Skip to content

Commit 9284276

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into ehub-grid-0818
2 parents 3a1f0d8 + 51464ae commit 9284276

File tree

442 files changed

+6051
-2924
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

442 files changed

+6051
-2924
lines changed

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -23981,6 +23981,11 @@
2398123981
"redirect_url": "/azure/active-directory/authentication/howto-mfa-userdevicesettings",
2398223982
"redirect_document_id": true
2398323983
},
23984+
{
23985+
"source_path": "articles/network-watcher/prepare-flow-log.md",
23986+
"redirect_url": "/azure/network-watcher/network-watcher-nsg-flow-logging-overview",
23987+
"redirect_document_id": true
23988+
},
2398423989
{
2398523990
"source_path": "articles/network-watcher/network-watcher-nsg-flow-logging-cli-nodejs.md",
2398623991
"redirect_url": "/azure/network-watcher/network-watcher-nsg-flow-logging-cli",

articles/active-directory-b2c/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -261,6 +261,8 @@
261261
href: https://azure.microsoft.com/roadmap/?category=security-identity
262262
- name: Frequently asked questions
263263
href: active-directory-b2c-faqs.md
264+
- name: Getting help
265+
href: /azure/active-directory/develop/developer-support-help-options
264266
- name: Pricing
265267
href: https://azure.microsoft.com/pricing/details/active-directory-b2c/
266268
- name: Pricing calculator

articles/active-directory/TOC.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -112,9 +112,9 @@
112112
#### [Interpret the sign-in log schema in Azure Monitor](reports-monitoring/reference-azure-monitor-sign-ins-log-schema.md)
113113

114114
### Troubleshoot
115-
#### [Missing audit data](reports-monitoring/troubleshoot-missing-audit-data.md)
115+
#### [Missing data in Azure AD activity logs](reports-monitoring/troubleshoot-missing-audit-data.md)
116116
#### [Missing data in downloads](reports-monitoring/troubleshoot-missing-data-download.md)
117-
#### [Azure AD Activity logs content pack errors](reports-monitoring/troubleshoot-content-pack.md)
117+
#### [Azure AD activity logs content pack errors](reports-monitoring/troubleshoot-content-pack.md)
118118
#### [Errors in Azure AD Reporting API](reports-monitoring/troubleshoot-graph-api.md)
119119

120120
### [Programmatic Access](reports-monitoring/concept-reporting-api.md)

articles/active-directory/develop/quickstart-v1-openid-connect-code.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -406,7 +406,7 @@ Sign in with either a personal Microsoft account or a work or school account, an
406406

407407
For reference, the completed sample (without your configuration values) [is provided as a .zip file](https://github.com/AzureADQuickStarts/WebApp-OpenIDConnect-NodeJS/archive/complete.zip). Alternatively, you can clone it from GitHub:
408408

409-
```git clone --branch complete https://github.com/AzureADQuickStarts/WebApp-OpenIDConnect-NodeJS.git```
409+
```git clone --branch master https://github.com/AzureADQuickStarts/WebApp-OpenIDConnect-NodeJS.git```
410410

411411
You can now move onto more advanced topics. You might want to try:
412412

40.3 KB
Loading
44.3 KB
Loading

articles/active-directory/reports-monitoring/overview-activity-logs-in-azure-monitor.md

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -131,6 +131,16 @@ This section answers frequently asked questions and discusses known issues with
131131

132132
---
133133

134+
**Q: How do I integrate Azure AD activity logs with my SIEM system?**
135+
136+
**A**: You can do this in two ways:
137+
138+
- Use Azure Monitor with Event Hubs to stream logs to your SIEM system. First, [stream the logs to an event hub](quickstart-azure-monitor-stream-logs-to-event-hub.md) and then [set up your SIEM tool](quickstart-azure-monitor-stream-logs-to-event-hub.md#access-data-from-your-event-hub) with the configured event hub.
139+
140+
- Use the [Reporting Graph API](concept-reporting-api.md) to access the data, and push it into the SIEM system using your own scripts.
141+
142+
---
143+
134144
**Q: What SIEM tools are currently supported?**
135145

