Skip to content

Commit 7dd0507

Browse files
Learn Build Service GitHub AppLearn Build Service GitHub App
authored andcommitted
Merging changes synced from https://github.com/MicrosoftDocs/azure-docs-pr (branch live)
2 parents f0c77bb + 00c1a17 commit 7dd0507

File tree

52 files changed

+831
-251
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

52 files changed

+831
-251
lines changed

articles/active-directory/cloud-infrastructure-entitlement-management/how-to-add-remove-user-to-group.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ This article describes how you can add or remove a new user for a group in Permi
2121
2222
## Add a user
2323

24-
1. Navigate to the [Microsoft Entra admin center](https://entra.microsoft.com/#home).
24+
1. Navigate to the [Microsoft Entra admin center](https://entra.microsoft.com/#home).
2525
1. From the Azure Active Directory tile, select **Go to Azure Active Directory**.
2626
1. From the navigation pane, select the **Groups** drop-down menu, then **All groups**.
2727
1. Select the group name for the group you want to add the user to.

articles/active-directory/cloud-infrastructure-entitlement-management/onboard-azure.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ ms.author: jfields
1717
This article describes how to onboard a Microsoft Azure subscription or subscriptions on Permissions Management. Onboarding a subscription creates a new authorization system to represent the Azure subscription in Permissions Management.
1818

1919
> [!NOTE]
20-
> A *global administrator* or *super admin* (an admin for all authorization system types) can perform the tasks in this article after the global administrator has initially completed the steps provided in [Enable Permissions Management on your Azure Active Directory tenant](onboard-enable-tenant.md).
20+
> A *global administrator* or *root user* (an admin for all authorization system types) can perform the tasks in this article after the global administrator has initially completed the steps provided in [Enable Permissions Management on your Azure Active Directory tenant](onboard-enable-tenant.md).
2121
2222
## Explanation
2323

articles/active-directory/enterprise-users/licensing-service-plan-reference.md

Lines changed: 9 additions & 2 deletions
Large diffs are not rendered by default.

articles/active-directory/fundamentals/whats-deprecated-azure-ad.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: What's deprecated in Azure Active Directory?
33
description: Learn about features being deprecated in Azure Active Directory
4-
author: jricketts
4+
author: janicericketts
55
manager: martinco
66
ms.service: active-directory
77
ms.subservice: fundamentals

articles/active-directory/hybrid/deprecated-azure-ad-connect.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -20,6 +20,8 @@ ms.collection: M365-identity-device-management
2020

2121
You may have received a notification email that says that your [Azure AD Connect version is deprecated](whatis-azure-ad-connect-v2.md) and no longer supported. Or, you may have read a portal recommendation about upgrading your Azure AD Connect version. What is next?
2222

23+
[!INCLUDE [Choose cloud sync](../../../includes/choose-cloud-sync.md)]
24+
2325
Using a deprecated and unsupported version of Azure AD Connect isn't recommended and not supported. Deprecated and unsupported versions of Azure AD Connect may **unexpectedly stop working**. In these instances, you may need to install the latest version of Azure AD Connect as your only remedy to restore your sync process.
2426

2527
We regularly update Azure AD Connect with [newer versions](reference-connect-version-history.md). The new versions have bug fixes, performance improvements, new functionality, and security fixes, so it's important to stay up to date.

articles/active-directory/hybrid/how-to-upgrade-previous-version.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -19,6 +19,9 @@ ms.author: billmath
1919
ms.collection: M365-identity-device-management
2020
---
2121
# Azure AD Connect: Upgrade from a previous version to the latest
22+
23+
[!INCLUDE [Choose cloud sync](../../../includes/choose-cloud-sync.md)]
24+
2225
This topic describes the different methods that you can use to upgrade your Azure Active Directory (Azure AD) Connect installation to the latest release. Microsoft recommends using the steps in the [Swing migration](#swing-migration) section when you make a substantial configuration change or upgrade from older 1.x versions.
2326

2427
>[!NOTE]

articles/active-directory/hybrid/whatis-azure-ad-connect-v2.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -17,6 +17,8 @@ ms.collection: M365-identity-device-management, has-adal-ref
1717

1818
Azure AD Connect was released several years ago. Since this time, several of the components that Azure AD Connect uses have been scheduled for deprecation and updated to newer versions. Attempting to update all of these components individually would take time and planning.
1919

20+
[!INCLUDE [Choose cloud sync](../../../includes/choose-cloud-sync.md)]
21+
2022
To address this, we've bundled as many of these newer components into a new, single release, so you only have to update once. This release is Azure AD Connect V2. This release is a new version of the same software used to accomplish your hybrid identity goals, built using the latest foundational components.
2123

