Skip to content

Commit b3f7b82

Browse files
committed
2 parents 5262770 + 410336e commit b3f7b82

File tree

376 files changed

+4221
-3823
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

376 files changed

+4221
-3823
lines changed

.openpublishing.redirection.azure-monitor.json

Lines changed: 35 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -216,6 +216,41 @@
216216
"redirect_url": "/azure/azure-monitor/visualize/workbooks-overview",
217217
"redirect_document_id": false
218218
},
219+
{
220+
"source_path_from_root": "/articles/azure-monitor/visualize/view-designer-conversion-access.md",
221+
"redirect_url": "/azure/azure-monitor/visualize/workbooks-overview",
222+
"redirect_document_id": false
223+
},
224+
{
225+
"source_path_from_root": "/articles/azure-monitor/visualize/view-designer-conversion-examples.md",
226+
"redirect_url": "/azure/azure-monitor/visualize/workbooks-overview",
227+
"redirect_document_id": false
228+
},
229+
{
230+
"source_path_from_root": "/articles/azure-monitor/visualize/view-designer-conversion-options.md",
231+
"redirect_url": "/azure/azure-monitor/visualize/workbooks-overview",
232+
"redirect_document_id": false
233+
},
234+
{
235+
"source_path_from_root": "/articles/azure-monitor/visualize/view-designer-conversion-overview.md",
236+
"redirect_url": "/azure/azure-monitor/visualize/workbooks-overview",
237+
"redirect_document_id": false
238+
},
239+
{
240+
"source_path_from_root": "/articles/azure-monitor/visualize/view-designer-conversion-tasks.md",
241+
"redirect_url": "/azure/azure-monitor/visualize/workbooks-overview",
242+
"redirect_document_id": false
243+
},
244+
{
245+
"source_path_from_root": "/articles/azure-monitor/visualize/view-designer-conversion-tiles.md",
246+
"redirect_url": "/azure/azure-monitor/visualize/workbooks-overview",
247+
"redirect_document_id": false
248+
},
249+
{
250+
"source_path_from_root": "/articles/azure-monitor/visualize/workbooks-interactive.md",
251+
"redirect_url": "/azure/azure-monitor/visualize/workbooks-configurations",
252+
"redirect_document_id": false
253+
},
219254
{
220255
"source_path_from_root": "/articles/azure-monitor/visualize/workbooks-groups.md",
221256
"redirect_url": "/azure/azure-monitor/visualize/workbooks-create-workbook",

.openpublishing.redirection.defender-for-iot.json

Lines changed: 0 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -5,11 +5,6 @@
55
"redirect_url": "/azure/defender-for-iot/organizations/ot-appliance-sizing",
66
"redirect_document_id": false
77
},
8-
{
9-
"source_path_from_root": "/articles/defender-for-iot/organizations/resources-manage-proprietary-protocols.md",
10-
"redirect_url": "/azure/defender-for-iot/organizations/overview#extend-support-to-proprietary-protocols",
11-
"redirect_document_id": false
12-
},
138
{
149
"source_path_from_root": "/articles/defender-for-iot/organizations/how-to-configure-windows-endpoint-monitoring.md",
1510
"redirect_url": "/azure/defender-for-iot/organizations/how-to-control-what-traffic-is-monitored#configure-windows-endpoint-monitoring",

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -21376,6 +21376,11 @@
2137621376
"redirect_url": "/azure/sentinel/microsoft-365-defender-sentinel-integration#microsoft-365-defender-incidents-and-microsoft-incident-creation-rules",
2137721377
"redirect_document_id": false
2137821378
},
21379+
{
21380+
"source_path_from_root": "/articles/sentinel/ueba-enrichments.md",
21381+
"redirect_url": "/azure/sentinel/ueba-reference",
21382+
"redirect_document_id": false
21383+
},
2137921384
{
2138021385
"source_path_from_root": "/articles/sentinel/import-threat-intelligence.md",
2138121386
"redirect_url": "/azure/sentinel/understand-threat-intelligence",

articles/active-directory/app-provisioning/workday-integration-reference.md

Lines changed: 97 additions & 60 deletions
Large diffs are not rendered by default.

articles/active-directory/cloud-infrastructure-entitlement-management/faqs.md

Lines changed: 26 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -64,10 +64,6 @@ Permissions Management currently doesn't support hybrid environments.
6464

6565
Permissions Management supports user identities (for example, employees, customers, external partners) and workload identities (for example, virtual machines, containers, web apps, serverless functions).
6666

67-
<!---## Is Permissions Management General Data Protection Regulation (GDPR) compliant?
68-
69-
Permissions Management is currently not GDPR compliant.--->
70-
7167
## Is Permissions Management available in Government Cloud?
7268

