You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/manage-apps/tutorial-govern-monitor.md
+28-23Lines changed: 28 additions & 23 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,21 +2,21 @@
2
2
title: "Tutorial: Govern and monitor applications"
3
3
titleSuffix: Azure AD
4
4
description: In this tutorial, you learn how to govern and monitor an application in Azure Active Directory.
5
-
author: davidmu1
5
+
author: omondiatieno
6
6
manager: CelesteDG
7
-
ms.author: davidmu
7
+
ms.author: jomondi
8
8
ms.service: active-directory
9
9
ms.subservice: app-mgmt
10
10
ms.topic: tutorial
11
-
ms.date: 02/16/22
11
+
ms.date: 02/24/2022
12
12
# Customer intent: As an administrator of an Azure AD tenant, I want to govern and monitor my applications.
13
13
---
14
14
15
15
# Tutorial: Govern and monitor applications
16
16
17
-
Juan at Fabrikam has added and configured an application from the [Azure Active Directory (Azure AD) application gallery](overview-application-gallery.md). He also made sure that access can be managed and that the application is secure by using the information in [Tutorial: Manage application access and security](tutorial-manage-access-security.md). He now needs to understand the recources that are available to govern and monitor the application.
17
+
The IT administrator at Fabrikam has added and configured an application from the [Azure Active Directory (Azure AD) application gallery](overview-application-gallery.md). They also made sure that access can be managed and that the application is secure by using the information in [Tutorial: Manage application access and security](tutorial-manage-access-security.md). They now need to understand the resources that are available to govern and monitor the application.
18
18
19
-
By using the information in this tutorial Juan and you learn how to:
19
+
By using the information in this tutorial, an administrator of the application learns how to:
20
20
21
21
> [!div class="checklist"]
22
22
> * Create an access review
@@ -26,21 +26,23 @@ By using the information in this tutorial Juan and you learn how to:
26
26
27
27
## Prerequisites
28
28
29
-
- An Azure account with an active subscription. [Create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
29
+
- An Azure account with an active subscription. If you don't already have one, [Create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
30
30
- One of the following roles: Global Administrator, Privileged Role Administrator, Cloud Application Administrator, or Application Administrator.
31
-
- An enterprise application that has been configured in your Azure AD tenant. See the [Quickstart: Add an enterprise application](add-application-portal.md).
31
+
- An enterprise application that has been configured in your Azure AD tenant.
32
32
33
33
## Create an access review
34
34
35
-
Juan wants to make sure that users or guests have appropriate access. He decides to ask users of the application to participate in an access review and recertify or attest to their need for access. When the access review is finished, he can then make changes and remove access from users who no longer need it. For more information, see
35
+
The administrator wants to make sure that users or guests have appropriate access. They decide to ask users of the application to participate in an access review and recertify or attest to their need for access. When the access review is finished, they can then make changes and remove access from users who no longer need it. For more information, see
36
36
[Manage user and guest user access with access reviews](../governance/manage-access-review.md).
37
37
38
+
To create an access review:
39
+
38
40
1. Sign in to the [Azure portal](https://portal.azure.com/) with one of the roles listed in the prerequisites.
39
41
1. Go to **Azure Active Directory**, and then select **Identity Governance**.
40
42
1. On the left menu, select **Access reviews**.
41
43
1. Select **New access review** to create a new access review.
42
44
1. In **Select what to review**, select **Applications**.
43
-
1. Select **+ Select application(s)**, select the application, and then select**Select**.
45
+
1. Select **+ Select application(s)**, select the application, and then choose**Select**.
44
46
1. Now you can select a scope for the review. Your options are:
45
47
-**Guest users only** - This option limits the access review to only the Azure AD B2B guest users in your directory.
46
48
-**All users** - This option scopes the access review to all user objects associated with the resource.
@@ -59,34 +61,37 @@ Juan wants to make sure that users or guests have appropriate access. He decides
59
61
60
62
### Start the access review
61
63
62
-
After you've specified the settings for an access review, select Start. The access review appears in your list with an indicator of its status.
63
-
By default, Azure AD sends an email to reviewers shortly after the review starts. If you choose not to have Azure AD send the email, be sure to inform the reviewers that an access review is waiting for them to complete. You can show them the instructions for how to review access to groups or applications. If your review is for guests to review their own access, show them the instructions for how to review access for yourself to groups or applications.
64
+
After you've specified the settings for an access review, select **Start**. The access review appears in your list with an indicator of its status.
65
+
66
+
By default, Azure AD sends an email to reviewers shortly after the review starts. If you choose not to have Azure AD send the email, be sure to inform the reviewers that an access review is waiting for them to complete. You can show them the instructions for how to review access to groups or applications. If your review is for guests to review their own access, show them the instructions for how to review access for themselves to groups or applications.
67
+
64
68
If you've assigned guests as reviewers and they haven't accepted their invitation to the tenant, they won't receive an email from access reviews. They must first accept the invitation before they can begin reviewing.