2224
>[!NOTE]

articles/active-directory/hybrid/whatis-azure-ad-connect.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -17,6 +17,8 @@ ms.collection: M365-identity-device-management
1717

1818
Azure AD Connect is an on-premises Microsoft application that's designed to meet and accomplish your hybrid identity goals. If you're evaluating how to best meet your goals, you should also consider the cloud-managed solution [Azure AD Connect cloud sync](../cloud-sync/what-is-cloud-sync.md).
1919

20+
[!INCLUDE [Choose cloud sync](../../../includes/choose-cloud-sync.md)]
21+
2022
> [!div class="nextstepaction"]
2123
> [Install Microsoft Azure Active Directory Connect](https://www.microsoft.com/download/details.aspx?id=47594)
2224
>

articles/active-directory/reports-monitoring/concept-activity-logs-azure-monitor.md

Lines changed: 9 additions & 21 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.topic: conceptual
99
ms.workload: identity
1010
ms.subservice: report-monitor
11-
ms.date: 01/12/2023
11+
ms.date: 02/03/2023
1212
ms.author: sarahlipsey
1313
ms.reviewer: besiler
1414
ms.collection: M365-identity-device-management
@@ -51,17 +51,17 @@ Depending on where you want to route the audit log data, you also need one of th
5151
- For storage pricing information, see the [Azure Storage pricing calculator](https://azure.microsoft.com/pricing/calculator/?service=storage).
5252
* An **[Azure Event Hubs namespace](../../event-hubs/event-hubs-create.md)** to integrate with third-party solutions.
5353

54-
Once you have your endpoint established, go to **Azure AD** and then **Diagnostic settings.** From here you can choose what logs to send to the endpoint of your choice. For more information, see the **Create diagnostic settings** section of the [Diagnostic settings in Azure Monitor](../../azure-monitor/essentials/diagnostic-settings.md#create-diagnostic-settings) article.
54+
Once you have your endpoint established, go to **Azure AD** and then **Diagnostic settings.** From here, you can choose what logs to send to the endpoint of your choice. For more information, see the **Create diagnostic settings** section of the [Diagnostic settings in Azure Monitor](../../azure-monitor/essentials/diagnostic-settings.md#create-diagnostic-settings) article.
5555

5656
## Cost considerations
5757

58-
If you already have an Azure AD license, you need an Azure subscription to set up the storage account and Event Hubs. The Azure subscription comes at no cost, but you have to pay to utilize Azure resources, including the storage account that you use for archival and the Event Hubs that you use for streaming. The amount of data and, thus, the cost incurred, can vary significantly depending on the tenant size.
58+
If you already have an Azure AD license, you need an Azure subscription to set up the storage account and Event Hubs. The Azure subscription comes at no cost, but you have to pay to utilize Azure resources. These resources could include the storage account that you use for archival and the Event Hubs that you use for streaming. The amount of data and, thus, the cost incurred, can vary significantly depending on the tenant size.
5959

6060
Azure Monitor provides the option to exclude whole events, fields, or parts of fields when ingesting logs from Azure AD. Learn more about this cost saving feature in [Data collection transformation in Azure Monitor](../../azure-monitor/essentials/data-collection-transformations.md).
6161

6262
### Storage size for activity logs
6363

64-
Every audit log event uses about 2 KB of data storage. Sign in event logs are about 4 KB of data storage. For a tenant with 100,000 users, which would incur about 1.5 million events per day, you would need about 3 GB of data storage per day. Because writes occur in approximately five-minute batches, you can anticipate approximately 9,000 write operations per month.
64+
Every audit log event uses about 2 KB of data storage. Sign-in event logs are about 4 KB of data storage. For a tenant with 100,000 users, which would incur about 1.5 million events per day, you would need about 3 GB of data storage per day. Because writes occur in approximately five-minute batches, you can anticipate around 9,000 write operations per month.
6565

6666
The following table contains a cost estimate of, depending on the size of the tenant, a general-purpose v2 storage account in West US for at least one year of retention. To create a more accurate estimate for the data volume that you anticipate for your application, use the [Azure storage pricing calculator](https://azure.microsoft.com/pricing/details/storage/blobs/).
6767

@@ -80,9 +80,9 @@ If you want to know for how long the activity data is stored in a Premium tenant
8080

8181
Events are batched into approximately five-minute intervals and sent as a single message that contains all the events within that timeframe. A message in the Event Hubs has a maximum size of 256 KB. If the total size of all the messages within the timeframe exceeds that volume, multiple messages are sent.
8282