7369
No, Permissions Management is currently not available in Government clouds.
@@ -146,6 +142,32 @@ If a customer decides to discontinue licensing the service, we will also delete
146142

147143
We also have the ability to remove, export or modify specific data should the Global Admin using the Entra Permissions Management service file an official Data Subject Request. This can be initiated by opening a ticket in the Azure portal [New support request - Microsoft Entra admin center](https://entra.microsoft.com/#blade/Microsoft_Azure_Support/NewSupportRequestV3Blade/callerName/ActiveDirectory/issueType/technical), or alternately contacting your local Microsoft representative.
148144

145+
## Do I require a license to use Entra Permissions Management?
146+
147+
Yes, as of July 1st, 2022, new customers must acquire a free 90-trial license or a paid license to use the service. You can enable a trial or purchase licenses here: [https://aka.ms/TryPermissionsManagement](https://aka.ms/TryPermissionsManagement)
148+
149+
## What do I do if I’m using Public Preview version of Entra Permissions Management?
150+
151+
If you are using the Public Preview version of Entra Permissions Management, your current deployment(s) will continue to work through October 1st.
152+
153+
After October 1st you will need to move over to use the newly released version of the service and enable a 90-day trial or purchase licenses to continue using the service.
154+
155+
## What do I do if I’m using the legacy version of the CloudKnox service?
156+
157+
We are currently working on developing a migration plan to help customers on the original CloudKnox service move to the new Entra Permissions Management service later in 2022.
158+
159+
## Can I use Entra Permissions Management in the EU?
160+
161+
Yes, the product is compliant.
162+
163+
## How to I enable one of the new 18 languages supported in the GA release?
164+
165+
We are now localized in 18 languages. We respect your browser setting or you can manually enable your language of choice by adding a query string suffix to your Entra Permissions Management URL:
166+
167+
`?lang=xx-XX`
168+
169+
Where xx-XX is one of the following available language parameters: 'cs-CZ', 'de-DE', 'en-US', 'es-ES', 'fr-FR', 'hu-HU', 'id-ID', 'it-IT', 'ja-JP', 'ko-KR', 'nl-NL', 'pl-PL', 'pt-BR', 'pt-PT', 'ru-RU', 'sv-SE', 'tr-TR', 'zh-CN', or 'zh-TW'.
170+
149171
## Resources
150172

151173
- [Public Preview announcement blog](https://www.aka.ms/CloudKnox-Public-Preview-Blog)

articles/active-directory/cloud-sync/how-to-gmsa-cmdlets.md

Lines changed: 39 additions & 32 deletions
Original file line numberDiff line numberDiff line change
@@ -7,22 +7,22 @@ manager: karenhoran
77
ms.service: active-directory
88
ms.workload: identity
99
ms.topic: how-to
10-
ms.date: 11/16/2020
10+
ms.date: 07/01/2022
1111
ms.subservice: hybrid
1212
ms.author: billmath
1313
ms.collection: M365-identity-device-management
1414
---
1515

1616
# Azure AD Connect cloud provisioning agent gMSA PowerShell cmdlets
1717

18-
The purpose of this document is to describe the Azure AD Connect cloud provisioning agent gMSA PowerShell cmdlets. These cmdlets allow you to have more granularity on the permissions that are applied on the service account (gMSA). By default, Azure AD Connect cloud sync applies all permissions similar to Azure AD Connect on the default gMSA or a custom gMSA.
18+
The purpose of this document is to describe the Azure AD Connect cloud provisioning agent gMSA PowerShell cmdlets. These cmdlets allow you to have more granularity on the permissions that are applied on the service account (gMSA). By default, Azure AD Connect cloud sync applies all permissions similar to Azure AD Connect on the default gMSA or a custom gMSA, during cloud provisioning agent install.
1919

2020
This document will cover the following cmdlets:
2121

22-
`Set-AADCloudSyncRestrictedPermissions`
23-
2422
`Set-AADCloudSyncPermissions`
2523

24+
`Set-AADCloudSyncRestrictedPermissions`
25+
2626
## How to use the cmdlets:
2727

2828
The following prerequisites are required to use these cmdlets.
@@ -32,34 +32,26 @@ The following prerequisites are required to use these cmdlets.
3232
2. Import Provisioning Agent PS module into a PowerShell session.
3333

3434
```powershell
35-
Import-Module "C:\Program Files\Microsoft Azure AD Connect Provisioning Agent\Microsoft.CloudSync.Powershell.dll"
35+
Import-Module "C:\Program Files\Microsoft Azure AD Connect Provisioning Agent\Microsoft.CloudSync.Powershell.dll"
3636
```
3737

