Skip to content

Commit a4486b3

Browse files
committed
fine-tune
1 parent 4df1403 commit a4486b3

File tree

3 files changed

+3
-3
lines changed

3 files changed

+3
-3
lines changed

articles/active-directory/reports-monitoring/howto-use-recommendations.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -97,7 +97,7 @@ To update the status of a recommendation or a related resource, sign in to Azure
9797

9898
Continue to monitor the recommendations in your tenant for changes.
9999

100-
### Use Microsoft Graph with Azure Active Directory recommendations
100+
### How to use Microsoft Graph with Azure Active Directory recommendations
101101

102102
Azure Active Directory recommendations can be viewed and managed using Microsoft Graph on the `/beta` endpoint. You can view recommendations along with their impacted resources, mark a recommendation as completed by a user, postpone a recommendation for later, and more.
103103

articles/active-directory/reports-monitoring/recommendation-remove-unused-apps.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -28,6 +28,8 @@ Removing unused applications improves the security posture and promotes good app
2828

2929
## Action plan
3030

31+
Applications that the recommendation identified appear in the list of **Impacted resources** at the bottom of the recommendation.
32+
3133
1. Navigate to **Azure AD** > **App registration** and locate the application that was surfaced as part of this recommendation.
3234
1. We suggest you take appropriate steps to ensure the application is not used in longer intervals of more than 30 days. If so, we recommend updating the frequency of access such that the application’s last used time is within 30 days from its last access date.
3335

articles/active-directory/reports-monitoring/recommendation-remove-unused-credential-from-apps.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -39,8 +39,6 @@ Removing credentials not actively used by applications improves security posture
3939
1. Locate the unused credential and remove it.
4040
1. To remove a credential from a service principal resource, use the MS Graph Service Principal API service action `removePassword`.
4141

42-
## Known limitations
43-
4442
## Next steps
4543

4644
- [Review the Azure AD recommendations overview](overview-recommendations.md)

0 commit comments

Comments
 (0)