Skip to content

Commit 890864a

Browse files
authored
Merge pull request #220720 from MicrosoftDocs/main
Publish to live, Wednesday 4 AM PST 12/07
2 parents 201a682 + 9b0eda7 commit 890864a

File tree

240 files changed

+3375
-1503
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

240 files changed

+3375
-1503
lines changed

.openpublishing.redirection.defender-for-cloud.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -764,6 +764,11 @@
764764
"source_path_from_root": "/articles/defender-for-cloud/plan-multicloud-security-other-resources.md",
765765
"redirect_url": "/azure/defender-for-cloud/multicloud",
766766
"redirect_document_id": true
767+
},
768+
{
769+
"source_path_from_root": "/articles/defender-for-cloud/defender-for-servers-introduction.md",
770+
"redirect_url": "/azure/defender-for-cloud/plan-defender-for-servers",
771+
"redirect_document_id": true
767772
}
768773
]
769774
}

articles/active-directory/develop/msal-android-shared-devices.md

Lines changed: 9 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: develop
1010
ms.topic: conceptual
1111
ms.workload: identity
12-
ms.date: 09/30/2021
12+
ms.date: 12/06/2022
1313
ms.author: henrymbugua
1414
ms.reviewer: brandwe
1515
ms.custom: aaddev, identitypla | Azuretformtop40
@@ -93,8 +93,14 @@ If your application is running in multiple-account mode, and an administrator pu
9393

9494
These Microsoft applications support Azure AD's shared device mode:
9595

96-
* [Microsoft Teams](/microsoftteams/platform/)
97-
* [Microsoft Managed Home Screen](/mem/intune/apps/app-configuration-managed-home-screen-app) app for Android Enterprise
96+
- [Microsoft Teams](/microsoftteams/platform/)
97+
- [Microsoft Managed Home Screen](/mem/intune/apps/app-configuration-managed-home-screen-app) app for Android Enterprise
98+
- [Microsoft Edge](/microsoft-edge) (in Public Preview)
99+
- [Yammer](/yammer) (in Public Preview)
100+
101+
> [!IMPORTANT]
102+
> Public preview is provided without a service-level agreement and isn't recommended for production workloads. Some features might be unsupported or have constrained capabilities. For more information, see [Supplemental terms of use for Microsoft Azure previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/).
103+
98104
## Shared device sign-out and the overall app lifecycle
99105

100106
When a user signs out, you'll need to take action to protect the privacy and data of the user. For example, if you're building a medical records app you'll want to make sure that when the user signs out previously displayed patient records are cleared. Your application must be prepared for data privacy and check every time it enters the foreground.

articles/active-directory/governance/access-reviews-application-preparation.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ ms.collection: M365-identity-device-management
2525

2626
[Microsoft Entra Identity Governance](identity-governance-overview.md) allows you to balance your organization's need for security and employee productivity with the right processes and visibility. It provides you with capabilities to ensure that the right people have the right access to the right resources.
2727

28-
Organizations with compliance requirements or risk management plans will have sensitive or business-critical applications. The application sensitivity may be based on its purpose or the data it contains, such as financial information or personal information of the organization's customers. For those applications, only a subset of all the users in the organization will typically be authorized to have access, and access should only be permitted based on documented business requirements. Azure AD can be integrated with many popular SaaS applications, on-premises applications, and applications that your organization has developed, using [standard protocol](../fundamentals/auth-sync-overview.md) and API interfaces. Through these interfaces, Azure AD can be the authoritative source to control who has access to those applications. As you integrate your applications with Azure AD, you can then use Microsoft Entra access reviews to recertify the users who have access to those applications, and remove access of those users who no longer need access. You can also use other features, including terms of use, conditional access and entitlement management, for governing access to applications, as described in [how to govern access to applications in your environment](identity-governance-applications-prepare.md).
28+
Organizations with compliance requirements or risk management plans will have sensitive or business-critical applications. The application sensitivity may be based on its purpose or the data it contains, such as financial information or personal information of the organization's customers. For those applications, only a subset of all the users in the organization will typically be authorized to have access, and access should only be permitted based on documented business requirements. Azure AD can be integrated with many popular SaaS applications, on-premises applications, and applications that your organization has developed, using [standard protocol](../fundamentals/auth-sync-overview.md) and API interfaces. Through these interfaces, Azure AD can be the authoritative source to control who has access to those applications. As you integrate your applications with Azure AD, you can then use access reviews to recertify the users who have access to those applications, and remove access of those users who no longer need access. You can also use other features, including terms of use, conditional access and entitlement management, for governing access to applications, as described in [how to govern access to applications in your environment](identity-governance-applications-prepare.md).
2929

