Skip to content

Commit b9d87f3

Browse files
committed
add suggestions
1 parent 00579f6 commit b9d87f3

File tree

2 files changed

+44
-39
lines changed

2 files changed

+44
-39
lines changed

articles/active-directory/manage-apps/tutorial-govern-monitor.md

Lines changed: 28 additions & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -2,21 +2,21 @@
22
title: "Tutorial: Govern and monitor applications"
33
titleSuffix: Azure AD
44
description: In this tutorial, you learn how to govern and monitor an application in Azure Active Directory.
5-
author: davidmu1
5+
author: omondiatieno
66
manager: CelesteDG
7-
ms.author: davidmu
7+
ms.author: jomondi
88
ms.service: active-directory
99
ms.subservice: app-mgmt
1010
ms.topic: tutorial
11-
ms.date: 02/16/22
11+
ms.date: 02/24/2022
1212
# Customer intent: As an administrator of an Azure AD tenant, I want to govern and monitor my applications.
1313
---
1414

1515
# Tutorial: Govern and monitor applications
1616

17-
Juan at Fabrikam has added and configured an application from the [Azure Active Directory (Azure AD) application gallery](overview-application-gallery.md). He also made sure that access can be managed and that the application is secure by using the information in [Tutorial: Manage application access and security](tutorial-manage-access-security.md). He now needs to understand the recources that are available to govern and monitor the application.
17+
The IT administrator at Fabrikam has added and configured an application from the [Azure Active Directory (Azure AD) application gallery](overview-application-gallery.md). They also made sure that access can be managed and that the application is secure by using the information in [Tutorial: Manage application access and security](tutorial-manage-access-security.md). They now need to understand the resources that are available to govern and monitor the application.
1818

19-
By using the information in this tutorial Juan and you learn how to:
19+
By using the information in this tutorial, an administrator of the application learns how to:
2020

2121
> [!div class="checklist"]
2222
> * Create an access review
@@ -26,21 +26,23 @@ By using the information in this tutorial Juan and you learn how to:
2626
2727
## Prerequisites
2828

29-
- An Azure account with an active subscription. [Create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
29+
- An Azure account with an active subscription. If you don't already have one, [Create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
3030
- One of the following roles: Global Administrator, Privileged Role Administrator, Cloud Application Administrator, or Application Administrator.
31-
- An enterprise application that has been configured in your Azure AD tenant. See the [Quickstart: Add an enterprise application](add-application-portal.md).
31+
- An enterprise application that has been configured in your Azure AD tenant.
3232

3333
## Create an access review
3434

35-
Juan wants to make sure that users or guests have appropriate access. He decides to ask users of the application to participate in an access review and recertify or attest to their need for access. When the access review is finished, he can then make changes and remove access from users who no longer need it. For more information, see
35+
The administrator wants to make sure that users or guests have appropriate access. They decide to ask users of the application to participate in an access review and recertify or attest to their need for access. When the access review is finished, they can then make changes and remove access from users who no longer need it. For more information, see
3636
[Manage user and guest user access with access reviews](../governance/manage-access-review.md).
3737

38+
To create an access review:
39+
3840
1. Sign in to the [Azure portal](https://portal.azure.com/) with one of the roles listed in the prerequisites.
3941
1. Go to **Azure Active Directory**, and then select **Identity Governance**.
4042
1. On the left menu, select **Access reviews**.
4143
1. Select **New access review** to create a new access review.
4244
1. In **Select what to review**, select **Applications**.
43-
1. Select **+ Select application(s)**, select the application, and then select **Select**.
45+
1. Select **+ Select application(s)**, select the application, and then choose **Select**.
4446
1. Now you can select a scope for the review. Your options are:
4547
- **Guest users only** - This option limits the access review to only the Azure AD B2B guest users in your directory.
4648
- **All users** - This option scopes the access review to all user objects associated with the resource.
@@ -59,34 +61,37 @@ Juan wants to make sure that users or guests have appropriate access. He decides
5961

