Skip to content

Commit 78507a3

Browse files
authored
Merge pull request #179844 from MicrosoftDocs/master
Merge master to live, 4 AM
2 parents c7d4ba5 + 16b79cd commit 78507a3

File tree

109 files changed

+1675
-756
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

109 files changed

+1675
-756
lines changed

.openpublishing.redirection.defender-for-cloud.json

Lines changed: 100 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,15 @@
11
{
22
"redirections": [
3+
{
4+
"source_path_from_root": "/articles/security-center/release-notes.md",
5+
"redirect_url": "/azure/defender-for-cloud/release-notes",
6+
"redirect_document_id": false
7+
},
8+
{
9+
"source_path_from_root": "/articles/security-center/release-notes-archive.md",
10+
"redirect_url": "/azure/defender-for-cloud/release-notes-archive",
11+
"redirect_document_id": false
12+
},
313
{
414
"source_path_from_root": "/articles/security-center/azure-defender.md",
515
"redirect_url": "/azure/defender-for-cloud/defender-for-cloud-introduction",
@@ -35,6 +45,11 @@
3545
"redirect_url": "/azure/defender-for-cloud/just-in-time-access-overview",
3646
"redirect_document_id": false
3747
},
48+
{
49+
"source_path_from_root": "/articles/security-center/apply-security-baseline.md",
50+
"redirect_url": "/azure/defender-for-cloud/apply-security-baseline",
51+
"redirect_document_id": false
52+
},
3853
{
3954
"source_path_from_root": "/articles/security-center/security-center-adaptive-application.md",
4055
"redirect_url": "/azure/defender-for-cloud/adaptive-application-controls",
@@ -105,11 +120,21 @@
105120
"redirect_url": "/azure/defender-for-cloud/threat-intelligence-reports",
106121
"redirect_document_id": false
107122
},
123+
{
124+
"source_path_from_root": "/articles/security-center/threat-intelligence-reports.md",
125+
"redirect_url": "/azure/defender-for-cloud/threat-intelligence-reports",
126+
"redirect_document_id": false
127+
},
108128
{
109129
"source_path_from_root": "/articles/security-center/security-center-data-security.md",
110130
"redirect_url": "/azure/defender-for-cloud/data-security",
111131
"redirect_document_id": false
112132
},
133+
{
134+
"source_path_from_root": "/articles/security-center/data-security.md",
135+
"redirect_url": "/azure/defender-for-cloud/data-security",
136+
"redirect_document_id": false
137+
},
113138
{
114139
"source_path_from_root": "/articles/security-center/security-center-remediate-recommendations.md",
115140
"redirect_url": "/azure/defender-for-cloud/implement-security-recommendations",
@@ -120,11 +145,21 @@
120145
"redirect_url": "/azure/defender-for-cloud/permissions",
121146
"redirect_document_id": false
122147
},
148+
{
149+
"source_path_from_root": "/articles/security-center/tenant-wide-permissions-management.md",
150+
"redirect_url": "/azure/defender-for-cloud/tenant-wide-permissions-management",
151+
"redirect_document_id": false
152+
},
123153
{
124154
"source_path_from_root": "/articles/security-center/security-center-cross-tenant-management.md",
125155
"redirect_url": "/azure/defender-for-cloud/cross-tenant-management",
126156
"redirect_document_id": false
127157
},
158+
{
159+
"source_path_from_root": "/articles/security-center/cross-tenant-management.md",
160+
"redirect_url": "/azure/defender-for-cloud/cross-tenant-management",
161+
"redirect_document_id": false
162+
},
128163
{
129164
"source_path_from_root": "/articles/security-center/security-center-management-groups.md",
130165
"redirect_url": "/azure/defender-for-cloud/management-groups-roles",
@@ -140,6 +175,11 @@
140175
"redirect_url": "/azure/defender-for-cloud/troubleshooting-guide",
141176
"redirect_document_id": false
142177
},
178+
{
179+
"source_path_from_root": "/articles/security-center/troubleshooting-guide.md",
180+
"redirect_url": "/azure/defender-for-cloud/troubleshooting-guide",
181+
"redirect_document_id": false
182+
},
143183
{
144184
"source_path_from_root": "/articles/security-center/security-center-endpoint-protection.md",
145185
"redirect_url": "/azure/defender-for-cloud/endpoint-protection-recommendations-technical",
@@ -195,6 +235,11 @@
195235
"redirect_url": "/azure/defender-for-cloud/enable-data-collection",
196236
"redirect_document_id": false
197237
},
238+
{
239+
"source_path_from_root": "/articles/security-center/features-paas.md",
240+
"redirect_url": "/azure/defender-for-cloud/features-paas",
241+
"redirect_document_id": false
242+
},
198243
{
199244
"source_path_from_root": "/articles/security-center/security-center-alerts-overview.md",
200245
"redirect_url": "/azure/defender-for-cloud/alerts-overview",
@@ -205,6 +250,21 @@
205250
"redirect_url": "/azure/defender-for-cloud/alert-validation",
