You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/authentication/howto-mfaserver-deploy-upgrade.md
+10-11Lines changed: 10 additions & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,32 +1,31 @@
1
1
---
2
2
title: Upgrading Azure MFA Server - Azure Active Directory
3
-
description: Steps and guidance to upgrade the Azure Multi-Factor Authentication Server to a newer version.
3
+
description: Steps and guidance to upgrade the Azure AD Multi-Factor Authentication Server to a newer version.
4
4
5
5
services: multi-factor-authentication
6
6
ms.service: active-directory
7
7
ms.subservice: authentication
8
8
ms.topic: how-to
9
-
ms.date: 11/12/2018
9
+
ms.date: 10/10/2022
10
10
11
11
ms.author: justinha
12
12
author: justinha
13
13
manager: amycolannino
14
-
ms.reviewer: michmcla
14
+
ms.reviewer: jpettere
15
15
16
16
ms.collection: M365-identity-device-management
17
17
---
18
-
# Upgrade to the latest Azure Multi-Factor Authentication Server
18
+
# Upgrade to the latest Azure AD Multi-Factor Authentication Server
19
19
20
-
This article walks you through the process of upgrading Azure Multi-Factor Authentication (MFA) Server v6.0 or higher. If you need to upgrade an old version of the PhoneFactor Agent, refer to [Upgrade the PhoneFactor Agent to Azure Multi-Factor Authentication Server](howto-mfaserver-deploy-upgrade-pf.md).
20
+
This article walks you through the process of upgrading Azure AD Multi-Factor Authentication (MFA) Server v6.0 or higher. If you need to upgrade an old version of the PhoneFactor Agent, refer to [Upgrade the PhoneFactor Agent to Azure AD Multi-Factor Authentication Server](howto-mfaserver-deploy-upgrade-pf.md).
21
21
22
22
If you're upgrading from v6.x or older to v7.x or newer, all components change from .NET 2.0 to .NET 4.5. All components also require Microsoft Visual C++ 2015 Redistributable Update 1 or higher. The MFA Server installer installs both the x86 and x64 versions of these components if they aren't already installed. If the User Portal and Mobile App Web Service run on separate servers, you need to install those packages before upgrading those components. You can search for the latest Microsoft Visual C++ 2015 Redistributable update on the [Microsoft Download Center](https://www.microsoft.com/download/).
23
23
24
24
> [!IMPORTANT]
25
-
> As of July 1, 2019, Microsoft no longer offers MFA Server for new deployments. New customers that want to require multi-factor authentication (MFA) during sign-in events should use cloud-based Azure AD Multi-Factor Authentication.
26
-
>
25
+
> In September 2022, Microsoft announced deprecation of Azure AD Multi-Factor Authentication Server. Beginning September 30, 2024, Azure AD Multi-Factor Authentication Server deployments will no longer service multifactor authentication (MFA) requests, which could cause authentications to fail for your organization. To ensure uninterrupted authentication services and to remain in a supported state, organizations should [migrate their users’ authentication data](how-to-migrate-mfa-server-to-azure-mfa-user-authentication.md) to the cloud-based Azure MFA service by using the latest Migration Utility included in the most recent [Azure MFA Server update](https://www.microsoft.com/download/details.aspx?id=55849). For more information, see [Azure MFA Server Migration](how-to-migrate-mfa-server-to-azure-mfa.md).
26
+
27
27
> To get started with cloud-based MFA, see [Tutorial: Secure user sign-in events with Azure AD Multi-Factor Authentication](tutorial-enable-azure-mfa.md).
28
-
>
29
-
> Existing customers that activated MFA Server before July 1, 2019 can download the latest version, future updates, and generate activation credentials as usual.
28
+
30
29
31
30
Upgrade steps at a glance:
32
31
@@ -36,7 +35,7 @@ Upgrade steps at a glance:
36
35
37
36
## Upgrade Azure MFA Server
38
37
39
-
1. Use the instructions in [Download the Azure Multi-Factor Authentication Server](howto-mfaserver-deploy.md#download-the-mfa-server) to get the latest version of the Azure MFA Server installer.
38
+
1. Use the instructions in [Download the Azure AD Multi-Factor Authentication Server](howto-mfaserver-deploy.md#download-the-mfa-server) to get the latest version of the Azure MFA Server installer.
40
39
2. Make a backup of the MFA Server data file located at C:\Program Files\Multi-Factor Authentication Server\Data\PhoneFactor.pfdata (assuming the default install location) on your primary MFA Server.