3030
## Prerequisites for reviewing access
3131

@@ -40,7 +40,7 @@ Also, while not required for reviewing access to an application, we recommend al
4040

4141
## Determine how the application is integrated with Azure AD
4242

43-
In order for Microsoft Entra access reviews to be used for an application, then the application must first be integrated with Azure AD. An application being integrated with Azure AD means one of two requirements must be met:
43+
In order for access reviews to be used for an application, then the application must first be integrated with Azure AD. An application being integrated with Azure AD means one of two requirements must be met:
4444

4545
* The application relies upon Azure AD for federated SSO, and Azure AD controls authentication token issuance. If Azure AD is the only identity provider for the application, then only users who are assigned to one of the application's roles in Azure AD are able to sign into the application. Those users that are denied by a review lose their application role assignment and can no longer get a new token to sign in to the application.
4646
* The application relies upon user or group lists that are provided to the application by Azure AD. This fulfillment could be done through a provisioning protocol such as System for Cross-Domain Identity Management (SCIM) or by the application querying Azure AD via Microsoft Graph, or groups that are written to AD DS. Those users that are denied by a review lose their application role assignment or group membership, and when those changes are made available to the application, then the denied users will no longer have access.

articles/active-directory/governance/access-reviews-downloadable-review-history.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ ms.author: amsliu
1616

1717
# Create and manage downloadable access review history report in Microsoft Entra access reviews
1818

19-
With Microsoft Entra Access Reviews, you can create a downloadable review history to help your organization gain more insight. The report pulls the decisions that were taken by reviewers when a report is created. These reports can be constructed to include specific access reviews, for a specific time frame, and can be filtered to include different review types and review results.
19+
With access reviews, you can create a downloadable review history to help your organization gain more insight. The report pulls the decisions that were taken by reviewers when a report is created. These reports can be constructed to include specific access reviews, for a specific time frame, and can be filtered to include different review types and review results.
2020

2121
## Who can access and request review history
2222

articles/active-directory/governance/access-reviews-overview.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ ms.collection: M365-identity-device-management
1818
ms.custom: contperf-fy21q1
1919
---
2020

21-
# What are Microsoft Entra access reviews?
21+
# What are access reviews?
2222

2323
Microsoft Entra access reviews enable organizations to efficiently manage group memberships, access to enterprise applications, and role assignments. User's access can be reviewed on a regular basis to make sure only the right people have continued access.
2424

@@ -51,15 +51,15 @@ Azure AD enables you to collaborate with users from inside your organization and
5151
5252
## Where do you create reviews?
5353

54-
Depending on what you want to review, you will create your access review in Microsoft Entra access reviews, Azure AD enterprise apps (in preview), Microsoft Entra PIM, or Microsoft Entra entitlement management.
54+
Depending on what you want to review, you will create your access review in access reviews, Azure AD enterprise apps (in preview), PIM, or entitlement management.
5555

