-introduction). For policies that are intended to target service provider tenants, use the **Service provider user** external user type available in the **Guest or external users** selection options.
9999

100-
## Workload identities (Preview)
100+
## Workload identities
101101

102102
A workload identity is an identity that allows an application or service principal access to resources, sometimes in the context of a user. Conditional Access policies can be applied to single tenant service principals that have been registered in your tenant. Third party SaaS and multi-tenanted apps are out of scope. Managed identities aren't covered by policy.
103103

Loading
Loading

articles/active-directory/hybrid/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -141,6 +141,8 @@
141141
href: how-to-connect-post-installation.md
142142
- name: Uninstall Azure AD Connect
143143
href: how-to-connect-uninstall.md
144+
- name: Using a deprecated version
145+
href: deprecated-azure-ad-connect.md
144146
- name: Plan and design
145147
items:
146148
- name: Design concepts
Lines changed: 41 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,41 @@
1+
---
2+
title: 'Using a deprecated version of Azure AD Connect'
3+
description: This article describes what to do if you find that you're running a deprecated version.
4+
services: active-directory
5+
author: billmath
6+
manager: amycolannino
7+
ms.service: active-directory
8+
ms.workload: identity
9+
ms.topic: how-to
10+
ms.date: 12/05/2022
11+
ms.subservice: hybrid
12+
ms.author: billmath
13+
ms.collection: M365-identity-device-management
14+
---
15+
16+
17+
18+
19+
# Using a deprecated version of Azure AD Connect
20+
21+
You may have received a notification email that says that your [Azure AD Connect version is deprecated](whatis-azure-ad-connect-v2.md) and no longer supported. Or, you may have read a portal recommendation about upgrading your Azure AD Connect version. What is next?
22+
23+
Using a deprecated and unsupported version of Azure AD Connect isn't recommended and not supported. Deprecated and unsupported versions of Azure AD Connect may **unexpectedly stop working**. In these instances, you may need to install the latest version of Azure AD Connect as your only remedy to restore your sync process.
24+
25+
We regularly update Azure AD Connect with [newer versions](reference-connect-version-history.md). The new versions have bug fixes, performance improvements, new functionality, and security fixes, so it's important to stay up to date.
26+
27+
## How to replace your deprecated version
28+
29+
30+
If you're still using a deprecated and unsupported version of Azure AD Connect, here's what you should do:
31+
32+
1. Verify which version you should install. Most customers no longer need Azure AD Connect and can now use [Azure AD Cloud Sync](../cloud-sync/what-is-cloud-sync.md). Cloud sync is the next generation of sync tools to provision users and groups from AD into Azure AD. It features a lightweight agent and is fully managed from the cloud – and it upgrades to newer versions automatically, so you never have to worry about upgrading again!
33+
34+
2. If you're not yet eligible for Azure AD Cloud Sync, please follow this [link to download](https://www.microsoft.com/download/details.aspx?id=47594) and install the latest version of Azure AD Connect. In most cases, upgrading to the latest version will only take a few moments. For more information, see [Upgrading Azure AD Connect from a previous version.](how-to-upgrade-previous-version.md).
35+
36+
37+
## Next steps
38+
39+
- [What is Azure AD Connect V2?](whatis-azure-ad-connect-v2.md)
40+
- [Azure AD Cloud Sync](../cloud-sync/what-is-cloud-sync.md)
41+
- [Azure AD Connect version history](reference-connect-version-history.md)

articles/active-directory/identity-protection/howto-identity-protection-configure-risk-policies.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -129,7 +129,7 @@ If you already have risk policies enabled in Identity Protection, we highly reco
129129

