You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/identity-protection/overview-identity-protection.md
+20-24Lines changed: 20 additions & 24 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ services: active-directory
6
6
ms.service: active-directory
7
7
ms.subservice: identity-protection
8
8
ms.topic: overview
9
-
ms.date: 06/15/2021
9
+
ms.date: 05/31/2022
10
10
11
11
ms.author: joflore
12
12
author: MicrosoftGuyJFlo
@@ -31,16 +31,12 @@ The signals generated by and fed to Identity Protection, can be further fed into
31
31
32
32
## Why is automation important?
33
33
34
-
In his [blog post in October of 2018](https://techcommunity.microsoft.com/t5/Azure-Active-Directory-Identity/Eight-essentials-for-hybrid-identity-3-Securing-your-identity/ba-p/275843) Alex Weinert, who leads Microsoft's Identity Security and Protection team, explains why automation is so important when dealing with the volume of events:
34
+
In the blog post *[Cyber Signals: Defending against cyber threats with the latest research, insights, and trends](https://www.microsoft.com/security/blog/2022/02/03/cyber-signals-defending-against-cyber-threats-with-the-latest-research-insights-and-trends/)* dated February 3, 2022 we shared a thread intelligence brief including the following statistics:
35
35
36
-
> Each day, our machine learning and heuristic systems provide risk scores for 18 billion login attempts for over 800 million distinct accounts, 300 million of which are discernibly done by adversaries (entities like: criminal actors, hackers).
37
-
>
38
-
> At Ignite last year, I spoke about the top 3 attacks on our identity systems. Here is the recent volume of these attacks
39
-
>
40
-
> -**Breach replay**: 4.6BN attacks detected in May 2018
41
-
> -**Password spray**: 350k in April 2018
42
-
> -**Phishing**: This is hard to quantify exactly, but we saw 23M risk events in March 2018, many of which are phish related
36
+
> * Analyzed ...24 trillion security signals combined with intelligence we track by monitoring more than 40 nation-state groups and over 140 threat groups...
37
+
> * ...From January 2021 through December 2021, we’ve blocked more than 25.6 billion Azure AD brute force authentication attacks...
43
38
39
+
This scale of signals and attacks requires some level of automation to be able to keep up.
44
40
## Risk detection and remediation
45
41
46
42
Identity Protection identifies risks of many types, including:
@@ -53,7 +49,7 @@ Identity Protection identifies risks of many types, including:
53
49
- Password spray
54
50
- and more...
55
51
56
-
More detail on these and other risks including how or when they are calculated can be found in the article, [What is risk](concept-identity-protection-risks.md).
52
+
More detail on these and other risks including how or when they're calculated can be found in the article, [What is risk](concept-identity-protection-risks.md).
57
53
58
54
The risk signals can trigger remediation efforts such as requiring users to: perform Azure AD Multi-Factor Authentication, reset their password using self-service password reset, or blocking until an administrator takes action.
59
55
@@ -69,17 +65,17 @@ More information can be found in the article, [How To: Investigate risk](howto-i
69
65
70
66
### Risk levels
71
67
72
-
Identity Protection categorizes risk into three tiers: low, medium, and high.
68
+
Identity Protection categorizes risk into tiers: low, medium, and high.
73
69
74
-
While Microsoft does not provide specific details about how risk is calculated, we will say that each level brings higher confidence that the user or sign-in is compromised. For example, something like one instance of unfamiliar sign-in properties for a user might not be as threatening as leaked credentials for another user.
70
+
While Microsoft doesn't provide specific details about how risk is calculated, we'll say that each level brings higher confidence that the user or sign-in is compromised. For example, something like one instance of unfamiliar sign-in properties for a user might not be as threatening as leaked credentials for another user.
75
71
76
72
## Exporting risk data
77
73
78
74
Data from Identity Protection can be exported to other tools for archive and further investigation and correlation. The Microsoft Graph based APIs allow organizations to collect this data for further processing in a tool such as their SIEM. Information about how to access the Identity Protection API can be found in the article, [Get started with Azure Active Directory Identity Protection and Microsoft Graph](howto-identity-protection-graph-api.md)
79
75
80
76
Information about integrating Identity Protection information with Microsoft Sentinel can be found in the article, [Connect data from Azure AD Identity Protection](../../sentinel/data-connectors-reference.md#azure-active-directory-identity-protection).
81
77
82
-
Additionally, organizations can choose to store data for longer periods by changing diagnostic settings in Azure AD to send RiskyUsers and UserRiskEvents data to a Log Analytics workspace, archive data to a storage account, stream data to an Event Hub, or send data to a partner solution. Detailed information about how to do so can be found in the article, [How To: Export risk data](howto-export-risk-data.md).
78
+
Additionally, organizations can choose to store data for longer periods by changing diagnostic settings in Azure AD to send RiskyUsers and UserRiskEvents data to a Log Analytics workspace, archive data to a storage account, stream data to Event Hubs, or send data to a partner solution. Detailed information about how to do so can be found in the article, [How To: Export risk data](howto-export-risk-data.md).
83
79
84
80
## Permissions
85
81
@@ -92,25 +88,25 @@ Identity Protection requires users be a Security Reader, Security Operator, Secu
92
88
| Security operator | View all Identity Protection reports and Overview blade <br><br> Dismiss user risk, confirm safe sign-in, confirm compromise | Configure or change policies <br><br> Reset password for a user <br><br> Configure alerts |
93
89
| Security reader | View all Identity Protection reports and Overview blade | Configure or change policies <br><br> Reset password for a user <br><br> Configure alerts <br><br> Give feedback on detections |
94
90
95
-
Currently, the security operator role cannot access the Risky sign-ins report.