5656
| Access rights of users | Reviewers can be | Review created in | Reviewer experience |
5757
| --- | --- | --- | --- |
58-
| Security group members</br>Office group members | Specified reviewers</br>Group owners</br>Self-review | Microsoft Entra access reviews</br>Azure AD groups | Access panel |
59-
| Assigned to a connected app | Specified reviewers</br>Self-review | Microsoft Entra access reviews</br>Azure AD enterprise apps (in preview) | Access panel |
60-
| Azure AD role | Specified reviewers</br>Self-review | [Microsoft Entra PIM](../privileged-identity-management/pim-create-azure-ad-roles-and-resource-roles-review.md?toc=%2fazure%2factive-directory%2fgovernance%2ftoc.json) | Azure portal |
61-
| Azure resource role | Specified reviewers</br>Self-review | [Microsoft Entra PIM](../privileged-identity-management/pim-create-azure-ad-roles-and-resource-roles-review.md?toc=%2fazure%2factive-directory%2fgovernance%2ftoc.json) | Azure portal |
62-
| Access package assignments | Specified reviewers</br>Group members</br>Self-review | Microsoft Entra entitlement management | Access panel |
58+
| Security group members</br>Office group members | Specified reviewers</br>Group owners</br>Self-review | access reviews</br>Azure AD groups | Access panel |
59+
| Assigned to a connected app | Specified reviewers</br>Self-review | access reviews</br>Azure AD enterprise apps (in preview) | Access panel |
60+
| Azure AD role | Specified reviewers</br>Self-review | [PIM](../privileged-identity-management/pim-create-azure-ad-roles-and-resource-roles-review.md?toc=%2fazure%2factive-directory%2fgovernance%2ftoc.json) | Azure portal |
61+
| Azure resource role | Specified reviewers</br>Self-review | [PIM](../privileged-identity-management/pim-create-azure-ad-roles-and-resource-roles-review.md?toc=%2fazure%2factive-directory%2fgovernance%2ftoc.json) | Azure portal |
62+
| Access package assignments | Specified reviewers</br>Group members</br>Self-review | entitlement management | Access panel |
6363

6464
## License requirements
6565

articles/active-directory/governance/complete-access-review.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ ms.reviewer: mwahl
1717
ms.collection: M365-identity-device-management
1818
---
1919

20-
# Complete an access review of groups and applications in Microsoft Entra access reviews
20+
# Complete an access review of groups and applications in access reviews
2121

2222
As an administrator, you [create an access review of groups or applications](create-access-review.md) and reviewers [perform the access review](perform-access-review.md). This article describes how to see the results of the access review and apply them.
2323

articles/active-directory/governance/conditional-access-exclusion.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ ms.reviewer: mwahl
1717
ms.collection: M365-identity-device-management
1818
---
1919

20-
# Use Microsoft Entra access reviews to manage users excluded from Conditional Access policies
20+
# Use access reviews to manage users excluded from Conditional Access policies
2121

2222
In an ideal world, all users follow the access policies to secure access to your organization's resources. However, sometimes there are business cases that require you to make exceptions. This article goes over some examples of situations where exclusions may be necessary. You, as the IT administrator, can manage this task, avoid oversight of policy exceptions, and provide auditors with proof that these exceptions are reviewed regularly using Azure Active Directory (Azure AD) access reviews.
2323

@@ -142,7 +142,7 @@ that is excluded from the policy. Here is a recommended access review where memb
142142
![Create an access review pane for example 2](./media/conditional-access-exclusion/create-access-review-2.png)
143143

144144
>[!IMPORTANT]
145-
>If you have many exclusion groups and therefore need to create multiple access reviews, we now have an API in the Microsoft Graph beta endpoint that allows you to create and manage them programmatically. To get started, see the [Microsoft Entra access reviews API reference](/graph/api/resources/accessreviewsv2-overview) and [Example of retrieving Microsoft Entra access reviews via Microsoft Graph](https://techcommunity.microsoft.com/t5/Azure-Active-Directory/Example-of-retrieving-Azure-AD-access-reviews-via-Microsoft/td-p/236096).
145+
>If you have many exclusion groups and therefore need to create multiple access reviews, we now have an API in the Microsoft Graph beta endpoint that allows you to create and manage them programmatically. To get started, see the [access reviews API reference](/graph/api/resources/accessreviewsv2-overview) and [Example of retrieving access reviews via Microsoft Graph](https://techcommunity.microsoft.com/t5/Azure-Active-Directory/Example-of-retrieving-Azure-AD-access-reviews-via-Microsoft/td-p/236096).
146146
147147
## Access review results and audit logs
148148

@@ -160,7 +160,7 @@ Now that you have everything in place, group, Conditional Access policy, and acc
160160

161161
![Access reviews audit logs listing actions](./media/conditional-access-exclusion/access-reviews-audit-logs.png)
162162

163-
As an IT administrator, you know that managing exclusion groups to your policies is sometimes inevitable. However, maintaining these groups, reviewing them on a regular basis by the business owner or the users themselves, and auditing these changes can be made easier with Microsoft Entra access reviews.
163+
As an IT administrator, you know that managing exclusion groups to your policies is sometimes inevitable. However, maintaining these groups, reviewing them on a regular basis by the business owner or the users themselves, and auditing these changes can be made easier with access reviews.
164164