41
40
3. If you run multiple servers for high availability, change the client systems that authenticate to the MFA Server so that they stop sending traffic to the servers that are upgrading. If you use a load balancer, remove a subordinate MFA Server from the load balancer, do the upgrade, and then add the server back into the farm.
42
41
4. Run the new installer on each MFA Server. Upgrade subordinate servers first because they can read the old data file being replicated by the primary.
@@ -113,7 +112,7 @@ These instructions only apply if you run Multi-Factor Authentication Server sepa
113
112
114
113
## Next steps
115
114
116
-
* Get examples of [Advanced scenarios with Azure Multi-Factor Authentication and third-party VPNs](howto-mfaserver-nps-vpn.md)
115
+
* Get examples of [Advanced scenarios with Azure AD Multi-Factor Authentication and third-party VPNs](howto-mfaserver-nps-vpn.md)
117
116
118
117
*[Synchronize MFA Server with Windows Server Active Directory](howto-mfaserver-dir-ad.md)
Copy file name to clipboardExpand all lines: articles/active-directory/external-identities/direct-federation-adfs.md
+51-32Lines changed: 51 additions & 32 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -50,7 +50,7 @@ The next section illustrates how to configure the required attributes and claims
50
50
51
51
### Before you begin
52
52
53
-
An AD FS server must already be set up and functioning before you begin this procedure. For help with setting up an AD FS server, see [Create a test AD FS 3.0 instance on an Azure virtual machine](https://medium.com/in-the-weeds/create-a-test-active-directory-federation-services-3-0-instance-on-an-azure-virtual-machine-9071d978e8ed).
53
+
An AD FS server must already be set up and functioning before you begin this procedure.
54
54
55
55
### Add the claim description
56
56
@@ -68,12 +68,20 @@ An AD FS server must already be set up and functioning before you begin this pro
68
68
69
69
### Add the relying party trust
70
70
71
-
1. On the AD FS server, go to **Tools** > **AD FS management**.
72
-
1. In the navigation pane, select **Relying Party Trusts**.
73
-
1. Under **Actions**, select **Add Relying Party Trust**.
74
-
1. In the **Add Relying Party Trust** wizard, select **Claims aware**, and then select **Start**.
75
-
1. In the **Select Data Source** section, select the check box for **Import data about the relying party published online or on a local network**. Enter this federation metadata URL: `https://nexus.microsoftonline-p.com/federationmetadata/saml20/federationmetadata.xml`. Select **Next**.
76
-
1. Leave the other settings in their default options. Continue to select **Next**, and finally select **Close** to close the wizard.
71
+
1. On the AD FS server, go to **Tools** > **AD FS Management**.
72
+
2. In the navigation pane, select **Relying Party Trusts**.
73
+
3. Under **Actions**, select **Add Relying Party Trust**.
74
+
4. In the **Add Relying Party Trust** wizard, select **Claims aware**, and then select **Start**.
75
+
5. In the **Select Data Source** section, select the check box for **Import data about the relying party published online or on a local network**. Enter this federation metadata URL: `https://nexus.microsoftonline-p.com/federationmetadata/saml20/federationmetadata.xml`. Select **Next**.
76
+
6. Leave the other settings in their default options. Continue to select **Next**, and finally select **Close** to close the wizard.
77
+
7. In **AD FS Management**, under **Relying Party Trusts**, right click the relying party trust you just created and select **Properties**.
78
+
8. In the **Monitoring** tab, uncheck the box **Monitor relying party**.
79
+
9. In the **Identifiers** tab, enter ``https://login.microsoftonline.com/<tenant ID>/`` in the **Relying party identifier** text box using the tenant ID of the service partner’s Azure AD tenant. Select **Add**.
80
+
81
+
> [!NOTE]
82
+
> Be sure to include a slash (/) after the tenant ID. For example, https://login.microsoftonline.com/094a6247-27d4-489f-a23b-b9672900084d/.
83
+
84
+
10. Select **OK**.
77
85
78
86
### Create claims rules
79
87
@@ -124,42 +132,53 @@ Required claims for the WS-Fed token issued by the IdP:
124
132
The next section illustrates how to configure the required attributes and claims using AD FS as an example of a WS-Fed IdP.
125
133
126
134
### Before you begin
127
-
An AD FS server must already be set up and functioning before you begin this procedure. For help with setting up an AD FS server, see [Create a test AD FS 3.0 instance on an Azure virtual machine](https://medium.com/in-the-weeds/create-a-test-active-directory-federation-services-3-0-instance-on-an-azure-virtual-machine-9071d978e8ed).
135
+
An AD FS server must already be set up and functioning before you begin this procedure.
