Skip to content

Commit 95a3178

Browse files
committed
[AzureADDS] Resolving TOC merge conflict
2 parents 2863e0e + 8ca01b3 commit 95a3178

File tree

65 files changed

+450
-277
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

65 files changed

+450
-277
lines changed

articles/active-directory-domain-services/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -91,6 +91,8 @@
9191
href: password-policy.md
9292
- name: Enable security audit events
9393
href: security-audit-events.md
94+
- name: Analyze audit events with Azure Monitor Workbooks
95+
href: use-azure-monitor-workbooks.md
9496
- name: Secure remote access to VMs
9597
href: secure-remote-vm-access.md
9698
- name: Domain-join VMs
67.9 KB
Loading
123 KB
Loading
36.4 KB
Loading
127 KB
Loading
77.7 KB
Loading
46.4 KB
Loading
80.3 KB
Loading
Lines changed: 116 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,116 @@
1+
---
2+
title: Use Azure Monitor Workbooks with Azure AD Domain Services | Microsoft Docs
3+
description: Learn how to use Azure Monitor Workbooks to review security audits and understand issues in an Azure Active Directory Domain Services managed domain.
4+
author: iainfoulds
5+
manager: daveba
6+
7+
ms.service: active-directory
8+
ms.subservice: domain-services
9+
ms.workload: identity
10+
ms.topic: conceptual
11+
ms.date: 03/18/2020
12+
ms.author: iainfou
13+
14+
---
15+
# Review security audit events in Azure AD Domain Services using Azure Monitor Workbooks
16+
17+
To help you understand the state of your Azure Active Directory Domain Services (Azure AD DS) managed domain, you can enable security audit events. These security audit events can then be reviewed using Azure Monitor Workbooks that combine text, analytics queries, and parameters into rich interactive reports. Azure AD DS includes workbook templates for security overview and account activity that let you dig into audit events and manage your environment.
18+
19+
This article shows you how to use Azure Monitor Workbooks to review security audit events in Azure AD DS.
20+
21+
## Before you begin
22+
23+
To complete this article, you need the following resources and privileges:
24+
25+
* An active Azure subscription.
26+
* If you don't have an Azure subscription, [create an account](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
27+
* An Azure Active Directory tenant associated with your subscription, either synchronized with an on-premises directory or a cloud-only directory.
28+
* If needed, [create an Azure Active Directory tenant][create-azure-ad-tenant] or [associate an Azure subscription with your account][associate-azure-ad-tenant].
29+
* An Azure Active Directory Domain Services managed domain enabled and configured in your Azure AD tenant.
30+
* If needed, complete the tutorial to [create and configure an Azure Active Directory Domain Services instance][create-azure-ad-ds-instance].
31+
* Security audit events enabled for your Azure Active Directory Domain Services managed domain that stream data to a Log Analytics workspace.
32+
* If needed, [enable security audits for Azure Active Directory Domain Services][enable-security-audits].
33+
34+
## Azure Monitor Workbooks overview
35+
36+
When security audit events are turned on in Azure AD DS, it can be hard to analyze and identify issues in the managed domain. Azure Monitor lets you aggregate these security audit events and query the data. With Azure Monitor Workbooks, you can visualize this data to make it quicker and easier to identify issues.
37+
38+
Workbook templates are curated reports that are designed for flexible reuse by multiple users and teams. When you open a workbook template, the data from your Azure Monitor environment is loaded. You can use templates without an impact on other users in your organization, and can save your own workbooks based on the template.
39+
40+
Azure AD DS includes the following two workbook templates:
41+
42+
* Security overview report
43+
* Account activity report
44+
45+
For more information about how to edit and manage workbooks, see [Azure Monitor Workbooks overview](../azure-monitor/platform/workbooks-overview.md).
46+
47+
## Use the security overview report workbook
48+
49+
To help you better understand usage and identify potential security threats, the security overview report summarizes sign-in data and identifies accounts you might want to check on. You can view events in a particular date range, and drill down into specific sign-in events, such as bad password attempts or where the account was disabled.
50+
51+
To access the workbook template for the security overview report, complete the following steps:
52+
53+
1. Search for and select **Azure Active Directory Domain Services** in the Azure portal.
54+
1. Select your managed domain, such as *aaddscontoso.com*
55+
1. From the menu on the left-hand side, choose **Monitoring > Workbooks**
56+
57+
![Select the Workbooks menu option in the Azure portal](./media/use-azure-monitor-workbooks/select-workbooks-in-azure-portal.png)
58+
59+
1. Choose the **Security Overview Report**.
60+
