Skip to content

Commit 8514b08

Browse files
authored
Merge pull request #228061 from v-edmckillop/patch-120
Update 2-secure-access-current-state.md
2 parents 95540dd + 8ac5e38 commit 8514b08

File tree

1 file changed

+26
-24
lines changed

1 file changed

+26
-24
lines changed

articles/active-directory/fundamentals/2-secure-access-current-state.md

Lines changed: 26 additions & 24 deletions
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,14 @@
11
---
2-
title: Discover the current state of external collaboration with Azure Active Directory
3-
description: Learn methods to discover the current state of your collaboration
2+
title: Discover the current state of external collaboration in your organization
3+
description: Discover the current state of an organization's collaboration with audit logs, reporting, allowlist, blocklist, and more.
44
services: active-directory
55
author: gargi-sinha
66
manager: martinco
77
ms.service: active-directory
88
ms.workload: identity
99
ms.subservice: fundamentals
1010
ms.topic: conceptual
11-
ms.date: 12/15/2022
11+
ms.date: 02/21/2023
1212
ms.author: gasinh
1313
ms.reviewer: ajburnle
1414
ms.custom: "it-pro, seodec18"
@@ -19,53 +19,55 @@ ms.collection: M365-identity-device-management
1919

2020
Before you learn about the current state of your external collaboration, determine a security posture. Consider centralized vs. delegated control, also governance, regulatory, and compliance targets.
2121

22-
Learn more: [Determine your security posture for external users](1-secure-access-posture.md)
22+
Learn more: [Determine your security posture for external access with Azure Active Directory](1-secure-access-posture.md)
2323

24-
Users in your organization likely collaborate with users from other organizations. Collaboration can occur with productivity applications like Microsoft 365, by email, or sharing resources with external users. The foundation of your governance plan can include:
24+
Users in your organization likely collaborate with users from other organizations. Collaboration occurs with productivity applications like Microsoft 365, by email, or sharing resources with external users. These scenarios include users:
2525

26-
* Users initiating external collaboration
27-
* Collaboration with external users and organizations
28-
* Access granted to external users
26+
* Initiating external collaboration
27+
* Collaborating with external users and organizations
28+
* Granting access to external users
2929

30-
## Users initiating external collaboration
30+
## Determine who initiates external collaboration
3131

32-
Users seeking external collaboration know the applications needed for their work, and when access ends. Therefore, determine users with delegated permission to invite external users, create access packages, and complete access reviews.
32+
Generally, users seeking external collaboration know the applications to use, and when access ends. Therefore, determine users with delegated permissions to invite external users, create access packages, and complete access reviews.
3333

3434
To find collaborating users:
3535

36-
* [Microsoft 365, audit log activities](/microsoft-365/compliance/audit-log-activities?view=o365-worldwide&preserve-view=true)
37-
* [Auditing and reporting a B2B collaboration user](../external-identities/auditing-and-reporting.md)
36+
* Microsoft 365 [Audit log activities](/microsoft-365/compliance/audit-log-activities?view=o365-worldwide&preserve-view=true) - search for events and discover activities audited in Microsoft 365
37+
* [Auditing and reporting a B2B collaboration user](../external-identities/auditing-and-reporting.md) - verify guest user access, and see records of system and user activities
3838

39-
## Collaboration with external users and organizations
39+
## Enumerate guest users and organizations
4040

41-
External users might be Azure AD B2B users with partner-managed credentials, or external users with locally provisioned credentials. Typically, these users are a UserType of Guest. See, [B2B collaboration overview](../external-identities/what-is-b2b.md).
41+
External users might be Azure AD B2B users with partner-managed credentials, or external users with locally provisioned credentials. Typically, these users are the Guest UserType. To learn about inviting guests users and sharing resources, see [B2B collaboration overview](../external-identities/what-is-b2b.md).
4242

4343
You can enumerate guest users with:
4444

4545
* [Microsoft Graph API](/graph/api/user-list?tabs=http)
4646
* [PowerShell](/graph/api/user-list?tabs=http)
4747
* [Azure portal](../enterprise-users/users-bulk-download.md)
4848

49-
There are tools to identify Azure AD B2B collaboration, external Azure AD tenants and users accessing applications:
49+
Use the following tools to identify Azure AD B2B collaboration, external Azure AD tenants, and users accessing applications:
5050

51-
* [PowerShell module](https://github.com/AzureAD/MSIdentityTools/wiki/Get-MSIDCrossTenantAccessActivity)
52-
* [Azure Monitor workbook](../reports-monitoring/workbook-cross-tenant-access-activity.md)
51+
* PowerShell module, [Get MsIdCrossTenantAccessActivity](https://github.com/AzureAD/MSIdentityTools/wiki/Get-MSIDCrossTenantAccessActivity)
52+
* [Cross-tenant access activity workbook](../reports-monitoring/workbook-cross-tenant-access-activity.md)
5353

54-
### Email domains and companyName property
54+
### Discover email domains and companyName property
5555

56-
Determine external organizations with the domain names of external user email addresses. This discovery might not be possible with consumer identity providers such as Google. We recommend you write the companyName attribute to identify external organizations.
56+
You can determine external organizations with the domain names of external user email addresses. This discovery might not be possible with consumer identity providers. We recommend you write the companyName attribute to identify external organizations.
5757

58-
### Allowlist, blocklist, and entitlement management
58+
### Use allowlist, blocklist, and entitlement management
5959

60-
For your organization to collaborate with, or block, specific organizations, at the tenant level, there is allowlist or blocklist. Use this feature to control B2B invitations and redemptions regardless of source (such as Microsoft Teams, SharePoint, or the Azure portal). See, [Allow or block invitations to B2B users from specific organizations](../external-identities/allow-deny-list.md).
60+
Use the allowlist or blocklist to enable your organization to collaborate with, or block, organizations at the tenant level. Control B2B invitations and redemptions regardless of source (such as Microsoft Teams, SharePoint, or the Azure portal).
61+
62+
See, [Allow or block invitations to B2B users from specific organizations](../external-identities/allow-deny-list.md)
6163

6264
If you use entitlement management, you can confine access packages to a subset of partners with the **Specific connected organizations** option, under New access packages, in Identity Governance.
6365

64-
![Screenshot of the Specific connected organizations option, under New access packages.](media/secure-external-access/2-new-access-package.png)
66+
![Screenshot of settings and options under Identity Governance, New access package.](media/secure-external-access/2-new-access-package.png)
6567

66-
## External user access
68+
## Determine external user access
6769

68-
After you have an inventory of external users and organizations, determine the access to grant to these users. You can use the Microsoft Graph API to determine Azure AD group membership or application assignment.
70+
With an inventory of external users and organizations, determine the access to grant to the users. You can use the Microsoft Graph API to determine Azure AD group membership or application assignment.
6971

7072
* [Working with groups in Microsoft Graph](/graph/api/resources/groups-overview?context=graph%2Fcontext&view=graph-rest-1.0&preserve-view=true)
7173
* [Applications API overview](/graph/applications-concept-overview?view=graph-rest-1.0&preserve-view=true)

0 commit comments

Comments
 (0)