206251
"redirect_document_id": false
207252
},
253+
{
254+
"source_path_from_root": "/articles/security-center/alert-validation.md",
255+
"redirect_url": "/azure/defender-for-cloud/alert-validation",
256+
"redirect_document_id": false
257+
},
258+
{
259+
"source_path_from_root": "/articles/security-center/incidents.md",
260+
"redirect_url": "/azure/defender-for-cloud/incidents",
261+
"redirect_document_id": false
262+
},
263+
{
264+
"source_path_from_root": "/articles/security-center/implement-security-recommendations.md",
265+
"redirect_url": "/azure/defender-for-cloud/implement-security-recommendations",
266+
"redirect_document_id": false
267+
},
208268
{
209269
"source_path_from_root": "/articles/security-center/security-center-provide-security-contact-details.md",
210270
"redirect_url": "/azure/defender-for-cloud/configure-email-notifications",
@@ -235,6 +295,11 @@
235295
"redirect_url": "/azure/defender-for-cloud/alerts-overview",
236296
"redirect_document_id": true
237297
},
298+
{
299+
"source_path_from_root": "/articles/security-center/alerts-schemas.md",
300+
"redirect_url": "/azure/defender-for-cloud/alerts-schemas",
301+
"redirect_document_id": true
302+
},
238303
{
239304
"source_path_from_root": "/articles/security-center/alerts-reference.md",
240305
"redirect_url": "/azure/defender-for-cloud/alerts-reference",
@@ -410,11 +475,6 @@
410475
"redirect_url": "/azure/defender-for-cloud/harden-docker-hosts",
411476
"redirect_document_id": true
412477
},
413-
{
414-
"source_path_from_root": "/articles/security-center/implement-security-recommendations.md",
415-
"redirect_url": "/azure/defender-for-cloud/implement-security-recommendations",
416-
"redirect_document_id": true
417-
},
418478
{
419479
"source_path_from_root": "/articles/security-center/index.yml",
420480
"redirect_url": "/azure/defender-for-cloud/index",
@@ -485,6 +545,16 @@
485545
"redirect_url": "/azure/defender-for-cloud/quickstart-onboard-aws",
486546
"redirect_document_id": true
487547
},
548+
{
549+
"source_path_from_root": "/articles/security-center/auto-deploy-vulnerability-assessment.md",
550+
"redirect_url": "/azure/defender-for-cloud/auto-deploy-vulnerability-assessment",
551+
"redirect_document_id": true
552+
},
553+
{
554+
"source_path_from_root": "/articles/security-center/security-policy-concept.md",
555+
"redirect_url": "/azure/defender-for-cloud/security-policy-concept",
556+
"redirect_document_id": true
557+
},
488558
{
489559
"source_path_from_root": "/articles/security-center/quickstart-onboard-gcp.md",
490560
"redirect_url": "/azure/defender-for-cloud/quickstart-onboard-gcp",
@@ -515,6 +585,11 @@
515585
"redirect_url": "/azure/defender-for-cloud/secure-score-security-controls",
516586
"redirect_document_id": true
517587
},
588+
{
589+
"source_path_from_root": "/articles/security-center/secure-score-access-and-track.md",
590+
"redirect_url": "/azure/defender-for-cloud/secure-score-access-and-track",
591+
"redirect_document_id": true
592+
},
518593
{
519594
"source_path_from_root": "/articles/security-center/security-center-planning-and-operations-guide.md",
520595
"redirect_url": "/azure/defender-for-cloud/security-center-planning-and-operations-guide",
@@ -530,11 +605,31 @@
530605
"redirect_url": "/azure/defender-for-cloud/supported-machines-endpoint-solutions-clouds",
531606
"redirect_document_id": true
532607
},
608+
{
609+
"source_path_from_root": "/articles/security-center/tutorial-protect-resources.md",
610+
"redirect_url": "/azure/defender-for-cloud/tutorial-protect-resources",
611+
"redirect_document_id": true
612+
},
613+
{
614+
"source_path_from_root": "/articles/security-center/tutorial-security-incident.md",
615+
"redirect_url": "/azure/defender-for-cloud/tutorial-security-incident",
616+
"redirect_document_id": true
617+
},
533618
{
534619
"source_path_from_root": "/articles/security-center/tutorial-security-policy.md",
535620
"redirect_url": "/azure/defender-for-cloud/tutorial-security-policy",
536621
"redirect_document_id": true
537622
},
623+
{
624+
"source_path_from_root": "/articles/security-center/update-regulatory-compliance-packages.md",
625+
"redirect_url": "/azure/defender-for-cloud/update-regulatory-compliance-packages",
626+
"redirect_document_id": true
627+
},
628+
{
629+
"source_path_from_root": "/articles/security-center/windows-admin-center-integration.md",
630+
"redirect_url": "/azure/defender-for-cloud/windows-admin-center-integration",
631+
"redirect_document_id": true
632+
},
538633
{
539634
"source_path_from_root": "/articles/security-center/workflow-automation.md",
540635
"redirect_url": "/azure/defender-for-cloud/workflow-automation",

