You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+5-11Lines changed: 5 additions & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -10,19 +10,13 @@ Contributing to open source is more than just providing updates, it's also about
10
10
11
11
You've decided to contribute, that's great! To contribute to the documentation, you need a few tools.
12
12
13
-
Contributing to the documentation requires a GitHub account. If you don't have an account, follow the instructions for the [GitHub account setup](/contribute/get-started-setup-github) from our contributor guide.
13
+
#### Github
14
14
15
-
#### Download
15
+
Contributing to the documentation requires a GitHub account. If you don't have an account, follow the instructions for [GitHub account setup](https://docs.microsoft.com/contribute/get-started-setup-github) from our contributor guide.
16
16
17
-
Install the following tools:
17
+
#### Tools
18
18
19
-
*[Git](https://git-scm.com/download)
20
-
*[Visual Studio Code](https://code.visualstudio.com/Download)
21
-
*[Docs Authoring Pack](https://marketplace.visualstudio.com/items?itemName=docsmsft.docs-authoring-pack) extension for Visual Studio Code
22
-
23
-
#### Install
24
-
25
-
Follow the instructions provided in the [Install content authoring tools](/contribute/get-started-setup-tools) from our contributor guide.
19
+
To install necessary tools, follow the instructions for [Install content authoring tools](https://docs.microsoft.com/contribute/get-started-setup-tools) from our contributor guide.
26
20
27
21
## License
28
22
@@ -31,4 +25,4 @@ Please refer to [LICENSE](LICENSE), [LICENSE-CODE](LICENSE-CODE) and [ThirdParty
31
25
## Code of Conduct
32
26
33
27
This project has adopted the [Microsoft Open Source Code of Conduct](https://opensource.microsoft.com/codeofconduct/).
34
-
For more information, see the [Code of Conduct FAQ](https://opensource.microsoft.com/codeofconduct/faq/) or contact [[email protected]](mailto:[email protected]) with any additional questions or comments.
28
+
For more information, see the [Code of Conduct FAQ](https://opensource.microsoft.com/codeofconduct/faq/) or contact [[email protected]](mailto:[email protected]) with any additional questions or comments.
Copy file name to clipboardExpand all lines: articles/active-directory/identity-protection/howto-identity-protection-graph-api.md
+42-60Lines changed: 42 additions & 60 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,83 +15,65 @@ ms.reviewer: sahandle
15
15
16
16
ms.collection: M365-identity-device-management
17
17
---
18
-
# Azure Active Directory Identity Protection and the Microsoft Graph PowerShell SDK
18
+
# Azure Active Directory Identity Protection and the Microsoft Graph PowerShell
19
19
20
-
Microsoft Graph is the Microsoft unified API endpoint and the home of [Azure Active Directory Identity Protection](./overview-identity-protection.md) APIs. This article will show you how to use the [Microsoft Graph PowerShell SDK](/powershell/microsoftgraph/get-started) to get risky user details using PowerShell. Organizations that want to query the Microsoft Graph APIs directly can use the article, [Tutorial: Identify and remediate risks using Microsoft Graph APIs](/graph/tutorial-riskdetection-api) to begin that journey.
20
+
Microsoft Graph is the Microsoft unified API endpoint and the home of [Azure Active Directory Identity Protection](./overview-identity-protection.md) APIs. This article will show you how to use the [Microsoft Graph PowerShell SDK](/powershell/microsoftgraph/get-started) to manage risky users using PowerShell. Organizations that want to query the Microsoft Graph APIs directly can use the article, [Tutorial: Identify and remediate risks using Microsoft Graph APIs](/graph/tutorial-riskdetection-api) to begin that journey.
21
21
22
-
## Connect to Microsoft Graph
22
+
To successfully complete this tutorial, make sure you have the required prerequisites:
23
23
24
-
There are four steps to accessing Identity Protection data through Microsoft Graph:
25
-
26
-
1.[Create a certificate](#create-a-certificate)
27
-
1.[Create a new app registration](#create-a-new-app-registration)
28
-
1.[Configure API permissions](#configure-api-permissions)
29
-
1.[Configure a valid credential](#configure-a-valid-credential)
30
-
31
-
### Create a certificate
32
-
33
-
In a production environment you would use a certificate from your production Certificate Authority, but in this sample we'll use a self-signed certificate. Create and export the certificate using the following PowerShell commands.
24
+
- Microsoft Graph PowerShell SDK is installed. Follow the [installation guide](/powershell/microsoftgraph/installation?view=graph-powershell-1.0) for more info on how to do this.
25
+
- Identity Protection is available in the beta version of Microsoft Graph PowerShell. Run the following command to set your profile to beta.
26
+
```powershell
27
+
# Connect to Graph beta Endpoint
28
+
Select-MgProfile -Name 'beta'
29
+
```
30
+
- Microsoft Graph PowerShell using a global administrator role and the appropriate permissions. The IdentityRiskEvent.Read.All, IdentityRiskyUser.ReadWrite.All Or IdentityRiskyUser.ReadWrite.All delegated permissions are required. To set the permissions to IdentityRiskEvent.Read.All and IdentityRiskyUser.ReadWrite.All, run:
Or, if you use app-only authentication, you may follow this [guide](/powershell/microsoftgraph/app-only?view=graph-powershell-1.0&tabs=azure-portal). To register an application with the required application permissions, prepare a certificate and run:
Connect-MgGraph -ClientID YOUR_APP_ID -TenantId YOUR_TENANT_ID -CertificateName YOUR_CERT_SUBJECT ## Or -CertificateThumbprint instead of -CertificateName
38
38
```
39
39
40
-
### Create a new app registration
41
-
42
-
1. In the Azure portal, browse to **Azure Active Directory** > **App registrations**.
43
-
1. Select **New registration**.
44
-
1. On the **Create** page, perform the following steps:
45
-
1. In the **Name** textbox, type a name for your application (for example: Azure AD Risk Detection API).
46
-
1. Under **Supported account types**, select the type of accounts that will use the APIs.
47
-
1. Select **Register**.
48
-
1. Take note of the **Application (client) ID** and **Directory (tenant) ID** as you'll need these items later.
49
-
50
-
### Configure API permissions
51
-
52
-
In this example, we configure application permissions allowing this sample to be used unattended. If granting permissions to a user who will be logged on, choose delegated permissions instead. More information about different permission types can be found in the article, [Permissions and consent in the Microsoft identity platform](../develop/v2-permissions-and-consent.md#permission-types).
