You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
[Security defaults](../fundamentals/concept-fundamentals-security-defaults.md) are great for some but many organizations need more flexibility than they offer. Many organizations need to exclude specific accounts like their emergency access or break-glass administration accounts from Conditional Access policies. The policies referenced in this article can be customized based on organizational needs. Organizations can [use report-only mode for Conditional Access to determine the results of new policy decisions.](concept-conditional-access-report-only.md)
21
-
22
-
## Conditional Access templates (Preview)
23
-
24
-
Conditional Access templates are designed to provide a convenient method to deploy new policies aligned with Microsoft recommendations. These templates are designed to provide maximum protection aligned with commonly used policies across various customer types and locations.
20
+
Conditional Access templates provide a convenient method to deploy new policies aligned with Microsoft recommendations. These templates are designed to provide maximum protection aligned with commonly used policies across various customer types and locations.
25
21
26
22
:::image type="content" source="media/concept-conditional-access-policy-common/conditional-access-policies-azure-ad-listing.png" alt-text="Conditional Access policies and templates in the Azure portal." lightbox="media/concept-conditional-access-policy-common/conditional-access-policies-azure-ad-listing.png":::
27
23
28
-
The 14 policy templates are split into policies that would be assigned to user identities or devices. Find the templates in the **Azure portal** > **Azure Active Directory** > **Security** > **Conditional Access** > **Create new policy from template**.
24
+
There are 14 Conditional Access policy templates, filtered by six different scenarios:
29
25
30
-
Organizations not comfortable allowing Microsoft to create these policies can create them manually by copying the settings from **View policy summary** or use the linked articles to create policies themselves.
26
+
- Secure foundation
27
+
- Zero Trust
28
+
- Remote work
29
+
- Protect administrators
30
+
- Emerging threats
31
+
- All
32
+
33
+
Find the templates in the **Azure portal** > **Azure Active Directory** > **Security** > **Conditional Access** > **New policy from template (Preview)**. Select **Show more** to see all policy templates in each scenario.
31
34
32
35
:::image type="content" source="media/concept-conditional-access-policy-common/create-policy-from-template-identity.png" alt-text="Create a Conditional Access policy from a preconfigured template in the Azure portal." lightbox="media/concept-conditional-access-policy-common/create-policy-from-template-identity.png":::
33
36
34
37
> [!IMPORTANT]
35
-
> Conditional Access template policies will exclude only the user creating the policy from the template. If your organization needs to [exclude other accounts](../roles/security-emergency-access.md) open the policy and modify the excluded users and groups to include them.
38
+
> Conditional Access template policies will exclude only the user creating the policy from the template. If your organization needs to [exclude other accounts](../roles/security-emergency-access.md), you will be able to modify the policy once they are created. Simply navigate to **Azure portal** > **Azure Active Directory** > **Security** > **Conditional Access** > **Policies**, select the policy to open the editor and modify the excluded users and groups to select accounts you want to exclude.
36
39
>
37
40
> By default, each policy is created in [report-only mode](concept-conditional-access-report-only.md), we recommended organizations test and monitor usage, to ensure intended result, before turning each policy on.
38
41
39
-
- Identities
40
-
-[Require multi-factor authentication for admins](howto-conditional-access-policy-admin-mfa.md)\*
41
-
-[Securing security info registration](howto-conditional-access-policy-registration.md)
-[Require approved client apps or app protection](howto-policy-approved-app-or-app-protection.md)
53
-
-[Require compliant or Hybrid Azure AD joined device for administrators](howto-conditional-access-policy-compliant-device-admin.md)
54
-
-[Use application enforced restrictions for unmanaged devices](howto-policy-app-enforced-restriction.md)
42
+
Organizations can select individual policy templates and:
55
43
56
-
> \* These four policies when configured together, provide similar functionality enabled by [security defaults](../fundamentals/concept-fundamentals-security-defaults.md).