articles/active-directory/authentication/concepts-azure-multi-factor-authentication-prompts-session-lifetime.md

Lines changed: 8 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: multi-factor-authentication
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 08/12/2021
9+
ms.date: 11/12/2021
1010

1111
ms.author: justinha
1212
author: justinha
@@ -16,7 +16,7 @@ ms.collection: M365-identity-device-management
1616
---
1717
# Optimize reauthentication prompts and understand session lifetime for Azure AD Multi-Factor Authentication
1818

19-
Azure Active Directory (Azure AD) has multiple settings that determine how often users need to reauthenticate. This reauthentication could be with a first factor such as password, FIDO, or passwordless Microsoft Authenticator, or to perform multi-factor authentication (MFA). You can configure these reauthentication settings as needed for your own environment and the user experience you want.
19+
Azure Active Directory (Azure AD) has multiple settings that determine how often users need to reauthenticate. This reauthentication could be with a first factor such as password, FIDO, or passwordless Microsoft Authenticator, or to perform multifactor authentication (MFA). You can configure these reauthentication settings as needed for your own environment and the user experience you want.
2020

2121
The Azure AD default configuration for user sign-in frequency is a rolling window of 90 days. Asking users for credentials often seems like a sensible thing to do, but it can backfire. If users are trained to enter their credentials without thinking, they can unintentionally supply them to a malicious credential prompt.
2222

@@ -96,15 +96,19 @@ This setting allows configuration of lifetime for token issued by Azure Active D
9696

9797
## Review your tenant configuration
9898

99-
Now that you understand how different settings works and the recommended configuration, it's time to check your tenants configuration and make changes accordingly:
99+
Now that you understand how different settings works and the recommended configuration, it's time to check your tenants. You can start by looking at the sign-in logs to understand which session lifetime policies were applied during sign-in.
100+
101+
Under each sign-in log, go to the **Authentication Details** tab and explore **Session Lifetime Policies Applied**. For more information, see [Authentication details](../reports-monitoring/concept-sign-ins.md#authentication-details).
102+
103+
![Screenshot of authentication details.](./media/concepts-azure-multi-factor-authentication-prompts-session-lifetime/details.png)
100104

