Skip to content

Commit a123f57

Browse files
authored
Merge pull request #247399 from alexbuckgit/alexbuckgit/docutune-autopr-20230804-193350-7351350-ignore-build
[BULK] DocuTune - Standardize sign-in terminology
2 parents 3e9c671 + 7849539 commit a123f57

22 files changed

+29
-29
lines changed

articles/active-directory/app-proxy/application-proxy-deployment-plan.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -274,7 +274,7 @@ Microsoft advocates the principle of granting the least possible privilege to pe
274274
| Business role| Business tasks| Azure AD roles |
275275
|---|---|---|
276276
| Help desk admin | Typically limited to qualifying end user reported issues and performing limited tasks such as changing users’ passwords, invalidating refresh tokens, and monitoring service health. | Helpdesk Administrator |
277-
| Identity admin| Read Azure AD sign in reports and audit logs to debug App Proxy related issues.| Security reader |
277+
| Identity admin| Read Azure AD sign-in reports and audit logs to debug App Proxy related issues.| Security reader |
278278
| Application owner| Create and manage all aspects of enterprise applications, application registrations, and application proxy settings.| Application Admin |
279279
| Infrastructure admin | Certificate Rollover Owner | Application Admin |
280280

articles/active-directory/app-proxy/application-proxy-integrate-with-power-bi.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -124,7 +124,7 @@ Before the Power BI mobile app can connect and access Report Services, you must
124124

125125
![Power BI mobile app with External URL](media/application-proxy-integrate-with-power-bi/app-proxy-power-bi-mobile-app.png)
126126

127-
2. Select **Connect**. You'll be directed to the Azure Active Directory sign in page.
127+
2. Select **Connect**. You'll be directed to the Azure Active Directory sign-in page.
128128

129129
3. Enter valid credentials for your user and select **Sign in**. You'll see the elements from your Reporting Services server.
130130

articles/active-directory/architecture/govern-service-accounts.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -94,8 +94,8 @@ Monitor your service accounts to ensure usage patterns are correct, and that the
9494

9595
Use one of the following monitoring methods:
9696

97-
* Azure AD Sign-In Logs in the Azure portal
98-
* Export the Azure AD Sign-In Logs to
97+
* Azure AD sign-in logs in the Azure portal
98+
* Export the Azure AD sign-in logs to
9999
* [Azure Storage documentation](../../storage/index.yml)
100100
* [Azure Event Hubs documentation](../../event-hubs/index.yml), or
101101
* [Azure Monitor Logs overview](../../azure-monitor/logs/data-platform-logs.md)

articles/active-directory/architecture/security-operations-user-accounts.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -175,7 +175,7 @@ We recommend that user and privileged accounts only be created following your or
175175

176176
Seeing failures for user authentication is normal. But seeing patterns or blocks of failures can be an indicator that something is happening with a user's Identity. For example, during Password spray or Brute Force attacks, or when a user account is compromised. It's critical that you monitor and alert when patterns emerge. This helps ensure you can protect the user and your organization's data.
177177

178-
Success appears to say all is well. But it can mean that a bad actor has successfully accessed a service. Monitoring successful logins helps you detect user accounts that are gaining access but aren't user accounts that should have access. User authentication successes are normal entries in Azure AD Sign-Ins logs. We recommend you monitor and alert to detect when patterns emerge. This helps ensure you can protect user accounts and your organization's data.
178+
Success appears to say all is well. But it can mean that a bad actor has successfully accessed a service. Monitoring successful logins helps you detect user accounts that are gaining access but aren't user accounts that should have access. User authentication successes are normal entries in Azure AD sign-in logs. We recommend you monitor and alert to detect when patterns emerge. This helps ensure you can protect user accounts and your organization's data.
179179

180180
As you design and operationalize a log monitoring and alerting strategy, consider the tools available to you through the Azure portal. Identity Protection enables you to automate the detection, protection, and remediation of identity-based risks. Identity protection uses intelligence-fed machine learning and heuristic systems to detect risk and assign a risk score for users and sign-ins. Customers can configure policies based on a risk level for when to allow or deny access or allow the user to securely self-remediate from a risk. The following Identity Protection risk detections inform risk levels today:
181181

articles/active-directory/authentication/howto-mfa-getstarted.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -238,7 +238,7 @@ Azure AD has reports that provide technical and business insights, follow the pr
238238

239239
You can monitor authentication method registration and usage across your organization using the [Authentication Methods Activity dashboard](howto-authentication-methods-activity.md). This helps you understand what methods are being registered and how they're being used.
240240

241-
#### Sign in report to review MFA events
241+
#### Sign-in report to review MFA events
242242