136146
**A**: Currently, Azure Monitor is supported by [Splunk](tutorial-integrate-activity-logs-with-splunk.md), QRadar, and [Sumo Logic](https://help.sumologic.com/Send-Data/Applications-and-Other-Data-Sources/Azure_Active_Directory). For more information about how the connectors work, see [Stream Azure monitoring data to an event hub for consumption by an external tool](../../monitoring-and-diagnostics/monitor-stream-monitoring-data-event-hubs.md).

articles/active-directory/reports-monitoring/reports-faq.md

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -128,6 +128,12 @@ This article includes answers to frequently asked questions about Azure Active D
128128

129129
---
130130

131+
**Q: What does the risk event "Sign-in with additional risk detected" signify?**
132+
133+
**A:** To give you an insight into all the risky sign-ins in your environment, "Sign-in with additional risk detected" functions as placeholder for sign-ins for detections that are exclusive to Azure AD Identity Protection subscribers.
134+
135+
---
136+
131137
## Conditional access
132138

133139
**Q: What's new with this feature?**

articles/active-directory/reports-monitoring/troubleshoot-missing-audit-data.md

Lines changed: 50 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22

3-
title: 'Troubleshoot: Missing data in the Azure Active Directory activity log | Microsoft Docs'
4-
description: Lists the various available reports for Azure Active Directory
3+
title: 'Troubleshoot Missing data in the Azure Active Directory activity logs | Microsoft Docs'
4+
description: Provides you with a resolution to missing data in Azure Active Directory activity logs.
55
services: active-directory
66
documentationcenter: ''
77
author: priyamohanram
@@ -21,17 +21,38 @@ ms.reviewer: dhanyahk
2121

2222
---
2323

24-
# Troubleshoot: Missing data in the Azure Active Directory activity log
24+
# Troubleshoot: Missing data in the Azure Active Directory activity logs
2525

26+
## I can't find audit logs for recent actions in the Azure portal
2627

27-
## Symptoms
28+
### Symptoms
2829

2930
I performed some actions in the Azure portal and expected to see the audit logs for those actions in the `Activity logs > Audit Logs` blade, but I can’t find them.
3031

3132
![Reporting](./media/troubleshoot-missing-audit-data/01.png)
3233

34+
### Cause
3335

34-
## Cause
36+
Actions don’t appear immediately in the activity logs. The table below enumerates our latency numbers for activity logs.
37+
38+
| Report |   | Latency (P95) | Latency (P99) |
39+
|--------|--------|---------------|---------------|
40+
| Directory audit |   | 2 mins | 5 mins |
41+
| Sign-in activity |   | 2 mins | 5 mins |
42+
43+
### Resolution
44+
45+
Wait for 15 minutes to two hours and see if the actions appear in the log. If you don’t see the logs even after two hours, please [file a support ticket](https://portal.azure.com/#blade/Microsoft_Azure_Support/HelpAndSupportBlade/newsupportrequest) and we will look into it.
46+
47+
## I can’t find recent user sign-ins in the Azure Active Directory sign-ins activity log
48+
49+
### Symptoms
50+
51+
I recently signed into the Azure portal and expected to see the sign-in logs for those actions in the `Activity logs > Sign-ins` blade, but I can’t find them.
52+
53+
![Reporting](./media/troubleshoot-missing-audit-data/02.png)
54+
55+
### Cause
3556

3657
Actions don’t appear immediately in the activity logs. The table below enumerates our latency numbers for activity logs.
3758

@@ -40,13 +61,36 @@ Actions don’t appear immediately in the activity logs. The table below enumera
4061
| Directory audit |   | 2 mins | 5 mins |
4162
| Sign-in activity |   | 2 mins | 5 mins |
4263

43-
## Resolution
64+
### Resolution
4465

4566
Wait for 15 minutes to two hours and see if the actions appear in the log. If you don’t see the logs even after two hours, please [file a support ticket](https://portal.azure.com/#blade/Microsoft_Azure_Support/HelpAndSupportBlade/newsupportrequest) and we will look into it.
4667