101105
To configure or review the *Remain signed-in* option, complete the following steps:
102106

103107
1. In the Azure AD portal, search for and select *Azure Active Directory*.
104108
1. Select **Company Branding**, then for each locale, choose **Show option to remain signed in**.
105109
1. Choose *Yes*, then select **Save**.
106110

107-
To remember Multi-factor authentication settings on trusted devices, complete the following steps:
111+
To remember multifactor authentication settings on trusted devices, complete the following steps:
108112

109113
1. In the Azure AD portal, search for and select *Azure Active Directory*.
110114
1. Select **Security**, then **MFA**.

articles/active-directory/authentication/howto-authentication-use-email-signin.md

Lines changed: 12 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,9 @@ Some organizations haven't moved to hybrid authentication for the following reas
2727
* Changing the Azure AD UPN creates a mismatch between on-premises and Azure AD environments that could cause problems with certain applications and services.
2828
* Due to business or compliance reasons, the organization doesn't want to use the on-premises UPN to sign in to Azure AD.
2929

30-
To help with the move to hybrid authentication, you can configure Azure AD to let users sign in with their email as an alternate login ID. For example, if *Contoso* rebranded to *Fabrikam*, rather than continuing to sign in with the legacy `[email protected]` UPN, email as an alternate login ID can be used. To access an application or service, users would sign in to Azure AD using their non-UPN email, such as `[email protected]`.
30+
To help with the move to hybrid authentication, you can configure Azure AD to let users sign in with their email as an alternate login ID. For example, if *Contoso* rebranded to *Fabrikam*, rather than continuing to sign in with the legacy `[email protected]` UPN, email as an alternate login ID can be used. To access an application or service, users would sign in to Azure AD using their non-UPN email, such as `[email protected]`.
31+
32+
![Diagram of email as an alternate login ID.](media/howto-authentication-use-email-signin/email-alternate-login-id.png)
3133

3234
This article shows you how to enable and use email as an alternate login ID.
3335

@@ -36,7 +38,7 @@ This article shows you how to enable and use email as an alternate login ID.
3638
Here's what you need to know about email as an alternate login ID:
3739

3840
* The feature is available in Azure AD Free edition and higher.
39-
* The feature enables sign-in with verified domain *ProxyAddresses* for cloud-authenticated Azure AD users.
41+
* The feature enables sign-in with *ProxyAddresses*, in addition to UPN, for cloud-authenticated Azure AD users. More on how this applies to Azure AD B2B scenarios in the [B2B](#b2b-guest-user-sign-in-with-an-email-address) section.
4042
* When a user signs in with a non-UPN email, the `unique_name` and `preferred_username` claims (if present) in the [ID token](../develop/id-tokens.md) will return the non-UPN email.
4143
* The feature supports managed authentication with Password Hash Sync (PHS) or Pass-Through Authentication (PTA).
4244
* There are two options for configuring the feature:
@@ -54,8 +56,7 @@ In the current preview state, the following limitations apply to email as an alt
5456

5557
* **Unsupported flows** - Some flows are currently not compatible with non-UPN emails, such as the following:
5658
* Identity Protection doesn't match non-UPN emails with *Leaked Credentials* risk detection. This risk detection uses the UPN to match credentials that have been leaked. For more information, see [Azure AD Identity Protection risk detection and remediation][identity-protection].
57-
* B2B invites sent to a non-UPN email are not fully supported. After accepting an invite sent to a non-UPN email, sign-in with the non-UPN email may not work for the guest user on the resource tenant endpoint.
58-
* When a user is signed-in with a non-UPN email, they cannot change their password. Azure AD self-service password reset (SSPR) should work as expected. During SSPR, the user may see their UPN if they verify their identity via alternate email.
59+
* When a user is signed-in with a non-UPN email, they cannot change their password. Azure AD self-service password reset (SSPR) should work as expected. During SSPR, the user may see their UPN if they verify their identity using a non-UPN email.
5960