53
-
54
-
1. From the **Application** you created, select **API permissions**.
55
-
1. On the **Configured permissions** page, in the toolbar on the top, click **Add a permission**.
56
-
1. On the **Add API access** page, click **Select an API**.
57
-
1. On the **Select an API** page, select **Microsoft Graph**, and then click **Select**.
58
-
1. On the **Request API permissions** page:
59
-
1. Select **Application permissions**.
60
-
1. Select the checkboxes next to `IdentityRiskEvent.Read.All` and `IdentityRiskyUser.Read.All`.
61
-
1. Select **Add permissions**.
62
-
1. Select **Grant admin consent for domain**
63
-
64
-
### Configure a valid credential
40
+
## List risky detections using PowerShell
41
+
You can retrieve the risk detections by the properties of a risk detection in Identity Protection.
To enable the ability to query Microsoft Graph, we need to install the `Microsoft.Graph` module in our PowerShell window, using the `Install-Module Microsoft.Graph` command.
75
-
76
-
Modify the following variables to include the information generated in the previous steps, then run them as a whole to get risky user details using PowerShell.
77
-
51
+
You can retrieve the risky users and their risky histories in Identity Protection.
78
52
```powershell
79
-
$ClientID = "<your client ID here>" # Application (client) ID gathered when creating the app registration
80
-
$tenantdomain = "<your tenant domain here>" # Directory (tenant) ID gathered when creating the app registration
81
-
$Thumbprint = "<your client secret here>" # Certificate thumbprint gathered when configuring your credential
Copy file name to clipboardExpand all lines: articles/azure-arc/servers/learn/quick-enable-hybrid-vm.md
+1-3Lines changed: 1 addition & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -16,7 +16,7 @@ In this quickstart, you'll deploy and configure the Azure Connected Machine agen
16
16
17
17
* An Azure account with an active subscription. [Create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
18
18
* Deploying the Connected Machine agent on a machine requires that you have administrator permissions to install and configure the agent. On Linux this is done by using the root account, and on Windows, with an account that is a member of the Local Administrators group.
19
-
* The Microsoft.HybridCompute, Microsoft.GuestConfiguration, and Microsoft.HybridConnectivity resource providers must be registered on your subscription. You can [register these resource providers ahead of time](../prerequisites.md#azure-resource-providers), or while completing the steps in this quickstart.
19
+
* The Microsoft.HybridCompute, Microsoft.GuestConfiguration, and Microsoft.HybridConnectivity resource providers must be registered on your subscription. Please [register these resource providers ahead of time](../prerequisites.md#azure-resource-providers).
20
20
* Before you get started, be sure to review the [agent prerequisites](../prerequisites.md) and verify the following:
21
21
* Your target machine is running a supported [operating system](../prerequisites.md#supported-operating-systems).
22
22
* Your account has the [required Azure built-in roles](../prerequisites.md#required-permissions).
@@ -52,8 +52,6 @@ Use the Azure portal to create a script that automates the agent download and in
52
52
53
53
1. On the **Tags** page, review the default **Physical location tags** suggested and enter a value, or specify one or more **Custom tags** to support your standards. Then select **Next**.
54
54
55
-
1. On the **Download and run script** page, select the **Register** button to register the required resource providers in your subscription, if you haven't already done so.
56
-
57
55
1. In the **Download or copy the following script** section, review the script. If you want to make any changes, use the **Previous** button to go back and update your selections. Otherwise, select **Download** to save the script file.
Copy file name to clipboardExpand all lines: articles/azure-vmware/vmware-hcx-mon-guidance.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -23,7 +23,7 @@ ms.date: 04/11/2022
23
23
24
24
[HCX Mobility Optimized Networking (MON)](https://docs.vmware.com/en/VMware-HCX/4.2/hcx-user-guide/GUID-0E254D74-60A9-479C-825D-F373C41F40BC.html) is an optional feature to enable when using [HCX Network Extensions (NE)](configure-hcx-network-extension.md). MON provides optimal traffic routing under certain scenarios to prevent network tromboning between the on-premises and cloud-based resources on extended networks.
25
25
26
-
As MON is an enterprise capability of the NE feature, make sure you've enabled the [VMware HCX Enterprise](https://cloud.vmware.com/community/2019/08/08/introducing-hcx-enterprise/) add-on through a [support request](https://portal.azure.com/#create/Microsoft.Support). VMware HCX Enterprise Edition will be available for customers to add and run with their Azure VMware Solution environment free of charge until 10/1/2022.
26
+
As MON is an enterprise capability of the NE feature, make sure you've enabled the [VMware HCX Enterprise](https://cloud.vmware.com/community/2019/08/08/introducing-hcx-enterprise/) add-on through a [support request](https://portal.azure.com/#create/Microsoft.Support).
27
27
28
28
Throughout the migration cycle, MON optimizes application mobility for:
0 commit comments