128
136
129
-
### Add the relying party trust and claim rules
137
+
### Add the relying party trust
130
138
131
139
1. On the AD FS server, go to **Tools** > **AD FS management**.
132
-
1. In the navigation pane, select **Trust Relationships** > **Relying Party Trusts**.
133
-
1. Under **Actions**, select **Add Relying Party Trust**.
134
-
1. In the **Select Data Source** section, select **Enter data about the relying party manually**, and then select **Next**.
135
-
1. On the **Specify Display Name** page, type a name in **Display name**, under **Notes** type a description for this relying party trust, and then select **Next**.
136
-
1. On the **Configure Certificate** page, if you have an optional token encryption certificate, select **Browse** to locate a certificate file, and then select **Next**.
137
-
1. On the **Configure URL** page, select the **Enable support for the WS-Federation Passive protocol** check box. Under **Relying party WS-Federation Passive protocol URL**, type the URL for this relying party trust: `https://login.microsoftonline.com/login.srf`
138
-
1. Select **Next**.
139
-
1. On the **Configure Identifiers** page, specify the relying party trust identifier, including the tenant ID of the service partner’s Azure AD tenant: `https://login.microsoftonline.com/<tenant_ID>/`
140
-
1. Select **Add** to add the identifier to the list, and then select **Next**.
141
-
1. On the **Choose Access Control Policy** page, select a policy, and then select **Next**.
142
-
1. On the **Ready to Add Trust** page, review the settings, and then select **Next** to save your relying party trust information.
143
-
1. On the **Finish** page, select **Close**. This action automatically displays the **Edit Claim Rules** dialog box.
144
-
1. In the **Edit Claim Rules** wizard, select **Add Rule**. In **Choose Rule Type**, select **Send Claims Using a Custom Rule**. Select *Next*.
145
-
1. In **Configure Claim Rule**, specify the following values:
140
+
2. In the navigation pane, select **Trust Relationships** > **Relying Party Trusts**.
141
+
3. Under **Actions**, select **Add Relying Party Trust**.
142
+
4. In the Add Relying Party Trust wizard, select **Claims aware**, and then select Start.
143
+
5. In the **Select Data Source** section, select **Enter data about the relying party manually**, and then select **Next**.
144
+
6. In the **Specify Display Name** page, type a name in **Display name**. You may optionally enter a description for this relying party trust in the **Notes** section. Select **Next**.
145
+
7. Optionally, in the **Configure Certificate** page, if you have a token encryption certificate, select **Browse** to locate a certificate file. Select **Next**.
146
+
8. In the **Configure URL** page, select the **Enable support for the WS-Federation Passive protocol** check box. Under **Relying party WS-Federation Passive protocol URL**, enter the following URL: `https://login.microsoftonline.com/login.srf`
147
+
9. Select **Next**.
148
+
10. In the **Configure Identifiers** page, enter the following URLs and select **Add**. In the second URL, enter the tenant ID of service partner's Azure AD tenant.
149
+
-`urn:federation:MicrosoftOnline`
150
+
-`https://login.microsoftonline.com/<tenant ID>/`
151
+
152
+
> [!NOTE]
153
+
> Be sure to include a slash (/) after the tenant ID, for example: https://login.microsoftonline.com/094a6247-27d4-489f-a23b-b9672900084d/.
154
+
155
+
11. Select **Next**.
156
+
12. In the **Choose Access Control Policy** page, select a policy, and then select **Next**.
157
+
13. In the **Ready to Add Trust** page, review the settings, and then select **Next** to save your relying party trust information.
158
+
14. In the **Finish** page, select **Close**. select Relying Party Trust and click **Edit Claim Issuance Policy**.
10. Select **OK**. The AD FS server is now configured for federation using WS-Fed.
163
182
164
183
## Next steps
165
184
Next, you'll [configure SAML/WS-Fed IdP federation in Azure AD](direct-federation.md#step-3-configure-samlws-fed-idp-federation-in-azure-ad) either in the Azure AD portal or by using the Microsoft Graph API.