91
+
Currently, the security operator role can't access the Risky sign-ins report.
96
92
97
93
Conditional Access administrators can also create policies that factor in sign-in risk as a condition. Find more information in the article [Conditional Access: Conditions](../conditional-access/concept-conditional-access-conditions.md#sign-in-risk).
| Capability | Details | Azure AD Free / Microsoft 365 Apps | Azure AD Premium P1|Azure AD Premium P2 |
99
+
| Capability | Details | Azure AD Free / Microsoft 365 Apps | Azure AD Premium P1|Azure AD Premium P2 |
104
100
| --- | --- | --- | --- | --- |
105
-
| Risk policies | User risk policy (via Identity Protection) | No | No |Yes |
106
-
| Risk policies | Sign-in risk policy (via Identity Protection or Conditional Access) | No |No |Yes |
107
-
| Security reports | Overview |No | No |Yes |
108
-
| Security reports | Risky users | Limited Information. Only users with medium and high risk are shown. No details drawer or risk history. | Limited Information. Only users with medium and high risk are shown. No details drawer or risk history. | Full access|
109
-
| Security reports | Risky sign-ins | Limited Information. No risk detail or risk level is shown. | Limited Information. No risk detail or risk level is shown. | Full access|
110
-
| Security reports | Risk detections | No | Limited Information. No details drawer.| Full access|
111
-
| Notifications | Users at risk detected alerts | No | No |Yes |
112
-
| Notifications | Weekly digest| No | No | Yes |
113
-
||MFA registration policy | No | No | Yes |
101
+
| Risk policies | User risk policy (via Identity Protection) | No | No |Yes |
102
+
| Risk policies | Sign-in risk policy (via Identity Protection or Conditional Access) | No | No |Yes |
103
+
| Security reports | Overview | No | No |Yes |
104
+
| Security reports | Risky users | Limited Information. Only users with medium and high risk are shown. No details drawer or risk history. | Limited Information. Only users with medium and high risk are shown. No details drawer or risk history. | Full access|
105
+
| Security reports | Risky sign-ins | Limited Information. No risk detail or risk level is shown. | Limited Information. No risk detail or risk level is shown. | Full access|
106
+
| Security reports | Risk detections | No | Limited Information. No details drawer.| Full access|
107
+
| Notifications | Users at risk detected alerts | No | No |Yes |
108
+
| Notifications | Weekly digest| No | No | Yes |
109
+
| MFA registration policy|| No | No | Yes |
114
110
115
111
More information on these rich reports can be found in the article, [How To: Investigate risk](howto-identity-protection-investigate-risk.md#navigating-the-reports).
Copy file name to clipboardExpand all lines: articles/api-management/api-management-howto-create-or-invite-developers.md
+2Lines changed: 2 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -52,6 +52,8 @@ When a developer is invited, an email is sent to the developer. This email is ge
52
52
53
53
Once the invitation is accepted, the account becomes active.
54
54
55
+
Invitation link will be active for 2 days.
56
+
55
57
## <aname="block-developer"> </a> Deactivate or reactivate a developer account
56
58
57
59
By default, newly created or invited developer accounts are **Active**. To deactivate a developer account, click **Block**. To reactivate a blocked developer account, click **Activate**. A blocked developer account can't access the developer portal or call any APIs. To delete a user account, click **Delete**.
Copy file name to clipboardExpand all lines: articles/app-service/tutorial-connect-msi-sql-database.md
+1-2Lines changed: 1 addition & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -144,10 +144,9 @@ The steps you follow for your project depends on whether you're using [Entity Fr
144
144
1. In Visual Studio, open the Package Manager Console and add the NuGet package [Azure.Identity](https://www.nuget.org/packages/Azure.Identity) and update Entity Framework:
145
145
146
146
```powershell
147
-
Install-Package Azure.Identity -Version 1.5.0
147
+
Install-Package Azure.Identity
148
148
Update-Package EntityFramework
149
149
```
150
-
151
150
1. In your DbContext object (in *Models/MyDbContext.cs*), add the following code to the default constructor.
Copy file name to clipboardExpand all lines: articles/azure-netapp-files/azure-netapp-files-solution-architectures.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -107,7 +107,7 @@ This section provides references to SAP on Azure solutions.
107
107
108
108
### SAP AnyDB
109
109
110
-
*[SAP System on Oracle Database on Azure - Azure Architecture Center](/azure/architecture/example-scenario/apps/sap-on-oracle)
110
+
*[SAP System on Oracle Database on Azure - Azure Architecture Center](/azure/architecture/example-scenario/apps/sap-production)
111
111
*[Oracle Azure Virtual Machines DBMS deployment for SAP workload - Azure Virtual Machines](../virtual-machines/workloads/sap/dbms_guide_oracle.md#oracle-configuration-guidelines-for-sap-installations-in-azure-vms-on-linux)
112
112
*[Deploy SAP AnyDB (Oracle 19c) with Azure NetApp Files](https://techcommunity.microsoft.com/t5/running-sap-applications-on-the/deploy-sap-anydb-oracle-19c-with-azure-netapp-files/ba-p/2064043)
113
113
*[Manual Recovery Guide for SAP Oracle 19c on Azure VMs from Azure NetApp Files snapshot with AzAcSnap](https://techcommunity.microsoft.com/t5/running-sap-applications-on-the/manual-recovery-guide-for-sap-oracle-19c-on-azure-vms-from-azure/ba-p/3242408)
0 commit comments