1. From the drop-down menus at the top of the workbook, select your Azure subscription and then Azure Monitor workspace. Choose a **Time range**, such as *Last 7 days*.
61+
62+
![Select the Workbooks menu option in the Azure portal](./media/use-azure-monitor-workbooks/select-query-filters.png)
63+
64+
The **Tile view** and **Chart view** options can also be changed to analyze and visualize the data as desired
65+
66+
1. To drill down into a specific event type, select the one of the **Sign-in result** cards such as *Account Locked Out*, as shown in the following example:
67+
68+
![Example Security Overview Report data visualized in Azure Monitor Workbooks](./media/use-azure-monitor-workbooks/example-security-overview-report.png)
69+
70+
1. The lower part of the security overview report below the chart then breaks down the activity type selected. You can filter by usernames involved on the right-hand side, as shown in the following example report:
71+
72+
[![](./media/use-azure-monitor-workbooks/account-lockout-details-cropped.png "Details of account lockouts in Azure Monitor Workbooks")](./media/use-azure-monitor-workbooks/account-lockout-details.png#lightbox)
73+
74+
## Use the account activity report workbook
75+
76+
To help you troubleshoot issues for a specific user account, the account activity report breaks down detailed audit event log information. You can review when a bad username or password was provided during sign-in, and the source of the sign-in attempt.
77+
78+
To access the workbook template for the account activity report, complete the following steps:
79+
80+
1. Search for and select **Azure Active Directory Domain Services** in the Azure portal.
81+
1. Select your managed domain, such as *aaddscontoso.com*
82+
1. From the menu on the left-hand side, choose **Monitoring > Workbooks**
83+
1. Choose the **Account Activity Report**.
84+
1. From the drop-down menus at the top of the workbook, select your Azure subscription and then Azure Monitor workspace. Choose a **Time range**, such as *Last 30 days*, then how you want the **Tile view** to represent the data. You can filter by **Account username**, such as *felix*, as shown in the following example report:
85+
86+
[![](./media/use-azure-monitor-workbooks/account-activity-report-cropped.png "Account activity report in Azure Monitor Workbooks")](./media/use-azure-monitor-workbooks/account-activity-report.png#lightbox)
87+
88+
The area below the chart shows individual sign-in events along with information such as the activity result and source workstation. This information can help determine repeated sources of sign-in events that may cause account lockouts or indicate a potential attack.
89+
90+
As with the security overview report, you can drill down into the different tiles at the top of the report to visualize and analyze the data as needed.
91+
92+
## Save and edit workbooks
93+
94+
The two template workbooks provided by Azure AD DS are a good place to start with your own data analysis. If you need to get more granular in the data queries and investigations, you can save your own workbooks and edit the queries.
95+
96+
1. To save a copy of one of the workbook templates, select **Edit > Save as > Shared reports**, then provide a name and save it.
97+
1. From your own copy of the template, select **Edit** to enter the edit mode. You can choose the blue **Edit** button next to any part of the report and change it.
98+
99+
All of the charts and tables in Azure Monitor Workbooks are generated using Kusto queries. For more information on creating your own queries, see [Azure Monitor log queries][azure-monitor-queries] and [Kusto queries tutorial][kusto-queries].
100+
101+
## Next steps
102+
103+
If you need to adjust password and lockout policies, see [Password and account lockout policies on managed domains][password-policy].
104+
105+
For problems with users, learn how to troubleshoot [account sign-in problems][troubleshoot-sign-in] or [account lockout problems][troubleshoot-account-lockout].
106+
107+
<!-- INTERNAL LINKS -->
108+
[create-azure-ad-tenant]: ../active-directory/fundamentals/sign-up-organization.md
109+
[associate-azure-ad-tenant]: ../active-directory/fundamentals/active-directory-how-subscriptions-associated-directory.md
110+
[create-azure-ad-ds-instance]: tutorial-create-instance.md
111+
[enable-security-audits]: security-audit-events.md
112+
[password-policy]: password-policy.md
113+
[troubleshoot-sign-in]: troubleshoot-sign-in.md
114+
[troubleshoot-account-lockout]: troubleshoot-account-lockout.md
115+
[azure-monitor-queries]: ../azure-monitor/log-query/query-language.md
116+
[kusto-queries]: https://docs.microsoft.com/azure/kusto/query/tutorial?pivots=azuredataexplorer

articles/active-directory/conditional-access/controls.md

Lines changed: 10 additions & 22 deletions
Original file line numberDiff line numberDiff line change
@@ -6,41 +6,25 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: conditional-access
88
ms.topic: article
9-
ms.date: 02/25/2020
9+
ms.date: 03/18/2020
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
1313
manager: daveba
14-
ms.reviewer: calebb
14+
ms.reviewer: inbarc
1515