38-
3. Remove existing permissions. To remove all existing permissions on the service account, except SELF use: `Set-AADCloudSyncRestrictedPermission`.
39-
40-
This cmdlet requires a parameter called `Credential` which can be passed, or it will prompt if called without it.
38+
3. These cmdlets require a parameter called `Credential` which can be passed, or will prompt the user if not provided in the command line. Depending on the cmdlet syntax used, these credentials must be an enterprise admin account or, at a minimum, a domain administrator of the target domain where you're setting the permissions.
4139

42-
To create a variable, use:
40+
4. To create a variable for credentials, use:
4341

4442
`$credential = Get-Credential`
43+
44+
5. To set Active Directory permissions for cloud provisioning agent, you can use the following cmdlet. This will grant permissions in the root of the domain allowing the service account to manage on-premises Active Directory objects. See [Using Set-AADCloudSyncPermissions](#using-set-aadcloudsyncpermissions) below for examples on setting the permissions.
4545

46-
This will prompt the user to enter username and password. The credentials must be at a minimum domain administrator(of the domain where agent is installed), could be enterprise admin as well.
47-
48-
4. Then you can call the cmdlet to remove extra permissions:
46+
`Set-AADCloudSyncPermissions -EACredential $credential`
4947

50-
```powershell
51-
Set-AADCloudSyncRestrictedPermissions -Credential $credential
52-
```
53-
54-
5. Or you can simply call:
48+
6. To restrict Active Directory permissions set by default on the cloud provisioning agent account, you can use the following cmdlet. This will increase the security of the service account by disabling permission inheritance and removing all existing permissions, except SELF and Full Control for administrators. See [Using Set-AADCloudSyncRestrictedPermission](#using-set-aadcloudsyncrestrictedpermissions) below for examples on restricting the permissions.
5549

56-
`Set-AADCloudSyncRestrictedPermissions` which will prompt for credentials.
57-
58-
6. Add specific permission type. Permissions added are same as Azure AD Connect. See [Using Set-AADCloudSyncPermissions](#using-set-aadcloudsyncpermissions) below for examples on setting the permissions.
50+
`Set-AADCloudSyncRestrictedPermission -Credential $credential`
5951

6052
## Using Set-AADCloudSyncPermissions
6153

62-
`Set-AADCloudSyncPermissions` supports the following permission types which are identical to the permissions used by Azure AD Connect. The following permission types are supported:
54+
`Set-AADCloudSyncPermissions` supports the following permission types which are identical to the permissions used by Azure AD Connect Classic Sync (ADSync). The following permission types are supported:
6355

6456
|Permission type|Description|
6557
|-----|-----|
@@ -69,28 +61,43 @@ The following prerequisites are required to use these cmdlets.
6961
|HybridExchangePermissions|See [HybridExchangePermissions](../../active-directory/hybrid/how-to-connect-configure-ad-ds-connector-account.md#permissions-for-exchange-hybrid-deployment) permissions for Azure AD Connect|
7062
|ExchangeMailPublicFolderPermissions| See [ExchangeMailPublicFolderPermissions](../../active-directory/hybrid/how-to-connect-configure-ad-ds-connector-account.md#permissions-for-exchange-mail-public-folders) permissions for Azure AD Connect|
7163
|CloudHR| Applies 'Create/delete User objects' on 'This object and all descendant objects'|
72-
|All|adds all the above permissions.|
64+
|All| Applies all the above permissions|
7365

7466
You can use AADCloudSyncPermissions in one of two ways:
75-
- [Grant a certain permission to all configured domains](#grant-a-certain-permission-to-all-configured-domains)
76-
- [Grant a certain permission to a specific domain](#grant-a-certain-permission-to-a-specific-domain)
67+
- [Grant permissions to all configured domains](#grant-permissions-to-all-configured-domains)
68+
- [Grant permissions to a specific domain](#grant-permissions-to-a-specific-domain)
7769

78-
## Grant a certain permission to all configured domains
70+
## Grant permissions to all configured domains
7971

8072
Granting certain permissions to all configured domains will require the use of an enterprise admin account.
8173

8274
```powershell
83-
Set-AADCloudSyncPermissions -PermissionType "Any mentioned above" -EACredential $credential (prepopulated same as above [$credential = Get-Credential])
75+
$credential = Get-Credential
76+
Set-AADCloudSyncPermissions -PermissionType "Any mentioned above" -EACredential $credential
8477
```
8578

86-
## Grant a certain permission to a specific domain
79+
## Grant permissions to a specific domain
8780