243243
The Azure AD sign-in reports include authentication details for events when a user is prompted for MFA, and if any Conditional Access policies were in use. You can also use PowerShell for reporting on users registered for Azure AD Multi-Factor Authentication.
244244

articles/active-directory/conditional-access/concept-condition-filters-for-devices.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -123,8 +123,8 @@ The following device attributes can be used with the filter for devices conditio
123123
| operatingSystem | Equals, NotEquals, StartsWith, NotStartsWith, EndsWith, NotEndsWith, Contains, NotContains, In, NotIn | A valid operating system (like Windows, iOS, or Android) | (device.operatingSystem -eq "Windows") |
124124
| operatingSystemVersion | Equals, NotEquals, StartsWith, NotStartsWith, EndsWith, NotEndsWith, Contains, NotContains, In, NotIn | A valid operating system version (like 6.1 for Windows 7, 6.2 for Windows 8, or 10.0 for Windows 10 and Windows 11) | (device.operatingSystemVersion -in ["10.0.18363", "10.0.19041", "10.0.19042", "10.0.22000"]) |
125125
| physicalIds | Contains, NotContains | As an example all Windows Autopilot devices store ZTDId (a unique value assigned to all imported Windows Autopilot devices) in device physicalIds property. | (device.physicalIds -contains "[ZTDId]:value") |
126-
| profileType | Equals, NotEquals | A valid profile type set for a device. Supported values are: RegisteredDevice (default), SecureVM (used for Windows VMs in Azure enabled with Azure AD sign in.), Printer (used for printers), Shared (used for shared devices), IoT (used for IoT devices) | (device.profileType -eq "Printer") |
127-
| systemLabels | Contains, NotContains | List of labels applied to the device by the system. Some of the supported values are: AzureResource (used for Windows VMs in Azure enabled with Azure AD sign in), M365Managed (used for devices managed using Microsoft Managed Desktop), MultiUser (used for shared devices) | (device.systemLabels -contains "M365Managed") |
126+
| profileType | Equals, NotEquals | A valid profile type set for a device. Supported values are: RegisteredDevice (default), SecureVM (used for Windows VMs in Azure enabled with Azure AD sign-in), Printer (used for printers), Shared (used for shared devices), IoT (used for IoT devices) | (device.profileType -eq "Printer") |
127+
| systemLabels | Contains, NotContains | List of labels applied to the device by the system. Some of the supported values are: AzureResource (used for Windows VMs in Azure enabled with Azure AD sign-in), M365Managed (used for devices managed using Microsoft Managed Desktop), MultiUser (used for shared devices) | (device.systemLabels -contains "M365Managed") |
128128
| trustType | Equals, NotEquals | A valid registered state for devices. Supported values are: AzureAD (used for Azure AD joined devices), ServerAD (used for Hybrid Azure AD joined devices), Workplace (used for Azure AD registered devices) | (device.trustType -eq "ServerAD") |
129129
| extensionAttribute1-15 | Equals, NotEquals, StartsWith, NotStartsWith, EndsWith, NotEndsWith, Contains, NotContains, In, NotIn | extensionAttributes1-15 are attributes that customers can use for device objects. Customers can update any of the extensionAttributes1 through 15 with custom values and use them in the filter for devices condition in Conditional Access. Any string value can be used. | (device.extensionAttribute1 -eq "SAW") |
130130

articles/active-directory/develop/msal-java-adfs-support.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -44,4 +44,4 @@ When you acquire a token using `ConfidentialClientApplication.AcquireToken()` or
4444

4545
## Next steps
4646

47-
For the federated case, see [Configure Azure Active Directory sign in behavior for an application by using a Home Realm Discovery policy](../manage-apps/configure-authentication-for-federated-users-portal.md)
47+
For the federated case, see [Configure Azure Active Directory sign-in behavior for an application by using a Home Realm Discovery policy](../manage-apps/configure-authentication-for-federated-users-portal.md)

articles/active-directory/develop/msal-net-adfs-support.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -58,4 +58,4 @@ Currently, there are no plans to support a direct connection to:
5858

5959
## Next steps
6060

61-
For the federated case, see [Configure Azure Active Directory sign in behavior for an application by using a Home Realm Discovery policy](../manage-apps/configure-authentication-for-federated-users-portal.md)
61+
For the federated case, see [Configure Azure Active Directory sign-in behavior for an application by using a Home Realm Discovery policy](../manage-apps/configure-authentication-for-federated-users-portal.md)

articles/active-directory/develop/msal-python-adfs-support.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -55,4 +55,4 @@ MSAL Python supports ADFS 2019, but does not support a direct connection to ADFS
5555

5656
## Next steps
5757

58-
- For the federated case, see [Configure Azure Active Directory sign in behavior for an application by using a Home Realm Discovery policy](../manage-apps/configure-authentication-for-federated-users-portal.md)
58+
- For the federated case, see [Configure Azure Active Directory sign-in behavior for an application by using a Home Realm Discovery policy](../manage-apps/configure-authentication-for-federated-users-portal.md)

articles/active-directory/devices/troubleshoot-mac-sso-extension-plugin.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -377,7 +377,7 @@ Analyzing the SSO extension logs is an excellent way to troubleshoot the authent
377377
- Native MSAL
378378
- Non MSAL/Browser SSO
379379
- Interaction with the macOS Keychain for credential retrival/storage operations
380-
- Correlation IDs for Azure AD Sign-In events
380+
- Correlation IDs for Azure AD sign-in events
381381
- PRT acquisition
382382
- Device Registration
383383

0 commit comments

Comments
 (0)