44
+
- View a summary of the policy settings.
45
+
- Edit, to customize based on organizational needs.
46
+
- Export the JSON definition for use in programmatic workflows.
47
+
- These JSON definitions can be edited and then imported on the main Conditional Access policies page using the **Import policy file** option.
-[Require multifactor authentication for admins](howto-conditional-access-policy-admin-mfa.md)\*
53
+
-[Require multifactor authentication for all users](howto-conditional-access-policy-all-users-mfa.md)\*
54
+
-[Require multifactor authentication for Azure management](howto-conditional-access-policy-azure-management.md)\*
55
+
56
+
> \* These four policies when configured together, provide similar functionality enabled by [security defaults](../fundamentals/concept-fundamentals-security-defaults.md).
59
57
60
-
*[Block access by location](howto-conditional-access-policy-location.md)
61
-
*[Block access except specific apps](howto-conditional-access-policy-block-access.md)
58
+
-[Block access for unknown or unsupported device platform](howto-policy-unknown-unsupported-device.md)
Copy file name to clipboardExpand all lines: articles/active-directory/conditional-access/concept-conditional-access-users-groups.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -97,7 +97,7 @@ If you do find yourself locked out, see [What to do if you're locked out of the
97
97
98
98
Conditional Access policies that target external users may interfere with service provider access, for example granular delegated admin privileges [Introduction to granular delegated admin privileges (GDAP)](/partner-center/gdap-introduction). For policies that are intended to target service provider tenants, use the **Service provider user** external user type available in the **Guest or external users** selection options.
99
99
100
-
## Workload identities (Preview)
100
+
## Workload identities
101
101
102
102
A workload identity is an identity that allows an application or service principal access to resources, sometimes in the context of a user. Conditional Access policies can be applied to single tenant service principals that have been registered in your tenant. Third party SaaS and multi-tenanted apps are out of scope. Managed identities aren't covered by policy.
title: 'Using a deprecated version of Azure AD Connect'
3
+
description: This article describes what to do if you find that you're running a deprecated version.
4
+
services: active-directory
5
+
author: billmath
6
+
manager: amycolannino
7
+
ms.service: active-directory
8
+
ms.workload: identity
9
+
ms.topic: how-to
10
+
ms.date: 12/05/2022
11
+
ms.subservice: hybrid
12
+
ms.author: billmath
13
+
ms.collection: M365-identity-device-management
14
+
---
15
+
16
+
17
+
18
+
19
+
# Using a deprecated version of Azure AD Connect
20
+
21
+
You may have received a notification email that says that your [Azure AD Connect version is deprecated](whatis-azure-ad-connect-v2.md) and no longer supported. Or, you may have read a portal recommendation about upgrading your Azure AD Connect version. What is next?
22
+
23
+
Using a deprecated and unsupported version of Azure AD Connect isn't recommended and not supported. Deprecated and unsupported versions of Azure AD Connect may **unexpectedly stop working**. In these instances, you may need to install the latest version of Azure AD Connect as your only remedy to restore your sync process.
24
+
25
+
We regularly update Azure AD Connect with [newer versions](reference-connect-version-history.md). The new versions have bug fixes, performance improvements, new functionality, and security fixes, so it's important to stay up to date.
26
+
27
+
## How to replace your deprecated version
28
+
29
+
30
+
If you're still using a deprecated and unsupported version of Azure AD Connect, here's what you should do:
31
+
32
+
1. Verify which version you should install. Most customers no longer need Azure AD Connect and can now use [Azure AD Cloud Sync](../cloud-sync/what-is-cloud-sync.md). Cloud sync is the next generation of sync tools to provision users and groups from AD into Azure AD. It features a lightweight agent and is fully managed from the cloud – and it upgrades to newer versions automatically, so you never have to worry about upgrading again!