83-
For example, about 18 events per second ordinarily occur for a large tenant of more than 100,000 users, a rate that equates to 5,400 events every five minutes. Because audit logs are about 2 KB per event, this equates to 10.8 MB of data. Therefore, 43 messages are sent to the event hub in that five-minute interval.
83+
For example, about 18 events per second ordinarily occur for a large tenant of more than 100,000 users, a rate that equates to 5,400 events every five minutes. Audit logs are about 2 KB per event, which equates to 10.8 MB of data. Therefore, 43 messages are sent to the event hub in that five-minute interval.
8484

85-
The following table contains estimated costs per month for a basic event hub in West US, depending on the volume of event data which can vary from tenant to tenant as per many factors like user sign-in behavior etc. To calculate an accurate estimate of the data volume that you anticipate for your application, use the [Event Hubs pricing calculator](https://azure.microsoft.com/pricing/details/event-hubs/).
85+
The following table contains estimated costs per month for a basic event hub in West US. The volume of event data can vary from tenant to tenant, based on factors like user sign-in behavior. To calculate an accurate estimate of the data volume that you anticipate for your application, use the [Event Hubs pricing calculator](https://azure.microsoft.com/pricing/details/event-hubs/).
8686

8787
| Log category | Number of users | Events per second | Events per five-minute interval | Volume per interval | Messages per interval | Messages per month | Cost per month (est.) |
8888
|--------------|-----------------|-------------------------|----------------------------------------|---------------------|---------------------------------|------------------------------|----------------------------|
@@ -111,18 +111,6 @@ This section answers frequently asked questions and discusses known issues with
111111

112112
---
113113

114-
**Q: How soon after an action will the corresponding logs show up in my event hub?**
115-
116-
**A**: The logs should show up in your event hub within two to five minutes after the action is performed. For more information about Event Hubs, see [What is Azure Event Hubs?](../../event-hubs/event-hubs-about.md).
117-
118-
---
119-
120-
**Q: How soon after an action will the corresponding logs show up in my storage account?**
121-
122-
**A**: For Azure storage accounts, the latency is anywhere from 5 to 15 minutes after the action is performed.
123-
124-
---
125-
126114
**Q: What happens if an Administrator changes the retention period of a diagnostic setting?**
127115

128116
**A**: The new retention policy will be applied to logs collected after the change. Logs collected before the policy change will be unaffected.
@@ -141,11 +129,11 @@ This section answers frequently asked questions and discusses known issues with
141129

142130
---
143131

144-
**Q: How do I integrate Azure AD activity logs with my SIEM system?**
132+
**Q: How do I integrate Azure AD activity logs with my SIEM tools?**
145133

146-
**A**: You can do this in two ways:
134+
**A**: You can do integrate with your SIEM tools in two ways:
147135

148-
- Use Azure Monitor with Event Hubs to stream logs to your SIEM system. First, [stream the logs to an event hub](tutorial-azure-monitor-stream-logs-to-event-hub.md) and then [set up your SIEM tool](tutorial-azure-monitor-stream-logs-to-event-hub.md#access-data-from-your-event-hub) with the configured event hub.
136+
- Use Azure Monitor with Event Hubs to stream logs to your SIEM tool. First, [stream the logs to an event hub](tutorial-azure-monitor-stream-logs-to-event-hub.md) and then [set up your SIEM tool](tutorial-azure-monitor-stream-logs-to-event-hub.md#access-data-from-your-event-hub) with the configured event hub.
149137

150138
- Use the [Reporting Graph API](concept-reporting-api.md) to access the data, and push it into the SIEM system using your own scripts.
151139

articles/active-directory/reports-monitoring/how-to-view-applied-conditional-access-policies.md

Lines changed: 19 additions & 41 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.topic: how-to
1010
ms.workload: identity
1111
ms.subservice: report-monitor
12-
ms.date: 10/31/2022
12+
ms.date: 02/03/2023
1313
ms.author: sarahlipsey
1414
ms.reviewer: besiler
1515

@@ -32,41 +32,30 @@ As an Azure AD administrator, you can use the sign-in logs to:
3232

3333
Some scenarios require you to get an understanding of how your Conditional Access policies were applied to a sign-in event. Common examples include:
3434

35-
- *Helpdesk administrators* who need to look at applied Conditional Access policies to understand if a policy is the root cause of a ticket that a user opened.
35+
- Helpdesk administrators who need to look at applied Conditional Access policies to understand if a policy is the root cause of a ticket that a user opened.
3636

37-
- *Tenant administrators* who need to verify that Conditional Access policies have the intended effect on the users of a tenant.
37+
- Tenant administrators who need to verify that Conditional Access policies have the intended effect on the users of a tenant.
3838