68+
## I can't view more than 30 days of report data in the Azure portal
69+
70+
### Symptoms
71+
72+
I can't view more than 30 days of sign-in and audit data from the Azure portal. Why?
73+
74+
![Reporting](./media/troubleshoot-missing-audit-data/03.png)
75+
76+
### Cause
77+
78+
Depending on your license, Azure Active Directory Actions stores activity reports for the following durations:
79+
80+
| Report |   | Azure AD Free | Azure AD Premium P1 | Azure AD Premium P2 |
81+
| --- | ---- | --- | --- | --- |
82+
| Directory Audit |   | 7 days | 30 days | 30 days |
83+
| Sign-in Activity |   | Not available. You can access your own sign-ins for 7 days from the individual user profile blade | 30 days | 30 days |
84+
85+
For more information, see [Azure Active Directory report retention policies](reference-reports-data-retention.md).
86+
87+
### Resolution
88+
89+
You have two options to retain the data for longer than 30 days. You can use the [Azure AD Reporting APIs](concept-reporting-api.md) to retrieve the data programmatically and store it in a database. Alternatively, you can integrate audit logs into a third party SIEM system like Splunk or SumoLogic.
4790

4891
## Next steps
4992

93+
* [Azure AD reporting retention](reference-reports-data-retention.md).
5094
* [Azure Active Directory reporting latencies](reference-reports-latencies.md).
5195
* [Azure Active Directory reporting FAQ](reports-faq.md).
5296

articles/active-directory/saas-apps/dropboxforbusiness-tutorial.md

Lines changed: 51 additions & 52 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.workload: identity
1414
ms.tgt_pltfrm: na
1515
ms.devlang: na
1616
ms.topic: article
17-
ms.date: 11/29/2017
17+
ms.date: 08/20/2018
1818
ms.author: jeedes
1919

2020
---
@@ -46,30 +46,32 @@ To test the steps in this tutorial, you should follow these recommendations:
4646
- If you don't have an Azure AD trial environment, you can [get a one-month trial](https://azure.microsoft.com/pricing/free-trial/).
4747

4848
## Scenario description
49-
In this tutorial, you test Azure AD single sign-on in a test environment.
49+
50+
In this tutorial, you test Azure AD single sign-on in a test environment.
5051
The scenario outlined in this tutorial consists of two main building blocks:
5152

5253
1. Adding Dropbox for Business from the gallery
53-
1. Configuring and testing Azure AD single sign-on
54+
2. Configuring and testing Azure AD single sign-on
5455

5556
## Adding Dropbox for Business from the gallery
57+
5658
To configure the integration of Dropbox for Business into Azure AD, you need to add Dropbox for Business from the gallery to your list of managed SaaS apps.
5759

5860
**To add Dropbox for Business from the gallery, perform the following steps:**
5961

60-
1. In the **[Azure portal](https://portal.azure.com)**, on the left navigation panel, click **Azure Active Directory** icon.
62+
1. In the **[Azure portal](https://portal.azure.com)**, on the left navigation panel, click **Azure Active Directory** icon.
6163

6264
![The Azure Active Directory button][1]
6365

64-
1. Navigate to **Enterprise applications**. Then go to **All applications**.
66+
2. Navigate to **Enterprise applications**. Then go to **All applications**.
6567

6668
![The Enterprise applications blade][2]
67-
68-
1. To add new application, click **New application** button on the top of dialog.
69+
70+
3. To add new application, click **New application** button on the top of dialog.
6971

7072
![The New application button][3]
7173

72-
1. In the search box, type **Dropbox for Business**, select **Dropbox for Business** from result panel then click **Add** button to add the application.
74+
4. In the search box, type **Dropbox for Business**, select **Dropbox for Business** from result panel then click **Add** button to add the application.
7375

7476
![Dropbox for Business in the results list](./media/dropboxforbusiness-tutorial/tutorial_dropboxforbusiness_addfromgallery.png)
7577

@@ -84,10 +86,10 @@ In Dropbox for Business, assign the value of the **user name** in Azure AD as th
8486
To configure and test Azure AD single sign-on with Dropbox for Business, you need to complete the following building blocks:
8587