130130
### Migrating to Conditional Access
131131

132-
1. **Create an equivalent** [user risk-based](#user-risk-policy-in-conditional-access) and [sign-in risk-based ](#sign-in-risk-policy-in-conditional-access) policy in Conditional Access in report-only mode. You can create a policy with the steps above or using [Conditional Access templates](../conditional-access/concept-conditional-access-policy-common.md#common-conditional-access-policies) based on Microsoft's recommendations and your organizational requirements.
132+
1. **Create an equivalent** [user risk-based](#user-risk-policy-in-conditional-access) and [sign-in risk-based ](#sign-in-risk-policy-in-conditional-access) policy in Conditional Access in report-only mode. You can create a policy with the steps above or using [Conditional Access templates](../conditional-access/concept-conditional-access-policy-common.md) based on Microsoft's recommendations and your organizational requirements.
133133
1. Ensure that the new Conditional Access risk policy works as expected by testing it in [report-only mode](../conditional-access/howto-conditional-access-insights-reporting.md).
134134
1. **Enable** the new Conditional Access risk policy. You can choose to have both policies running side-by-side to confirm the new policies are working as expected before turning off the Identity Protection risk policies.
135135
1. Browse back to **Azure Active Directory** > **Security** > **Conditional Access**.

articles/aks/configure-azure-cni.md

Lines changed: 36 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -243,6 +243,41 @@ az aks nodepool add --cluster-name $clusterName -g $resourceGroup -n newnodepoo
243243
--pod-subnet-id /subscriptions/$subscription/resourceGroups/$resourceGroup/providers/Microsoft.Network/virtualNetworks/$vnet/subnets/pod2subnet \
244244
--no-wait
245245
```
246+
## Monitor IP subnet usage
247+
248+
Azure CNI provides the capability to monitor IP subnet usage. To enable IP subnet usage monitoring, follow the steps below:
249+
250+
### Get the YAML file
251+
1. Download or grep the file named container-azm-ms-agentconfig.yaml from [github][github].
252+
2. Find azure_subnet_ip_usage in integrations. Set `enabled` to `true`.
253+
3. Save the file.
254+
255+
### Get the AKS credentials
256+
257+
Set the variables for subscription, resource group and cluster. Consider the following as examples:
258+
259+
```azurepowershell
260+
261+
$s="subscriptionId"
262+
263+
$rg="resourceGroup"
264+
265+
$c="ClusterName"
266+
267+
az account set -s $s
268+
269+
az aks get-credentials -n $c -g $rg
270+
271+
```
272+
273+
### Apply the config
274+
275+
1. Open terminal in the folder the downloaded container-azm-ms-agentconfig.yaml file is saved.
276+
2. First, apply the config using the command: `kubectl apply -f container-azm-ms-agentconfig.yaml`
277+
3. This will restart the pod and after 5-10 minutes, the metrics will be visible.
278+
4. To view the metrics on the cluster, go to Workbooks on the cluster page in the Azure portal, and find the workbook named "Subnet IP Usage". Your view will look similar to the following:
279+
280+
:::image type="content" source="media/Azure-cni/ip-subnet-usage.png" alt-text="A diagram of the Azure portal's workbook blade is shown, and metrics for an AKS cluster's subnet IP usage are displayed.":::
246281

247282
## Frequently asked questions
248283

@@ -311,7 +346,7 @@ Learn more about networking in AKS in the following articles:
311346
[portal]: https://portal.azure.com
312347
[cni-networking]: https://github.com/Azure/azure-container-networking/blob/master/docs/cni.md
313348
[kubenet]: concepts-network.md#kubenet-basic-networking
314-
349+
[github]: https://raw.githubusercontent.com/microsoft/Docker-Provider/ci_prod/kubernetes/container-azm-ms-agentconfig.yaml
315350

316351
<!-- LINKS - Internal -->
317352
[az-aks-create]: /cli/azure/aks#az_aks_create

articles/aks/kubernetes-action.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -164,7 +164,7 @@ jobs:
164164
manifests: |
165165
azure-vote-all-in-one-redis.yaml
166166
images: '${{ secrets.registry }}.azurecr.io/${{ secrets.repository }}/azure-vote-front:${{ github.sha }}'
167-
pull: false
167+
pull-images: false
168168
```
169169
170170
> [!IMPORTANT]
121 KB
Loading

0 commit comments

Comments
 (0)