3939
You can access the sign-in logs by using the Azure portal, Microsoft Graph, and PowerShell.
4040

4141
## Required administrator roles
4242

43-
To see applied Conditional Access policies in the sign-in logs, administrators must have permissions to view both the logs and the policies.
43+
To see applied Conditional Access policies in the sign-in logs, administrators must have permissions to view *both* the logs and the policies. The least privileged built-in role that grants *both* permissions is *Security Reader*. As a best practice, your Global Administrator should add the Security Reader role to the related administrator accounts.
4444

45-
The least privileged built-in role that grants both permissions is *Security Reader*. As a best practice, your global administrator should add the Security Reader role to the related administrator accounts.
46-
47-
The following built-in roles grant permissions to read Conditional Access policies:
45+
The following built-in roles grant permissions to *read Conditional Access policies*:
4846

4947
- Global Administrator
50-
5148
- Global Reader
52-
5349
- Security Administrator
54-
5550
- Security Reader
56-
5751
- Conditional Access Administrator
5852

59-
60-
The following built-in roles grant permission to view sign-in logs:
53+
The following built-in roles grant permission to *view sign-in logs*:
6154

6255
- Global Administrator
63-
6456
- Security Administrator
65-
6657
- Security Reader
67-
6858
- Global Reader
69-
7059
- Reports Reader
7160

7261
## Permissions for client apps
@@ -76,9 +65,7 @@ If you use a client app to pull sign-in logs from Microsoft Graph, your app need
7665
Any of the following permissions is sufficient for a client app to access applied certificate authority (CA) policies in sign-in logs through Microsoft Graph:
7766

7867
- `Policy.Read.ConditionalAccess`
79-
8068
- `Policy.ReadWrite.ConditionalAccess`
81-
8269
- `Policy.Read.All`
8370

8471
## Permissions for PowerShell
@@ -89,37 +76,28 @@ Like any other client app, the Microsoft Graph PowerShell module needs client pe
8976
- `AuditLog.Read.All`
9077
- `Directory.Read.All`
9178

92-
These permissions are the least privileged permissions with the necessary access.
93-
94-
To consent to the necessary permissions, use:
95-
96-
`Connect-MgGraph -Scopes Policy.Read.ConditionalAccess, AuditLog.Read.All, Directory.Read.All`
97-
98-
To view the sign-in logs, use:
79+
The following permissions are the least privileged permissions with the necessary access:
9980

100-
`Get-MgAuditLogSignIn`
81+
- To consent to the necessary permissions: `Connect-MgGraph -Scopes Policy.Read.ConditionalAccess, AuditLog.Read.All, Directory.Read.All`
82+
- To view the sign-in logs: `Get-MgAuditLogSignIn`
10183

10284
For more information about this cmdlet, see [Get-MgAuditLogSignIn](/powershell/module/microsoft.graph.reports/get-mgauditlogsignin).
10385

10486
The Azure AD Graph PowerShell module doesn't support viewing applied Conditional Access policies. Only the Microsoft Graph PowerShell module returns applied Conditional Access policies.
10587

106-
## Confirming access
107-
108-
On the **Conditional Access** tab, you see a list of Conditional Access policies applied to that sign-in event.
109-
110-
To confirm that you have admin access to view applied Conditional Access policies in the sign-in logs:
111-
112-
1. Go to the Azure portal.
113-
114-
2. In the upper-right corner, select your directory, and then select **Azure Active Directory** on the left pane.
88+
## View Conditional Access policies in Azure AD sign-in logs
11589

116-
3. In the **Monitoring** section, select **Sign-in logs**.
90+
The activity details of sign-in logs contain several tabs. The **Conditional Access** tab lists the Conditional Access policies applied to that sign-in event.
11791

118-
4. Select an item in the sign-in table to open the **Activity Details: Sign-ins context** pane.
92+
1. Sign in to the [Azure portal](https://portal.azure.com) using the Security Reader role.
93+
1. In the **Monitoring** section, select **Sign-in logs**.
94+
1. Select a sign-in item from the table to open the **Activity Details: Sign-ins context** pane.
95+
1. Select the **Conditional Access** tab.
11996

120-
5. Select the **Conditional Access** tab on the context pane. If your screen is small, you might need to select the ellipsis (**...**) to see all tabs on the context pane.
97+
If you don't see the Conditional Access policies, confirm you're using a role that provides access to both the sign-in logs and the Conditional Access policies.
12198

12299
## Next steps
123100

124-
* [Sign-in error code reference](./concept-sign-ins.md)
125-
* [Sign-in report overview](concept-sign-ins.md)
101+
* [Troubleshoot sign-in problems](../conditional-access/troubleshoot-conditional-access.md#azure-ad-sign-in-events)
102+
* [Review the Conditional Access sign-in logs FAQs](reports-faq.yml#conditional-access)
103+
* [Learn about the sign-in logs](concept-sign-ins.md)

0 commit comments

Comments
 (0)