165165
## Next steps
166166

articles/active-directory/governance/deploy-access-reviews.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -442,5 +442,5 @@ For more advanced queries and analysis of access reviews, and to track changes a
442442

443443
Learn about the following related technologies:
444444

445-
* [What is Microsoft Entra entitlement management?](entitlement-management-overview.md)
446-
* [What is Microsoft Entra Privileged Identity Management?](../privileged-identity-management/pim-configure.md)
445+
* [What is Microsoft entitlement management?](entitlement-management-overview.md)
446+
* [What is Microsoft Privileged Identity Management?](../privileged-identity-management/pim-configure.md)

articles/active-directory/governance/entitlement-management-access-package-approval-policy.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title: Change approval settings for an access package in Microsoft Entra entitlement management - Azure Active Directory
3-
description: Learn how to change approval and requestor information settings for an access package in Azure Active Directory entitlement management.
2+
title: Change approval settings for an access package in entitlement management - Microsoft Entra
3+
description: Learn how to change approval and requestor information settings for an access package in entitlement management.
44
services: active-directory
55
documentationCenter: ''
66
author: owinfreyATL
@@ -20,7 +20,7 @@ ms.collection: M365-identity-device-management
2020
#Customer intent: As an administrator, I want detailed information about how I can edit an access package so that requestors have the resources they need to perform their job.
2121

2222
---
23-
# Change approval and requestor information settings for an access package in Microsoft Entra entitlement management
23+
# Change approval and requestor information settings for an access package in entitlement management
2424

2525
As an access package manager, you can change the approval and requestor information settings for an access package at any time by editing an existing policy or adding a new policy for requesting access.
2626

articles/active-directory/governance/entitlement-management-access-package-assignments.md

Lines changed: 7 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title: View, add, and remove assignments for an access package in Microsoft Entra entitlement management - Azure Active Directory
3-
description: Learn how to view, add, and remove assignments for an access package in Azure Active Directory entitlement management.
2+
title: View, add, and remove assignments for an access package in entitlement management - Microsoft Entra
3+
description: Learn how to view, add, and remove assignments for an access package in entitlement management.
44
services: active-directory
55
documentationCenter: ''
66
author: owinfreyATL
@@ -20,13 +20,13 @@ ms.collection: M365-identity-device-management
2020
#Customer intent: As an administrator, I want detailed information about how I can edit an access package so that requestors have the resources they need to perform their job.
2121

2222
---
23-
# View, add, and remove assignments for an access package in Microsoft Entra entitlement management
23+
# View, add, and remove assignments for an access package in entitlement management
2424

25-
In Microsoft Entra entitlement management, you can see who has been assigned to access packages, their policy, and status. If an access package has an appropriate policy, you can also directly assign user to an access package. This article describes how to view, add, and remove assignments for access packages.
25+
In entitlement management, you can see who has been assigned to access packages, their policy, and status. If an access package has an appropriate policy, you can also directly assign user to an access package. This article describes how to view, add, and remove assignments for access packages.
2626

2727
## Prerequisites
2828

29-
To use Microsoft Entra entitlement management and assign users to access packages, you must have one of the following licenses:
29+
To use entitlement management and assign users to access packages, you must have one of the following licenses:
3030

3131

3232
- Azure AD Premium P2
@@ -111,7 +111,8 @@ In some cases, you might want to directly assign specific users to an access pac
111111
> When assigning users to an access package, administrators will need to verify that the users are eligible for that access package based on the existing policy requirements. Otherwise, the users won't successfully be assigned to the access package. If the access package contains a policy that requires user requests to be approved, users can't be directly assigned to the package without necessary approval(s) from the designated approver(s).
112112
113113
## Directly assign any user (Preview)
114-
Microsoft Entra Entitlement Management also allows you to directly assign external users to an access package to make collaborating with partners easier. To do this, the access package must have a policy that allows users not yet in your directory to request access.
114+
115+
Entitlement management also allows you to directly assign external users to an access package to make collaborating with partners easier. To do this, the access package must have a policy that allows users not yet in your directory to request access.
115116

116117
**Prerequisite role:** Global administrator, User administrator, Catalog owner, Access package manager or Access package assignment manager
117118

0 commit comments

Comments
 (0)