Skip to content

Commit 9128606

Browse files
committed
Bringing even with master.
2 parents 57cca89 + 4362696 commit 9128606

File tree

161 files changed

+1786
-768
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

161 files changed

+1786
-768
lines changed

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -28561,6 +28561,11 @@
2856128561
"source_path": "articles/application-insights/open-census-python.md",
2856228562
"redirect_url": "/azure/application-insights/app-insights-overview",
2856328563
"redirect_document_id" : false
28564+
},
28565+
{
28566+
"source_path": "articles/application-insights/app-insights-troubleshoot-snapshot-debugger.md",
28567+
"redirect_url": "/azure/application-insights/app-insights-snapshot-debugger",
28568+
"redirect_document_id" : false
2856428569
}
2856528570
]
2856628571
}

articles/active-directory-domain-services/TOC.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -44,6 +44,7 @@
4444
### [Create a group managed service account on a managed domain](active-directory-ds-create-gmsa.md)
4545
### [Administer group policy on a managed domain](active-directory-ds-admin-guide-administer-group-policy.md)
4646
### [Configure password polices on a managed domain](active-directory-ds-password-policy.md)
47+
### [Configure scoped synchronization from Azure AD to a managed domain](active-directory-ds-scoped-synchronization.md)
4748
## [Select a virtual network](active-directory-ds-networking.md)
4849
## Deploy applications
4950
### [Configure support for profile synchronization for SharePoint Server](active-directory-ds-enable-sharepoint-profile-sync.md)
Lines changed: 162 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,162 @@
1+
---
2+
title: 'Azure Active Directory Domain Services: Scoped synchronization | Microsoft Docs'
3+
description: Configure scoped synchronization from Azure AD to your managed domains
4+
services: active-directory-ds
5+
documentationcenter: ''
6+
author: mahesh-unnikrishnan
7+
manager: mtillman
8+
editor: curtand
9+
10+
ms.assetid: 9389cf0f-0036-4b17-95da-80838edd2225
11+
ms.service: active-directory
12+
ms.component: domains
13+
ms.workload: identity
14+
ms.tgt_pltfrm: na
15+
ms.devlang: na
16+
ms.topic: article
17+
ms.date: 09/19/2018
18+
ms.author: maheshu
19+
20+
---
21+
# Configure scoped synchronization from Azure AD to your managed domain
22+
This article shows you how to configure only specific user accounts to be synchronized from your Azure AD directory to your Azure AD Domain Services managed domain.
23+
24+
25+
## Group-based scoped synchronization
26+
By default, all users and groups within your Azure AD directory are synchronized to your managed domain. If the managed domain is being used only by a few users, you may prefer to synchronize only those user accounts to the managed domain. Group-based scoped synchronization enables you to do so. When configured, only user accounts belonging to the groups you've specified are synchronized to the managed domain.
27+
28+
29+
## Get started: Install the required PowerShell modules
30+
31+
### Install and configure Azure AD PowerShell
32+
Follow the instructions in the article to [install the Azure AD PowerShell module and connect to Azure AD](https://docs.microsoft.com/powershell/azure/active-directory/install-adv2?toc=%2fazure%2factive-directory-domain-services%2ftoc.json).
33+
34+
### Install and configure Azure PowerShell
35+
Follow the instructions in the article to [install the Azure PowerShell module and connect to your Azure subscription](https://docs.microsoft.com/powershell/azure/install-azurerm-ps?toc=%2fazure%2factive-directory-domain-services%2ftoc.json).
36+
37+
38+
39+
## Enable group-based scoped synchronization
40+
Complete the following steps to configure group-based scoped synchronization to your managed domain:
41+
42+
1. Select the groups you want to sync and provide the display name of the groups you want synchronized to your managed domain.
43+
44+
2. Save the script in the following section to a file called ```Select-GroupsToSync.ps1```. Execute the script like below:
45+
46+
```powershell
47+
.\Select-GroupsToSync.ps1 -groupsToAdd @(“GroupName1”, “GroupName2”)
48+
```
49+
50+
3. Now, enable group-based scoped synchronization for the managed domain.
51+
52+
```powershell
53+
// Login to your Azure AD tenant
54+
