Skip to content

Commit 9f1a549

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into conditional-access-grant
2 parents 723efaa + 746e7ae commit 9f1a549

File tree

16 files changed

+62
-20
lines changed

16 files changed

+62
-20
lines changed

articles/active-directory/governance/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -55,6 +55,8 @@
5555
href: manage-access-review.md
5656
- name: Manage users excluded from Conditional Access
5757
href: conditional-access-exclusion.md
58+
- name: Review recommendations for access reviews
59+
href: review-recommendations-access-reviews.md
5860
- name: Review and remove users from external organizations
5961
href: access-reviews-external-users.md
6062
- name: How-to guides
Lines changed: 35 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,35 @@
1+
---
2+
title: Review recommendations for Access reviews - Azure AD
3+
description: Learn how to review access of group members with review recommendations in Azure Active Directory access reviews.
4+
services: active-directory
5+
author: amsliu
6+
manager: rkarlin
7+
editor: markwahl-msft
8+
ms.service: active-directory
9+
ms.workload: identity
10+
ms.tgt_pltfrm: na
11+
ms.topic: how-to
12+
ms.subservice: compliance
13+
ms.date: 8/5/2022
14+
ms.author: amsliu
15+
ms.reviewer: mwahl
16+
ms.collection: M365-identity-device-management
17+
---
18+
19+
# Review recommendations for Access reviews
20+
21+
Decision makers who review users' access and perform access reviews can use system based recommendations to help them decide whether to continue their access or deny their access to resources. For more information about how to use review recommendations, see [Enable decision helpers](create-access-review.md#next-settings).
22+
23+
## Prerequisites
24+
25+
- Azure AD Premium P2
26+
27+
For more information, see [License requirements](access-reviews-overview.md#license-requirements).
28+
29+
## Inactive user recommendations
30+
A user is considered 'inactive' if they have not signed into the tenant within the last 30 days. This behavior is adjusted for reviews of application assignments, which checks each user's last activity in the app as opposed to the entire tenant. When inactive user recommendations are enabled for an access review, the last sign-in date for each user will be evaluated once the review starts, and any user that has not signed-in within 30 days will be given a recommended action of Deny. Additionally, when these decision helpers are enabled, reviewers will be able to see the last sign-in date for all users being reviewed. This sign-in date (as well as the resulting recommendation) is determined when the review begins and will not get updated while the review is in-progress.
31+
32+
## Next Steps
33+
- [Create an access review](create-access-review.md)
34+
- [Review access to groups or applications](perform-access-review.md)
35+

articles/load-balancer/load-balancer-floating-ip.md

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -28,14 +28,19 @@ If you want to reuse the backend port across multiple rules, you must enable Flo
2828

2929
When Floating IP is enabled, Azure changes the IP address mapping to the Frontend IP address of the Load Balancer frontend instead of backend instance's IP. Without Floating IP, Azure exposes the VM instances' IP. Enabling Floating IP changes the IP address mapping to the Frontend IP of the load Balancer to allow for more flexibility. Learn more [here](load-balancer-multivip-overview.md).
3030

31+
In the diagrams below, you see how IP address mapping works before and after enabling Floating IP:
32+
:::image type="content" source="media/load-balancer-floating-ip/load-balancer-floating-ip-before.png" alt-text="This diagram shows network traffic through a load balancer before Floating IP is enabled.":::
33+
34+
:::image type="content" source="media/load-balancer-floating-ip/load-balancer-floating-ip-after.png" alt-text="This diagram shows network traffic through a load balancer after Floating IP is enabled.":::
35+
3136
Floating IP can be configured on a Load Balancer rule via the Azure portal, REST API, CLI, PowerShell, or other client. In addition to the rule configuration, you must also configure your virtual machine's Guest OS in order to use Floating IP.
3237

3338
## Floating IP Guest OS configuration
3439

3540
In order to function, the Guest OS for the virtual machine needs to be configured to receive all traffic bound for the frontend IP and port of the load balancer. To accomplish this requires:
3641
* a loopback network interface to be added
3742
* configuring the loopback with the frontend IP address of the load balancer
38-
* ensure the system can send/receive packets on interfaces that do not have the IP address assigned to that interface (on Windows, this requires setting interfaces to use the "weak host" model; on Linux this model is normally used by default)
43+
* ensure the system can send/receive packets on interfaces that don't have the IP address assigned to that interface (on Windows, this requires setting interfaces to use the "weak host" model; on Linux this model is normally used by default)
3944
The host firewall also needs to be open to receiving traffic on the frontend IP port.
4045

4146
> [!NOTE]

articles/load-balancer/load-balancer-ha-ports-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ For NVA HA scenarios, HA ports offer the following advantages:
4040

4141
The following diagram presents a hub-and-spoke virtual network deployment. The spokes force-tunnel their traffic to the hub virtual network and through the NVA, before leaving the trusted space. The NVAs are behind an internal Standard Load Balancer with an HA ports configuration. All traffic can be processed and forwarded accordingly. When configured as show in the following diagram, an HA Ports load-balancing rule additionally provides flow symmetry for ingress and egress traffic.
4242

43-
:::image type="content" source="./media/load-balancer-ha-ports-overview/nvaha.png" alt-text="Diagram of hub-and-spoke virtual network, with NVAs deployed in HA mode.":::
43+
:::image type="content" source="./media/load-balancer-ha-ports-overview/nvahathmb.png" alt-text="Diagram of hub-and-spoke virtual network, with NVAs deployed in HA mode." lightbox="media/load-balancer-ha-ports-overview/nvaha.png":::
4444