88-
Granting certain permissions to a specific domain will require the use of, at minimum a domain admin account of the domain you are attempting to add.
81+
Granting certain permissions to a specific domain will require the use of a TargetDomainCredential that is enterprise admin or, domain admin of the target domain. The TargetDomain has to be already configured through wizard.
8982

9083
```powershell
91-
Set-AADCloudSyncPermissions -PermissionType "Any mentioned above" -TargetDomain "FQDN of domain" (has to be already configured through wizard) -TargetDomainCredential $credential(same as above)
84+
$credential = Get-Credential
85+
Set-AADCloudSyncPermissions -PermissionType "Any mentioned above" -TargetDomain "FQDN of domain" -TargetDomainCredential $credential
9286
```
9387

94-
Note: for 1. The credentials must be at a minimum Enterprise admin.
95-
96-
For 2. The Credentials can be either Domain admin or enterprise admin.
88+
## Using Set-AADCloudSyncRestrictedPermissions
89+
For increased security, `Set-AADCloudSyncRestrictedPermissions` will tighten the permissions set on the cloud provisioning agent account itself. Hardening permissions on the cloud provisioning agent account involves the following changes:
90+
91+
- Disable inheritance
92+
- Remove all default permissions, except ACEs specific to SELF.
93+
- Set Full Control permissions for SYSTEM, Administrators, Domain Admins, and Enterprise Admins.
94+
- Set Read permissions for Authenticated Users and Enterprise Domain Controllers.
95+
96+
The -Credential parameter is necessary to specify the Administrator account that has the necessary privileges to restrict Active Directory permissions on the cloud provisioning agent account. This is typically the domain or enterprise administrator.
97+
98+
For Example:
99+
100+
``` powershell
101+
$credential = Get-Credential
102+
Set-AADCloudSyncRestrictedPermissions -Credential $credential
103+
```

articles/active-directory/develop/whats-new-docs.md

Lines changed: 12 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: active-directory
55
author: mmacy
66
manager: CelesteDG
77

8-
ms.date: 06/02/2022
8+
ms.date: 07/04/2022
99
ms.service: active-directory
1010
ms.subservice: develop
1111
ms.topic: reference
@@ -18,6 +18,16 @@ ms.custom: has-adal-ref
1818

1919
Welcome to what's new in the Microsoft identity platform documentation. This article lists new docs that have been added and those that have had significant updates in the last three months.
2020

21+
## June 2022
22+
23+
### Updated articles
24+
25+
- [Add app roles to your application and receive them in the token](howto-add-app-roles-in-azure-ad-apps.md)
26+
- [Azure AD Authentication and authorization error codes](reference-aadsts-error-codes.md)
27+
- [Microsoft identity platform refresh tokens](refresh-tokens.md)
28+
- [Single-page application: Acquire a token to call an API](scenario-spa-acquire-token.md)
29+
- [Tutorial: Sign in users and call the Microsoft Graph API in an Electron desktop app](tutorial-v2-nodejs-desktop.md)
30+
2131
## May 2022
2232

2333
### Updated articles
@@ -28,7 +38,7 @@ Welcome to what's new in the Microsoft identity platform documentation. This art
2838
- [Quickstart: Sign in users and call the Microsoft Graph API from an Android app](mobile-app-quickstart-portal-android.md)
2939
- [Quickstart: Sign in users and call the Microsoft Graph API from an iOS or macOS app](mobile-app-quickstart-portal-ios.md)
3040
- [Set up your application's Azure AD test environment](test-setup-environment.md)
31-
- [Single Sign-On SAML protocol](single-sign-on-saml-protocol.md)
41+
- [Single sign-on SAML protocol](single-sign-on-saml-protocol.md)
3242
- [Single sign-on with MSAL.js](msal-js-sso.md)
3343
- [Tutorial: Sign in users and acquire a token for Microsoft Graph in a Node.js & Express web app](tutorial-v2-nodejs-webapp-msal.md)
3444
- [What's new for authentication?](reference-breaking-changes.md)
@@ -47,9 +57,3 @@ Welcome to what's new in the Microsoft identity platform documentation. This art
4757
- [OAuth 2.0 and OpenID Connect in the Microsoft identity platform](active-directory-v2-protocols.md)
4858
- [Signing key rollover in the Microsoft identity platform](active-directory-signing-key-rollover.md)
4959
- [Troubleshoot publisher verification](troubleshoot-publisher-verification.md)
50-
51-
## February 2022
52-
53-
### Updated articles
54-
55-
- [Desktop app that calls web APIs: Acquire a token using WAM](scenario-desktop-acquire-token-wam.md)

0 commit comments

Comments
 (0)