Login-AzureRmAccount
55+
56+
// Retrieve the Azure AD Domain Services resource.
57+
$DomainServicesResource = Get-AzureRmResource -ResourceType "Microsoft.AAD/DomainServices"
58+
59+
// Enable group-based scoped synchronization.
60+
$enableScopedSync = @{"filteredSync" = "Enabled"}
61+
62+
Set-AzureRmResource -Id $DomainServicesResource.ResourceId -Properties $enableScopedSync
63+
```
64+
65+
## Disable group-based scoped synchronization
66+
Use the following PowerShell script to disable group-based scoped synchronization for your managed domain:
67+
68+
```powershell
69+
// Login to your Azure AD tenant
70+
Login-AzureRmAccount
71+
72+
// Retrieve the Azure AD Domain Services resource.
73+
$DomainServicesResource = Get-AzureRmResource -ResourceType "Microsoft.AAD/DomainServices"
74+
75+
// Disable group-based scoped synchronization.
76+
$disableScopedSync = @{"filteredSync" = "Disabled"}
77+
78+
Set-AzureRmResource -Id $DomainServicesResource.ResourceId -Properties $disableScopedSync
79+
```
80+
81+
## Script to select groups to synchronize to the managed domain (Select-GroupsToSync.ps1)
82+
Save the following script to a file (```Select-GroupsToSync.ps1```). This script configures Azure AD Domain Services to synchronize selected groups to the managed domain. All user accounts belonging to the specified groups will be synchronized to the managed domain.
83+
84+
```powershell
85+
param (
86+
[Parameter(Position = 0)]
87+
[String[]]$groupsToAdd
88+
)
89+
90+
Connect-AzureAD
91+
$sp = Get-AzureADServicePrincipal -Filter "AppId eq '2565bd9d-da50-47d4-8b85-4c97f669dc36'"
92+
$role = $sp.AppRoles | where-object -FilterScript {$_.DisplayName -eq "User"}
93+
94+
Write-Output "`n****************************************************************************"
95+
96+
Write-Output "Total group-assignments need to be added: $($groupsToAdd.Count)"
97+
$newGroupIds = New-Object 'System.Collections.Generic.HashSet[string]'
98+
foreach ($groupName in $groupsToAdd)
99+
{
100+
try
101+
{
102+
$group = Get-AzureADGroup -Filter "DisplayName eq '$groupName'"
103+
$newGroupIds.Add($group.ObjectId)
104+
105+
Write-Output "Group-Name: $groupName, Id: $($group.ObjectId)"
106+
}
107+
catch
108+
{
109+
Write-Error "Failed to find group: $groupName. Exception: $($_.Exception)."
110+
}
111+
}
112+
113+
Write-Output "****************************************************************************`n"
114+
Write-Output "`n****************************************************************************"
115+
116+
$currentAssignments = Get-AzureADServiceAppRoleAssignment -ObjectId $sp.ObjectId
117+
Write-Output "Total current group-assignments: $($currentAssignments.Count), SP-ObjectId: $($sp.ObjectId)"
118+
119+
$currAssignedObjectIds = New-Object 'System.Collections.Generic.HashSet[string]'
120+
foreach ($assignment in $currentAssignments)
121+
{
122+
Write-Output "Assignment-ObjectId: $($assignment.PrincipalId)"
123+
124+
if ($newGroupIds.Contains($assignment.PrincipalId) -eq $false)
125+
{
126+
Write-Output "This assignment is not needed anymore. Removing it! Assignment-ObjectId: $($assignment.PrincipalId)"
127+
Remove-AzureADServiceAppRoleAssignment -ObjectId $sp.ObjectId -AppRoleAssignmentId $assignment.ObjectId
128+
}
129+
else
130+
{
131+
$currAssignedObjectIds.Add($assignment.PrincipalId)
132+
}
133+
}
134+
135+
Write-Output "****************************************************************************`n"
136+
Write-Output "`n****************************************************************************"
137+
138+
foreach ($id in $newGroupIds)
139+
{
140+
try
141+
{
142+
if ($currAssignedObjectIds.Contains($id) -eq $false)
143+
{
144+
Write-Output "Adding new group-assignment. Role-Id: $($role.Id), Group-Object-Id: $id, ResourceId: $($sp.ObjectId)"
145+
New-AzureADGroupAppRoleAssignment -Id $role.Id -ObjectId $id -PrincipalId $id -ResourceId $sp.ObjectId
146+
}
147+
else
148+
{
149+
Write-Output "Group-ObjectId: $id is already assigned."
150+
}
151+
}
152+
catch
153+
{
154+
Write-Error "Exception occured assigning Object-ID: $id. Exception: $($_.Exception)."
155+
}
156+
}
157+
158+
Write-Output "****************************************************************************`n"
159+
```
160+
161+
## Next steps
162+
* [Understand synchronization in Azure AD Domain Services](active-directory-ds-synchronization.md)