6062
### Start the access review
6163

62-
After you've specified the settings for an access review, select Start. The access review appears in your list with an indicator of its status.
63-
By default, Azure AD sends an email to reviewers shortly after the review starts. If you choose not to have Azure AD send the email, be sure to inform the reviewers that an access review is waiting for them to complete. You can show them the instructions for how to review access to groups or applications. If your review is for guests to review their own access, show them the instructions for how to review access for yourself to groups or applications.
64+
After you've specified the settings for an access review, select **Start**. The access review appears in your list with an indicator of its status.
65+
66+
By default, Azure AD sends an email to reviewers shortly after the review starts. If you choose not to have Azure AD send the email, be sure to inform the reviewers that an access review is waiting for them to complete. You can show them the instructions for how to review access to groups or applications. If your review is for guests to review their own access, show them the instructions for how to review access for themselves to groups or applications.
67+
6468
If you've assigned guests as reviewers and they haven't accepted their invitation to the tenant, they won't receive an email from access reviews. They must first accept the invitation before they can begin reviewing.
6569

6670
## Access the audit logs report
6771

6872
The audit logs report combines several reports around application activities into a single view for context-based reporting. For more information, see [Audit logs in Azure Active Directory](../reports-monitoring/concept-audit-logs.md).
6973

70-
To access the audit logs report, select **Audit logs** from the **Activity** section of the Azure Active Directory blade.
74+
To access the audit logs report, select **Audit logs** from the **Activity** section of the Azure Active Directory page.
7175

7276
The audit logs report consolidates the following reports:
73-
• Password reset activity
74-
• Password reset registration activity
75-
• Self-service groups activity
76-
• Office365 Group Name Changes
77-
• Account provisioning activity
78-
• Password rollover status
79-
• Account provisioning errors
77+
78+
- Password reset activity
79+
- Password reset registration activity
80+
- Self-service groups activity
81+
- Office365 Group Name Changes
82+
- Account provisioning activity
83+
- Password rollover status
84+
- Account provisioning errors
8085

8186
## Access the sign-ins report
8287

83-
The Sign-ins view includes all user sign-ins, as well as the Application Usage report. You also can view application usage information in the Manage section of the Enterprise applications overview. For more information, see [Sign-in logs in Azure Active Directory](../reports-monitoring/concept-sign-ins.md)
88+
The Sign-ins view includes all user sign-ins, and the Application Usage report. You also can view application usage information in the Manage section of the Enterprise applications overview. For more information, see [Sign-in logs in Azure Active Directory](../reports-monitoring/concept-sign-ins.md)
8489

85-
Select Signins from the Activity section of the Azure Active Directory blade.
90+
To access the sign-in logs report, select **Sign-ins** from the **Monitoring** section of the Azure Active Directory blade.
8691

8792
## Send logs to Azure Monitor
8893

89-
The Azure AD activity logs only store information for a maximum of 30 days. Depending on your needs, you may want to have additional storage to back up the activity logs data. Using the Azure Monitor, you can archive the audit and sign logs to an Azure storage account to retain the data for a longer time.
94+
The Azure AD activity logs only store information for a maximum of 30 days. Depending on your needs, you may require extra storage to back up the activity logs data. Using the Azure Monitor, you can archive the audit and sign logs to an Azure storage account to retain the data for a longer time.
9095
The Azure Monitor is also useful for rich visualization, monitoring and alerting of data. To learn more about the Azure Monitor and the cost considerations for additional storage, see [Azure AD activity logs in Azure Monitor](../reports-monitoring/concept-activity-logs-azure-monitor.md).
9196

9297
To send logs to your logs analytics workspace:
@@ -103,4 +108,4 @@ After about 15 minutes, verify that events are streamed to your Log Analytics wo
103108