6061
* **Unsupported scenarios** - The following scenarios are not supported. Sign-in with non-UPN email for:
6162
* [Hybrid Azure AD joined devices](../devices/concept-azure-ad-join-hybrid.md)
@@ -65,8 +66,6 @@ In the current preview state, the following limitations apply to email as an alt
6566
* Applications using legacy authentication such as POP3 and SMTP
6667
* Skype for Business
6768
* Microsoft Office on macOS
68-
* Microsoft Teams on web
69-
* OneDrive, when the sign-in flow does not involve Multi-Factor Authentication.
7069
* Microsoft 365 Admin Portal
7170

7271
* **Unsupported apps** - Some third-party applications may not work as expected if they assume that the `unique_name` or `preferred_username` claims are immutable or will always match a specific user attribute, such as UPN.
@@ -121,6 +120,12 @@ One of the user attributes that's automatically synchronized by Azure AD Connect
121120
>
122121
> For more information, see [Add and verify a custom domain name in Azure AD][verify-domain].
123122
123+
## B2B guest user sign-in with an email address
124+
125+
![Diagram of email as an alternate login ID for B2B guest user sign-in.](media/howto-authentication-use-email-signin/email-alternate-login-id-b2b.png)
126+
127+
Email as an alternate login ID applies to [Azure AD business-to-business (B2B) collaboration](../external-identities/what-is-b2b.md) under a "bring your own sign-in identifiers" model. When email as an alternate login ID is enabled in the home tenant, Azure AD users can perform guest sign in with non-UPN email on the resource tenanted endpoint. No action is required from the resource tenant to enable this functionality.
128+
124129
## Enable user sign-in with an email address
125130

126131
> [!NOTE]
@@ -313,7 +318,7 @@ To test that users can sign in with email, go to [https://myprofile.microsoft.co
313318

314319
## Troubleshoot
315320

316-
If users have trouble signing-in with their email address, review the following troubleshooting steps:
321+
If users have trouble signing in with their email address, review the following troubleshooting steps:
317322

318323
1. Make sure it's been at least 1 hour since email as an alternate login ID was enabled. If the user was recently added to a group for staged rollout policy, make sure it's been at least 24 hours since they were added to the group.
319324
1. If using HRD policy, confirm that the Azure AD *HomeRealmDiscoveryPolicy* has the *AlternateIdLogin* definition property set to *"Enabled": true* and the *IsOrganizationDefault* property set to *True*:
Loading
Loading
Loading

articles/active-directory/external-identities/faq.yml

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -185,6 +185,11 @@ sections:
185185
answer: |
186186
For information about what licenses your organization needs to use Azure AD B2B, see [External Identities pricing](external-identities-pricing.md).
187187
188+
- question: |
189+
Can B2B collaboration users sign in with their non-UPN email address?
190+
answer: |
191+
Yes. For more information about email as an alternate login ID for B2B collaboration, see [B2B guest user sign-in with an email address](https://docs.microsoft.com/azure/active-directory/authentication/howto-authentication-use-email-signin#b2b-guest-user-sign-in-with-an-email-address).
192+
188193
additionalContent: |
189194
190195
## Next steps

articles/active-directory/roles/security-planning.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -299,7 +299,7 @@ If your Azure Active Directory is connected to on-premises Active Directory, the
299299

300300
#### Establish integrated monitoring
301301

302-
The [Microsoft Defender for Cloud](../../security-center/security-center-introduction.md):
302+
The [Microsoft Defender for Cloud](../../defender-for-cloud/defender-for-cloud-introduction.md):
303303

304304
* Provides integrated security monitoring and policy management across your Azure subscriptions
305305
* Helps detect threats that may otherwise go unnoticed

0 commit comments

Comments
 (0)