8688
1. **[Configure Azure AD Single Sign-On](#configure-azure-ad-single-sign-on)** - to enable your users to use this feature.
87-
1. **[Create an Azure AD test user](#create-an-azure-ad-test-user)** - to test Azure AD single sign-on with Britta Simon.
88-
1. **[Create a Dropbox for Business test user](#create-a-dropbox-for-business-test-user)** - to have a counterpart of Britta Simon in Dropbox for Business that is linked to the Azure AD representation of user.
89-
1. **[Assign the Azure AD test user](#assign-the-azure-ad-test-user)** - to enable Britta Simon to use Azure AD single sign-on.
90-
1. **[Test single sign-on](#test-single-sign-on)** - to verify whether the configuration works.
89+
2. **[Create an Azure AD test user](#create-an-azure-ad-test-user)** - to test Azure AD single sign-on with Britta Simon.
90+
3. **[Create a Dropbox for Business test user](#create-a-dropbox-for-business-test-user)** - to have a counterpart of Britta Simon in Dropbox for Business that is linked to the Azure AD representation of user.
91+
4. **[Assign the Azure AD test user](#assign-the-azure-ad-test-user)** - to enable Britta Simon to use Azure AD single sign-on.
92+
5. **[Test single sign-on](#test-single-sign-on)** - to verify whether the configuration works.
9193

9294
### Configure Azure AD single sign-on
9395

@@ -99,71 +101,68 @@ In this section, you enable Azure AD single sign-on in the Azure portal and conf
99101

100102
![Configure single sign-on link][4]
101103

102-
1. On the **Single sign-on** dialog, select **Mode** as **SAML-based Sign-on** to enable single sign-on.
104+
2. On the **Single sign-on** dialog, select **Mode** as **SAML-based Sign-on** to enable single sign-on.
103105

104106
![Single sign-on dialog box](./media/dropboxforbusiness-tutorial/tutorial_dropboxforbusiness_samlbase.png)
105107

106-
1. On the **Dropbox for Business Domain and URLs** section, perform the following steps:
108+
3. On the **Dropbox for Business Domain and URLs** section, perform the following steps:
107109

108110
![Dropbox for Business Domain and URLs single sign-on information](./media/dropboxforbusiness-tutorial/tutorial_dropboxforbusiness_url1.png)
109111

110112
a. In the **Sign-on URL** textbox, type a URL using the following pattern: `https://www.dropbox.com/sso/<id>`
111113

112114
b. In the **Identifier** textbox, type a value: `Dropbox`
113115

114-
> [!NOTE]
115-
> The preceding Sign-on URL value is not real value. You will update the value with the actual Sign-on URL, which is explained later in the tutorial. Contact [Dropbox for Business Client support team](https://www.dropbox.com/business/contact) to get the value.
116-
116+
> [!NOTE]
117+
> The preceding Sign-on URL value is not real value. You will update the value with the actual Sign-on URL, which is explained later in the tutorial.
117118

118-
1. On the **SAML Signing Certificate** section, click **Certificate (Base64)** and then save the certificate file on your computer.
119+
4. On the **SAML Signing Certificate** section, click **Certificate (Base64)** and then save the certificate file on your computer.
119120

120121
![The Certificate download link](./media/dropboxforbusiness-tutorial/tutorial_dropboxforbusiness_certificate.png)
121122

122-
1. Click **Save** button.
123+
5. Click **Save** button.
123124

124125
![Configure Single Sign-On Save button](./media/dropboxforbusiness-tutorial/tutorial_general_400.png)
125126

126-
1. On the **Dropbox for Business Configuration** section, click **Configure Dropbox for Business** to open **Configure sign-on** window. Copy the **SAML Single Sign-On Service URL** from the **Quick Reference section.**
127+
6. On the **Dropbox for Business Configuration** section, click **Configure Dropbox for Business** to open **Configure sign-on** window. Copy the **SAML Single Sign-On Service URL** from the **Quick Reference section.**
127128

128129
![Dropbox for Business Configuration](./media/dropboxforbusiness-tutorial/tutorial_dropboxforbusiness_configure.png)
129130

130-
1. To configure single sign-on on **Dropbox for Business** side, Go on your Dropbox for Business tenant.
131+
7. To configure single sign-on on **Dropbox for Business** side, Go on your Dropbox for Business tenant and sign on to your Dropbox for business tenant.
131132