104109
Advance to the next article to learn how to...
105110
> [!div class="nextstepaction"]
106-
> [Manage certificates for federated single sign-on](manage-certificates-for-federated-single-sign-on.md)
111+
> [Manage consent to applications and evaluate consent requests](manage-consent-requests.md)

articles/active-directory/manage-apps/tutorial-manage-access-security.md

Lines changed: 16 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -1,22 +1,22 @@
11
---
22
title: "Tutorial: Manage application access and security"
33
titleSuffix: Azure AD
4-
description: In this tutorial, you learn how to manage access to an application in Azure Active Directory and make sure it is secure.
5-
author: davidmu1
4+
description: In this tutorial, you learn how to manage access to an application in Azure Active Directory and make sure it's secure.
5+
author: omondiatieno
66
manager: CelesteDG
7-
ms.author: davidmu
7+
ms.author: jomondi
88
ms.service: active-directory
99
ms.subservice: app-mgmt
1010
ms.topic: tutorial
11-
ms.date: 02/14/22
11+
ms.date: 02/24/2022
1212

1313
# Customer intent: As an administrator of an Azure AD tenant, I want to manage access to my applications and make sure they are secure.
1414
---
1515

1616
# Tutorial: Manage application access and security
1717

18-
Juan at Fabrikam has added and configured an application from the Azure Active Directory (Azure AD) application gallery. He now needs to understand the features that are available to manage access to the application and make sure the application is secure.
19-
By using the information in this tutorial Juan and you learn how to:
18+
The IT administrator at Fabrikam has added and configured an application from the Azure Active Directory (Azure AD) application gallery. They now need to understand the features that are available to manage access to the application and make sure the application is secure.
19+
By using the information in this tutorial an administrator learns how to:
2020

2121
> [!div class="checklist"]
2222
@@ -29,12 +29,12 @@ By using the information in this tutorial Juan and you learn how to:
2929

3030
* An Azure account with an active subscription. [Create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
3131
* One of the following roles: Global Administrator, Privileged Role Administrator, Cloud Application Administrator, or Application Administrator.
32-
* An enterprise application that has been configured in your Azure AD tenant. See the [Quickstart: Add an enterprise application](add-application-portal.md).
32+
* An enterprise application that has been configured in your Azure AD tenant.
3333
* At least one user account added and assigned to the application. For more information, see [Quickstart: Create and assign a user account](add-application-portal-assign-users.md).
3434

3535
## Grant tenant wide admin consent
3636

37-
For the application that Juan added to his tenant, he wants to set it up so that all users in the organization can use it and not have to individually request consent to use it. To avoid the need for user consent, Juan can grant consent for the application on behalf of all users in the organization. For more information, see [Consent and permissions overview](consent-and-permissions-overview.md).
37+
For the application that the administrator added to their tenant, they want to set it up so that all users in the organization can use it and not have to individually request consent to use it. To avoid the need for user consent, they can grant consent for the application on behalf of all users in the organization. For more information, see [Consent and permissions overview](consent-and-permissions-overview.md).
3838

3939
1. Sign in to the [Azure portal](https://portal.azure.com/) with one of the roles listed in the prerequisites.
4040
2. Search for and select **Azure Active Directory**.
@@ -45,11 +45,11 @@ For the application that Juan added to his tenant, he wants to set it up so that
4545

4646
## Create a Conditional Access policy
4747

48-
Juan wants to make sure that only the people he assigns to the application can securely sign in. To do this he can configure a Conditional Access policy for a group of users that enforces multi-factor authentication (MFA). For more information, see [What is Conditional Access?](../conditional-access/overview.md).
48+
The administrator wants to make sure that only the people they assign to the application can securely sign in. To do this they can configure a conditional access policy for a group of users that enforces multi-factor authentication (MFA). For more information, see [What is Conditional Access?](../conditional-access/overview.md).
4949