articles/active-directory/develop/tutorial-v2-ios.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.devlang: na
1414
ms.topic: article
1515
ms.tgt_pltfrm: na
1616
ms.workload: identity
17-
ms.date: 04/09/2018
17+
ms.date: 09/19/2018
1818
ms.author: andret
1919
ms.custom: aaddev
2020
---
Lines changed: 176 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,176 @@
1+
---
2+
title: What is Identity secure score in Azure AD? - preview | Microsoft Docs
3+
description: Learn how you can use the identity secure score to improve the security posture of your Azure AD tenant.
4+
services: active-directory
5+
keywords: identity secure score, Azure AD, secure access to company resources
6+
documentationcenter: ''
7+
author: MarkusVi
8+
manager: mtillman
9+
ms.assetid:
10+
ms.service: active-directory
11+
ms.component: fundamentals
12+
ms.topic: overview
13+
ms.devlang: na
14+
ms.tgt_pltfrm: na
15+
ms.workload: identity
16+
ms.date: 09/19/2018
17+
ms.author: markvi
18+
ms.reviewer: nigu
19+
#Customer intent: As an IT admin, I want understand the identity secure score, so that I can maximize the security posture of my tenant.
20+
---
21+
22+
# What is the identity secure score in Azure AD? - preview
23+
24+
How secure is your Azure AD tenant? If you don't know how to answer this question, read this article to learn how the identity secure score helps you to monitor and improve your identity security posture.
25+
26+
## What is a secure score?
27+
28+
The identity secure score is number between 1 and 248 that functions as indicator for how aligned you are with Microsoft's best practices recommendations for security.
29+
30+
31+
![Secure score](./media/identity-secure-score/01.png)
32+
33+
34+
35+
The score helps you to:
36+
37+
- Objectively measure your identity security posture
38+
39+
- Plan identity security improvements
40+
41+
- Review the success of your improvements
42+
43+
44+
You can access the score and related information on the identity secure score dashboard. On this dashboard, you find:
45+
46+
- Your score
47+
48+
![Secure score](./media/identity-secure-score/02.png)
49+
50+
- A comparison graph
51+
52+
![Secure score](./media/identity-secure-score/03.png)
53+
54+
- A trend graph
55+
56+
![Secure score](./media/identity-secure-score/04.png)
57+
58+
- A list of identity security best practices.
59+
60+
![Secure score](./media/identity-secure-score/05.png)
61+
62+
63+
By following the improvement actions, you can:
64+
65+
- Improve your security posture and your score.
66+
67+
- Take advantage of Microsoft’s Identity features.
68+
69+
The improvement actions take into consideration:
70+
71+
- Privileged accounts
72+
73+
- App management
74+
75+
- Conditional access policies
76+
77+
- Authentication methods
78+
79+
- Auditing and reporting.
80+
81+
82+
## How do I get my secure score?
83+
84+
The Identity Secure Score is available in all editions of Azure AD.
85+
86+
To access your score, go to the [Azure AD Overview dashboard](https://portal.azure.com/#blade/Microsoft_AAD_IAM/ActiveDirectoryMenuBlade/IdentitySecureScore).
87+
88+
89+
90+
## How does it work?
91+
92+
Every 48 hours, Azure looks at your security configuration and compares your settings with the recommended best practices. Based on the outcome of this evaluation, a new score is calculated for your tenant. This means that it can take up to 48 hours until a configuration change you have made is reflected in your score.
93+
94+
Each recommendation is measured based on your Azure AD configuration. If you are using third-party products to enable a best practice recommendation, you can indicate this in the settings of an improvement action.
95+
96+
![Secure score](./media/identity-secure-score/07.png)
97+
98+
99+
Additionally, you also have the option to set recommendations to be ignored if they don't apply to your environment. An ignored recommendation does not contribute to the calculation of your score.
100+
101+
![Secure score](./media/identity-secure-score/06.png)
102+
103+
104+
105+
## How does it help me?
106+
107+
Using the secure score helps increase your organization's security by encouraging you to use the built-in security features such as:
108+
109+
110+
Learning more about these features as you use the tool will help give you piece of mind that you're taking the right steps to protect your organization from threats.
111+
112+
Customers who are using Secure Score have seen their score increase five times more than customers who aren't using it. (The increase in score corresponds with the security features being used in their organizations.)
113+
114+