4545
>[!NOTE]
4646
> If you are using NVAs, confirm with their providers how to best use HA ports and to learn which scenarios are supported.

articles/load-balancer/load-balancer-tcp-reset.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -16,29 +16,29 @@ ms.author: mbender
1616

1717
# Load Balancer TCP Reset and Idle Timeout
1818

19-
You can use [Standard Load Balancer](./load-balancer-overview.md) to create a more predictable application behavior for your scenarios by enabling TCP Reset on Idle for a given rule. Load Balancer's default behavior is to silently drop flows when the idle timeout of a flow is reached. Enabling this feature will cause Load Balancer to send bidirectional TCP Resets (TCP RST packet) on idle timeout. This will inform your application endpoints that the connection has timed out and is no longer usable. Endpoints can immediately establish a new connection if needed.
19+
You can use [Standard Load Balancer](./load-balancer-overview.md) to create a more predictable application behavior for your scenarios by enabling TCP Reset on Idle for a given rule. Load Balancer's default behavior is to silently drop flows when the idle timeout of a flow is reached. Enabling TCP reset will cause Load Balancer to send bidirectional TCP Resets (TCP RST packet) on idle timeout. This will inform your application endpoints that the connection has timed out and is no longer usable. Endpoints can immediately establish a new connection if needed.
2020

21-
![Load Balancer TCP reset](media/load-balancer-tcp-reset/load-balancer-tcp-reset.png)
21+
:::image type="content" source="media/load-balancer-tcp-reset/load-balancer-tcp-reset.png" alt-text="Diagram shows default TCP reset behavior of network nodes.":::
2222

2323
## TCP reset
2424

2525
You change this default behavior and enable sending TCP Resets on idle timeout on inbound NAT rules, load balancing rules, and [outbound rules](./load-balancer-outbound-connections.md#outboundrules). When enabled per rule, Load Balancer will send bidirectional TCP Reset (TCP RST packets) to both client and server endpoints at the time of idle timeout for all matching flows.
2626

2727
Endpoints receiving TCP RST packets close the corresponding socket immediately. This provides an immediate notification to the endpoints that the release of the connection has occurred and any future communication on the same TCP connection will fail. Applications can purge connections when the socket closes and reestablish connections as needed without waiting for the TCP connection to eventually time out.
2828

29-
For many scenarios, this may reduce the need to send TCP (or application layer) keepalives to refresh the idle timeout of a flow.
29+
For many scenarios, TCP reset may reduce the need to send TCP (or application layer) keepalives to refresh the idle timeout of a flow.
3030

31-
If your idle durations exceed those of allowed by the configuration or your application shows an undesirable behavior with TCP Resets enabled, you may still need to use TCP keepalives (or application layer keepalives) to monitor the liveness of the TCP connections. Further, keepalives can also remain useful for when the connection is proxied somewhere in the path, particularly application layer keepalives.
31+
If your idle durations exceed configuration limits or your application shows an undesirable behavior with TCP Resets enabled, you may still need to use TCP keepalives, or application layer keepalives, to monitor the liveness of the TCP connections. Further, keepalives can also remain useful for when the connection is proxied somewhere in the path, particularly application layer keepalives.
3232

33-
Carefully examine the entire end to end scenario to decide whether you benefit from enabling TCP Resets, adjusting the idle timeout, and if additional steps may be required to ensure the desired application behavior.
33+
By carefully examining the entire end to end scenario, you can determine the benefits from enabling TCP Resets and adjusting the idle timeout. Then you decide if more steps may be required to ensure the desired application behavior.
3434

3535
## Configurable TCP idle timeout
3636

3737
Azure Load Balancer has the following idle timeout range:
3838
- 4 minutes to 100 minutes for Outbound Rules
3939
- 4 minutes to 30 minutes for Load Balancer rules and Inbound NAT rules
4040

41-
By default, it is set to 4 minutes. If a period of inactivity is longer than the timeout value, there's no guarantee that the TCP or HTTP session is maintained between the client and your cloud service.
41+
By default, it's set to 4 minutes. If a period of inactivity is longer than the timeout value, there's no guarantee that the TCP or HTTP session is maintained between the client and your cloud service.
4242

4343
When the connection is closed, your client application may receive the following error message: "The underlying connection was closed: A connection that was expected to be kept alive was closed by the server."
4444

@@ -52,8 +52,8 @@ TCP keep-alive works for scenarios where battery life isn't a constraint. It isn
5252
## Limitations
5353

5454
- TCP reset only sent during TCP connection in ESTABLISHED state.
55-
- TCP idle timeout does not affect load balancing rules on UDP protocol.
56-
- TCP reset is not supported for ILB HA ports when a network virtual appliance is in the path. A workaround could be to use outbound rule with TCP reset from NVA.
55+
- TCP idle timeout doesn't affect load balancing rules on UDP protocol.
56+
- TCP reset isn't supported for ILB HA ports when a network virtual appliance is in the path. A workaround could be to use outbound rule with TCP reset from NVA.
5757

5858
## Next steps
5959

22.9 KB
Loading
22.9 KB
Loading
13.1 KB
Loading
117 KB
Loading
7.27 KB
Loading

0 commit comments

Comments
 (0)