Copy file name to clipboardExpand all lines: articles/active-directory/reports-monitoring/concept-activity-logs-azure-monitor.md
+5-35Lines changed: 5 additions & 35 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,24 +2,17 @@
2
2
title: Azure Active Directory activity logs in Azure Monitor | Microsoft Docs
3
3
description: Introduction to Azure Active Directory activity logs in Azure Monitor
4
4
services: active-directory
5
-
documentationcenter: ''
6
-
author: MarkusVi
5
+
author: shlipsey3
7
6
manager: amycolannino
8
-
editor: ''
9
-
10
-
ms.assetid: 4b18127b-d1d0-4bdc-8f9c-6a4c991c5f75
11
7
ms.service: active-directory
12
8
ms.topic: conceptual
13
-
ms.tgt_pltfrm: na
14
9
ms.workload: identity
15
10
ms.subservice: report-monitor
16
-
ms.date: 08/26/2022
17
-
ms.author: markvi
11
+
ms.date: 10/03/2022
12
+
ms.author: sarahlipsey
18
13
ms.reviewer: besiler
19
-
20
14
ms.collection: M365-identity-device-management
21
15
---
22
-
23
16
# Azure AD activity logs in Azure Monitor
24
17
25
18
You can route Azure Active Directory (Azure AD) activity logs to several endpoints for long term retention and data insights. This feature allows you to:
@@ -31,25 +24,21 @@ You can route Azure Active Directory (Azure AD) activity logs to several endpoin
You can route Azure AD audit logs and sign-in logs to your Azure Storage account, event hub, Azure Monitor logs, or custom solution by using this feature.
39
30
40
31
***Audit logs**: The [audit logs activity report](concept-audit-logs.md) gives you access to information about changes applied to your tenant, such as users and group management, or updates applied to your tenant’s resources.
41
32
***Sign-in logs**: With the [sign-in activity report](concept-sign-ins.md), you can determine who performed the tasks that are reported in the audit logs.
42
33
43
-
44
-
45
34
## Prerequisites
46
35
47
36
To use this feature, you need:
48
37
49
38
* An Azure subscription. If you don't have an Azure subscription, you can [sign up for a free trial](https://azure.microsoft.com/free/).
50
39
* Azure AD Free, Basic, Premium 1, or Premium 2 [license](https://www.microsoft.com/security/business/identity-access-management/azure-ad-pricing), to access the Azure AD audit logs in the Azure portal.
51
40
* An Azure AD tenant.
52
-
* A user who's a **global administrator** or **security administrator** for the Azure AD tenant.
41
+
* A user who's a **Global Administrator** or **Security Administrator** for the Azure AD tenant.
53
42
* Azure AD Premium 1, or Premium 2 [license](https://www.microsoft.com/security/business/identity-access-management/azure-ad-pricing), to access the Azure AD sign-in logs in the Azure portal.
54
43
55
44
Depending on where you want to route the audit log data, you need either of the following:
@@ -78,14 +67,6 @@ The following table contains a cost estimate of, depending on the size of the te
Events are batched into approximately five-minute intervals and sent as a single message that contains all the events within that timeframe. A message in the Event Hub has a maximum size of 256 KB, and if the total size of all the messages within the timeframe exceeds that volume, multiple messages are sent.
@@ -103,23 +84,12 @@ The following table contains estimated costs per month for a basic Event Hub in
103
84
104
85
### Azure Monitor logs cost considerations
105
86
106
-
107
-
108
87
| Log category | Number of users | Events per day | Events per month (30 days) | Cost per month in USD (est.) |
To review costs related to managing the Azure Monitor logs, see [Azure Monitor Logs pricing details](../../azure-monitor/logs/cost-logs.md).
124
94
125
95
## Frequently asked questions
@@ -174,7 +144,7 @@ This section answers frequently asked questions and discusses known issues with
174
144
175
145
**Q: What SIEM tools are currently supported?**
176
146
177
-
**A**: **A**: Currently, Azure Monitor is supported by [Splunk](./howto-integrate-activity-logs-with-splunk.md), IBM QRadar, [Sumo Logic](https://help.sumologic.com/Send-Data/Applications-and-Other-Data-Sources/Azure_Active_Directory), [ArcSight](./howto-integrate-activity-logs-with-arcsight.md), LogRhythm, and Logz.io. For more information about how the connectors work, see [Stream Azure monitoring data to an event hub for consumption by an external tool](../../azure-monitor/essentials/stream-monitoring-data-event-hubs.md).
147
+
**A**: Currently, Azure Monitor is supported by [Splunk](./howto-integrate-activity-logs-with-splunk.md), IBM QRadar, [Sumo Logic](https://help.sumologic.com/Send-Data/Applications-and-Other-Data-Sources/Azure_Active_Directory), [ArcSight](./howto-integrate-activity-logs-with-arcsight.md), LogRhythm, and Logz.io. For more information about how the connectors work, see [Stream Azure monitoring data to an event hub for consumption by an external tool](../../azure-monitor/essentials/stream-monitoring-data-event-hubs.md).
0 commit comments