115+
## What you should know
116+
117+
### Who can use Secure Score?
118+
119+
Anyone who has admin permissions (global admin or a custom admin role) for your Azure AD tenant. Users who aren't assigned an admin role can't access the score. However, admins can use the tool to share their results with other people in their organization.
120+
121+
### What does [Not Scored] mean?
122+
123+
Actions labeled as [Not Scored] are ones you can perform in your organization but won't be scored because they aren't hooked up in the tool (yet!). So, you can still improve your security, but you won't get credit for those actions right now.
124+
125+
### How often is my score updated?
126+
127+
The score is calculated once per day (around 1:00 AM PST). If you make a change to a measured action, the score will automatically update the next day. It takes up to 48 hours for a change to be reflected in your score.
128+
129+
### Who can see my results?
130+
131+
Results are filtered to show scores only to people in your organization who are assigned an admin role (global admin or a custom admin role).
132+
133+
### My score changed. How do I figure out why?
134+
135+
On the score analyzer page on the [secure score portal](https://securescore.microsoft.com/#!/score), click a data point for a specific day, then scroll down to see the completed and incomplete actions for that day to find out what changed.
136+
137+
### Does the Secure Score measure my risk of getting breached?
138+
139+
In short, no. The Secure Score does not express an absolute measure of how likely you are to get breached. It expresses the extent to which you have adopted features that can offset the risk of being breached. No service can guarantee that you will not be breached, and the Secure Score should not be interpreted as a guarantee in any way.
140+
141+
### How should I interpret my score?
142+
143+
You're given points for configuring recommended security features or performing security-related tasks (like reading reports). Some actions are scored for partial completion, like enabling multi-factor authentication (MFA) for your users. Your Secure Score is directly representative of the Microsoft security services you use. Remember that security should always be balanced with usability. All security controls have a user impact component. Controls with low user impact should have little to no effect on your users' day-to-day operations.
144+
145+
To see your score history, go to the score analyzer page on the [secure score portal](https://securescore.microsoft.com/#!/score). Choose a specific date to see which controls were enabled for that day and what points you earned for each one.
146+
147+
148+
### How does the identity secure score relate to the Office 365 secure score?
149+
150+
The [Office 365 secure score](https://docs.microsoft.com/office365/securitycompliance/office-365-secure-score) is about to be migrated into an aggregate of five different scores:
151+
152+
- Identity
153+
154+
- Data
155+
156+
- Devices
157+
158+
- Infrastructure
159+
160+
- Apps
161+
162+
The identity secure score represents the identity part of of the Office 365 secure score. This means that your recommendations for the identity secure score and the identity score in Office 365 are the same.
163+
164+
165+
### I have an idea for another control. How do I let you know what it is?
166+
We'd love to hear from you. Post your ideas on the Office Security, Privacy & Compliance community. We're listening and want the Secure Score to include all options that are important to you.
167+
168+
Something isn't working right. Who should I contact?
169+
If you have any issues, let us know by posting on the Office Security, Privacy & Compliance community. We're monitoring the community and will provide help.
170+
171+
### My organization only has certain security features. Does this affect my score?
172+
The Secure Score calculates your score based on the services you purchased. For example, if you only purchased an Exchange Online plan, you won't be scored for SharePoint Online security features. The denominator of the score is the sum of all the baselines for the controls that apply to the products you purchased. The numerator is the sum of all the controls for which you completed, or partially completed, the actions to fulfill that control.
173+
## Next steps
174+
175+
If you would like to see a video about the Office 365 secure score, click [here](https://www.youtube.com/watch?v=jzfpDJ9Kg-A).
176+
11.3 KB
Loading
4.75 KB
Loading
3.69 KB
Loading
8.24 KB
Loading
15 KB
Loading

0 commit comments

Comments
 (0)