33
+
34
+
2. If you're not yet eligible for Azure AD Cloud Sync, please follow this [link to download](https://www.microsoft.com/download/details.aspx?id=47594) and install the latest version of Azure AD Connect. In most cases, upgrading to the latest version will only take a few moments. For more information, see [Upgrading Azure AD Connect from a previous version.](how-to-upgrade-previous-version.md).
35
+
36
+
37
+
## Next steps
38
+
39
+
-[What is Azure AD Connect V2?](whatis-azure-ad-connect-v2.md)
40
+
-[Azure AD Cloud Sync](../cloud-sync/what-is-cloud-sync.md)
41
+
-[Azure AD Connect version history](reference-connect-version-history.md)
Copy file name to clipboardExpand all lines: articles/active-directory/identity-protection/howto-identity-protection-configure-risk-policies.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -129,7 +129,7 @@ If you already have risk policies enabled in Identity Protection, we highly reco
129
129
130
130
### Migrating to Conditional Access
131
131
132
-
1. **Create an equivalent**[user risk-based](#user-risk-policy-in-conditional-access) and [sign-in risk-based ](#sign-in-risk-policy-in-conditional-access) policy in Conditional Access in report-only mode. You can create a policy with the steps above or using [Conditional Access templates](../conditional-access/concept-conditional-access-policy-common.md#common-conditional-access-policies) based on Microsoft's recommendations and your organizational requirements.
132
+
1. **Create an equivalent**[user risk-based](#user-risk-policy-in-conditional-access) and [sign-in risk-based ](#sign-in-risk-policy-in-conditional-access) policy in Conditional Access in report-only mode. You can create a policy with the steps above or using [Conditional Access templates](../conditional-access/concept-conditional-access-policy-common.md) based on Microsoft's recommendations and your organizational requirements.
133
133
1. Ensure that the new Conditional Access risk policy works as expected by testing it in [report-only mode](../conditional-access/howto-conditional-access-insights-reporting.md).
134
134
1. **Enable** the new Conditional Access risk policy. You can choose to have both policies running side-by-side to confirm the new policies are working as expected before turning off the Identity Protection risk policies.
135
135
1. Browse back to **Azure Active Directory** > **Security** > **Conditional Access**.
Azure CNI provides the capability to monitor IP subnet usage. To enable IP subnet usage monitoring, follow the steps below:
249
+
250
+
### Get the YAML file
251
+
1. Download or grep the file named container-azm-ms-agentconfig.yaml from [github][github].
252
+
2. Find azure_subnet_ip_usage in integrations. Set `enabled` to `true`.
253
+
3. Save the file.
254
+
255
+
### Get the AKS credentials
256
+
257
+
Set the variables for subscription, resource group and cluster. Consider the following as examples:
258
+
259
+
```azurepowershell
260
+
261
+
$s="subscriptionId"
262
+
263
+
$rg="resourceGroup"
264
+
265
+
$c="ClusterName"
266
+
267
+
az account set -s $s
268
+
269
+
az aks get-credentials -n $c -g $rg
270
+
271
+
```
272
+
273
+
### Apply the config
274
+
275
+
1. Open terminal in the folder the downloaded container-azm-ms-agentconfig.yaml file is saved.
276
+
2. First, apply the config using the command: `kubectl apply -f container-azm-ms-agentconfig.yaml`
277
+
3. This will restart the pod and after 5-10 minutes, the metrics will be visible.
278
+
4. To view the metrics on the cluster, go to Workbooks on the cluster page in the Azure portal, and find the workbook named "Subnet IP Usage". Your view will look similar to the following:
279
+
280
+
:::image type="content" source="media/Azure-cni/ip-subnet-usage.png" alt-text="A diagram of the Azure portal's workbook blade is shown, and metrics for an AKS cluster's subnet IP usage are displayed.":::
246
281
247
282
## Frequently asked questions
248
283
@@ -311,7 +346,7 @@ Learn more about networking in AKS in the following articles:
0 commit comments