5050
### Create a group
5151

52-
It is easier for Juan to manage access to the application by assigning all users of the application to a group. Juan can then manage access at a group level.
52+
It's easier for an administrator to manage access to the application by assigning all users of the application to a group. The administrator can then manage access at a group level.
5353

5454
1. In the left menu of the tenant overview, select **Groups**.
5555
1. Select **New group** at the top of the pane.
@@ -69,7 +69,7 @@ It is easier for Juan to manage access to the application by assigning all users
6969

7070
### Configure multi-factor authentication
7171

72-
In this tutorial, Juan can find the basic steps to configure the application, but he should consider creating a plan for MFA before starting. For more information, see [Plan an Azure Active Directory Multi-Factor Authentication deployment](../authentication/howto-mfa-getstarted.md).
72+
In this tutorial, the administrator can find the basic steps to configure the application, but they should consider creating a plan for MFA before starting. For more information, see [Plan an Azure Active Directory Multi-Factor Authentication deployment](../authentication/howto-mfa-getstarted.md).
7373

7474
1. Under **Cloud apps or actions**, select **No cloud apps, actions, or authentication contexts selected**. For this tutorial, on the **Include** tab, choose **Select apps**.
7575
1. Search for and select your application, and then select **Select**.
@@ -119,7 +119,7 @@ The My Apps portal enables administrators and users to manage the applications u
119119
1. Open the Azure portal.
120120
1. Go to **Azure Active Directory**, and then select **Enterprise Applications**.
121121
1. Under **Manage**, select **Collections**.
122-
1. Select **New collection**. In the New collection page, enter a **Name** for the collection (it is recommended to not use "collection" in the name. Then enter a **Description**.
122+
1. Select **New collection**. In the New collection page, enter a **Name** for the collection (it's recommended to not use "collection" in the name. Then enter a **Description**.
123123
1. Select the **Applications** tab. Select **+ Add application**, and then in the Add applications page, select all the applications you want to add to the collection, or use the Search box to find applications.
124124
1. When you're finished adding applications, select **Add**. The list of selected applications appears. You can use the arrows to change the order of applications in the list.
125125
1. Select the **Owners** tab. Select **+ Add users and groups**, and then in the Add users and groups page, select the users or groups you want to assign ownership to. When you're finished selecting users and groups, choose **Select**.
@@ -128,13 +128,13 @@ The My Apps portal enables administrators and users to manage the applications u
128128

129129
## Clean up resources
130130

131-
You can keep the resources that you created to use in the next tutorial, or if you're not going to continue to use the resources created in this tutorial, delete them with the following steps.
131+
You can keep the resources for future use, or if you're not going to continue to use the resources created in this tutorial, delete them with the following steps.
132132

133133
## Delete the application
134134

135-
1. In the left menu, select **Enterprise applications**. The **All applications** pane opens and displays a list of the applications in your Azure AD tenant. Search for and select the application that you want to delete. For example, **Azure AD SAML Toolkit**.
135+
1. In the left menu, select **Enterprise applications**. The **All applications** pane opens and displays a list of the applications in your Azure AD tenant. Search for and select the application that you want to delete.
136136
1. In the **Manage** section of the left menu, select **Properties**.
137-
1. At the top of the **Properties** pane, select **Delete**, and then select *Yes* to confirm you want to delete the application from your Azure AD tenant.
137+
1. At the top of the **Properties** pane, select **Delete**, and then select **Yes** to confirm you want to delete the application from your Azure AD tenant.
138138

139139
## Delete the conditional access policy
140140

@@ -151,6 +151,6 @@ You can keep the resources that you created to use in the next tutorial, or if y
151151

152152
## Next steps
153153

154-
Advance to the next article to learn how to...
154+
For information about how you can make sure that your application is healthy and being used correctly, see:
155155
> [!div class="nextstepaction"]
156156
> [Govern and monitor your application](tutorial-govern-monitor.md)

0 commit comments

Comments
 (0)