1616
ms.collection: M365-identity-device-management
1717
---
1818
# Custom controls (preview)
1919

20-
Custom controls are a capability of the Azure Active Directory Premium P1 edition. When using custom controls, your users are redirected to a compatible service to satisfy further requirements outside of Azure Active Directory. To satisfy this control, a user's browser is redirected to the external service, performs any required authentication or validation activities, and is then redirected back to Azure Active Directory. Azure Active Directory verifies the response and, if the user was successfully authenticated or validated, the user continues in the Conditional Access flow.
20+
Custom controls is a preview capability of the Azure Active Directory. When using custom controls, your users are redirected to a compatible service to satisfy authentication requirements outside of Azure Active Directory. To satisfy this control, a user's browser is redirected to the external service, performs any required authentication, and is then redirected back to Azure Active Directory. Azure Active Directory verifies the response and, if the user was successfully authenticated or validated, the user continues in the Conditional Access flow.
2121

22-
These controls allow the use of certain external or custom services as Conditional Access controls, and generally extend the capabilities of Conditional Access.
23-
24-
Providers currently offering a compatible service include:
25-
26-
- [Duo Security](https://duo.com/docs/azure-ca)
27-
- [Entrust Datacard](https://www.entrustdatacard.com/products/authentication/intellitrust)
28-
- [GSMA](https://mobileconnect.io/azure/)
29-
- [Ping Identity](https://documentation.pingidentity.com/pingid/pingidAdminGuide/index.shtml#pid_c_AzureADIntegration.html)
30-
- [RSA](https://community.rsa.com/docs/DOC-81278)
31-
- [SecureAuth](https://docs.secureauth.com/pages/viewpage.action?pageId=47238992#)
32-
- [Silverfort](https://www.silverfort.io/company/using-silverfort-mfa-with-azure-active-directory/)
33-
- [Symantec VIP](https://help.symantec.com/home/VIP_Integrate_with_Azure_AD)
34-
- [Thales (Gemalto)](https://resources.eu.safenetid.com/help/AzureMFA/Azure_Help/Index.htm)
35-
- [Trusona](https://www.trusona.com/docs/azure-ad-integration-guide)
36-
37-
For more information on those services, contact the providers directly.
22+
> [!NOTE]
23+
> For more information about changes we are planning to the Custom Control capability, see the February 2020 [What's new update](../fundamentals/whats-new.md#upcoming-changes-to-custom-controls).
3824
3925
## Creating custom controls
4026

41-
To create a custom control, you should first contact the provider that you wish to utilize. Each non-Microsoft provider has its own process and requirements to sign up, subscribe, or otherwise become a part of the service, and to indicate that you wish to integrate with Conditional Access. At that point, the provider will provide you with a block of data in JSON format. This data allows the provider and Conditional Access to work together for your tenant, creates the new control and defines how Conditional Access can tell if your users have successfully performed verification with the provider.
42-
43-
Custom controls cannot be used with Identity Protection's automation requiring multi-factor authentication or to elevate roles in Privileged Identity Manager (PIM).
27+
Custom Controls works with a limited set of approved authentication providers. To create a custom control, you should first contact the provider that you wish to utilize. Each non-Microsoft provider has its own process and requirements to sign up, subscribe, or otherwise become a part of the service, and to indicate that you wish to integrate with Conditional Access. At that point, the provider will provide you with a block of data in JSON format. This data allows the provider and Conditional Access to work together for your tenant, creates the new control and defines how Conditional Access can tell if your users have successfully performed verification with the provider.
4428

4529
Copy the JSON data and then paste it into the related textbox. Do not make any changes to the JSON unless you explicitly understand the change you're making. Making any change could break the connection between the provider and Microsoft and potentially lock you and your users out of your accounts.
4630

@@ -64,6 +48,10 @@ To delete a custom control, you must first ensure that it isn't being used in an
6448

6549
To edit a custom control, you must delete the current control and create a new control with the updated information.
6650

51+
## Known limitations
52+
53+
Custom controls cannot be used with Identity Protection's automation requiring Azure Multi-Factor Authentication, Azure AD self-service password reset (SSPR), satisfying multi-factor authentication claim requirements, or to elevate roles in Privileged Identity Manager (PIM).
54+
6755
## Next steps
6856

6957
- [Conditional Access common policies](concept-conditional-access-policy-common.md)

0 commit comments

Comments
 (0)