132-
a. Sign on to your Dropbox for business tenant.
133-
134133
![Configure single sign-on](./media/dropboxforbusiness-tutorial/ic769509.png "Configure single sign-on")
135-
136-
b. In the navigation pane on the left side, click **Admin Console**.
137-
138-
![Configure single sign-on](./media/dropboxforbusiness-tutorial/ic769510.png "Configure single sign-on")
139-
140-
c. On the **Admin Console**, click **Authentication** in the left navigation pane.
141-
142-
![Configure single sign-on](./media/dropboxforbusiness-tutorial/ic769511.png "Configure single sign-on")
143-
144-
d. In the **Single sign-on** section, select **Enable single sign-on**, and then click **More** to expand this section.
145-
146-
![Configure single sign-on](./media/dropboxforbusiness-tutorial/ic769512.png "Configure single sign-on")
147-
148-
e. Copy the URL next to **Users can sign in by entering their email address or they can go directly to** and paste it into the **Sign-on URL** textbox of **Dropbox for Business Domain and URLs** section on Azure portal.
149-
150-
![Configure single sign-on](./media/dropboxforbusiness-tutorial/ic769513.png)
151-
152-
1. In the **Single sign-on** section of the **Authentication** page, perform the following steps:
153-
154-
![Configure single sign-on](./media/dropboxforbusiness-tutorial/IC769516.png "Configure single sign-on")
155-
156-
a. Click **Required**.
157-
158-
b. In the **Sign-in URL** textbox, paste the value of **SAML Single Sign-On Service URL** which you have copied from the Azure portal.
159134

160-
c. Click **Choose certificate**, and then browse to your **Base64 encoded certificate file**.
135+
8. Click on the **User Icon** and select **Settings** tab.
136+
137+
![Configure single sign-on](./media/dropboxforbusiness-tutorial/configure1.png "Configure single sign-on")
138+
139+
9. In the navigation pane on the left side, click **Admin console**.
140+
141+
![Configure single sign-on](./media/dropboxforbusiness-tutorial/configure2.png "Configure single sign-on")
142+
143+
10. On the **Admin console**, click **Settings** in the left navigation pane.
144+
145+
![Configure single sign-on](./media/dropboxforbusiness-tutorial/configure3.png "Configure single sign-on")
146+
147+
11. Select **Single sign-on** option under the **Authentication** section.
148+
149+
![Configure single sign-on](./media/dropboxforbusiness-tutorial/configure4.png "Configure single sign-on")
150+
151+
12. In the **Single sign-on** section, perform the following steps:
152+
153+
![Configure single sign-on](./media/dropboxforbusiness-tutorial/configure5.png "Configure single sign-on")
154+
155+
a. Select **Required** as a option from the dropdown for the **Single sign-on**.
156+
157+
b. Click on **Add sign-in URL** and in the **Identity provider sign-in URL** textbox, paste the **SAML Single Sign-On Service URL** value which you have copied from the Azure portal and then select **Done**.
158+
159+
![Configure single sign-on](./media/dropboxforbusiness-tutorial/configure6.png "Configure single sign-on")
160+
161+
c. Click **Upload certificate**, and then browse to your **Base64 encoded certificate file** which you have downloaded from the Azure portal.
161162

162-
d. Click **Save changes** to complete the configuration on your DropBox for Business tenant.
163+
d. Click on **Copy link** and paste the copied value into the **Sign-on URL** textbox of **Dropbox for Business Domain and URLs** section on Azure portal.
163164

164-
> [!TIP]
165-
> You can now read a concise version of these instructions inside the [Azure portal](https://portal.azure.com), while you are setting up the app! After adding this app from the **Active Directory > Enterprise Applications** section, simply click the **Single Sign-On** tab and access the embedded documentation through the **Configuration** section at the bottom. You can read more about the embedded documentation feature here: [Azure AD embedded documentation]( https://go.microsoft.com/fwlink/?linkid=845985)
166-
>
165+
e. Click **Save**.
167166

168167
### Create an Azure AD test user
169168

0 commit comments

Comments
 (0)