65
69
66
70
## Access the audit logs report
67
71
68
72
The audit logs report combines several reports around application activities into a single view for context-based reporting. For more information, see [Audit logs in Azure Active Directory](../reports-monitoring/concept-audit-logs.md).
69
73
70
-
To access the audit logs report, select **Audit logs** from the **Activity** section of the Azure Active Directory blade.
74
+
To access the audit logs report, select **Audit logs** from the **Activity** section of the Azure Active Directory page.
71
75
72
76
The audit logs report consolidates the following reports:
73
-
• Password reset activity
74
-
• Password reset registration activity
75
-
• Self-service groups activity
76
-
• Office365 Group Name Changes
77
-
• Account provisioning activity
78
-
• Password rollover status
79
-
• Account provisioning errors
77
+
78
+
- Password reset activity
79
+
- Password reset registration activity
80
+
- Self-service groups activity
81
+
- Office365 Group Name Changes
82
+
- Account provisioning activity
83
+
- Password rollover status
84
+
- Account provisioning errors
80
85
81
86
## Access the sign-ins report
82
87
83
-
The Sign-ins view includes all user sign-ins, as well as the Application Usage report. You also can view application usage information in the Manage section of the Enterprise applications overview. For more information, see [Sign-in logs in Azure Active Directory](../reports-monitoring/concept-sign-ins.md)
88
+
The Sign-ins view includes all user sign-ins, and the Application Usage report. You also can view application usage information in the Manage section of the Enterprise applications overview. For more information, see [Sign-in logs in Azure Active Directory](../reports-monitoring/concept-sign-ins.md)
84
89
85
-
Select Signins from the Activity section of the Azure Active Directory blade.
90
+
To access the sign-in logs report, select **Sign-ins**from the **Monitoring** section of the Azure Active Directory blade.
86
91
87
92
## Send logs to Azure Monitor
88
93
89
-
The Azure AD activity logs only store information for a maximum of 30 days. Depending on your needs, you may want to have additional storage to back up the activity logs data. Using the Azure Monitor, you can archive the audit and sign logs to an Azure storage account to retain the data for a longer time.
94
+
The Azure AD activity logs only store information for a maximum of 30 days. Depending on your needs, you may require extra storage to back up the activity logs data. Using the Azure Monitor, you can archive the audit and sign logs to an Azure storage account to retain the data for a longer time.
90
95
The Azure Monitor is also useful for rich visualization, monitoring and alerting of data. To learn more about the Azure Monitor and the cost considerations for additional storage, see [Azure AD activity logs in Azure Monitor](../reports-monitoring/concept-activity-logs-azure-monitor.md).
91
96
92
97
To send logs to your logs analytics workspace:
@@ -103,4 +108,4 @@ After about 15 minutes, verify that events are streamed to your Log Analytics wo
103
108
104
109
Advance to the next article to learn how to...
105
110
> [!div class="nextstepaction"]
106
-
> [Manage certificates for federated single sign-on](manage-certificates-for-federated-single-sign-on.md)
111
+
> [Manage consent to applications and evaluate consent requests](manage-consent-requests.md)
Copy file name to clipboardExpand all lines: articles/active-directory/manage-apps/tutorial-manage-access-security.md
+16-16Lines changed: 16 additions & 16 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,22 +1,22 @@
1
1
---
2
2
title: "Tutorial: Manage application access and security"
3
3
titleSuffix: Azure AD
4
-
description: In this tutorial, you learn how to manage access to an application in Azure Active Directory and make sure it is secure.
5
-
author: davidmu1
4
+
description: In this tutorial, you learn how to manage access to an application in Azure Active Directory and make sure it's secure.
5
+
author: omondiatieno
6
6
manager: CelesteDG
7
-
ms.author: davidmu
7
+
ms.author: jomondi
8
8
ms.service: active-directory
9
9
ms.subservice: app-mgmt
10
10
ms.topic: tutorial
11
-
ms.date: 02/14/22
11
+
ms.date: 02/24/2022
12
12
13
13
# Customer intent: As an administrator of an Azure AD tenant, I want to manage access to my applications and make sure they are secure.
14
14
---
15
15
16
16
# Tutorial: Manage application access and security
17
17
18
-
Juan at Fabrikam has added and configured an application from the Azure Active Directory (Azure AD) application gallery. He now needs to understand the features that are available to manage access to the application and make sure the application is secure.
19
-
By using the information in this tutorial Juan and you learn how to:
18
+
The IT administrator at Fabrikam has added and configured an application from the Azure Active Directory (Azure AD) application gallery. They now need to understand the features that are available to manage access to the application and make sure the application is secure.
19
+
By using the information in this tutorial an administrator learns how to:
20
20
21
21
> [!div class="checklist"]
22
22
@@ -29,12 +29,12 @@ By using the information in this tutorial Juan and you learn how to:
29
29
30
30
* An Azure account with an active subscription. [Create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
31
31
* One of the following roles: Global Administrator, Privileged Role Administrator, Cloud Application Administrator, or Application Administrator.
32
-
* An enterprise application that has been configured in your Azure AD tenant. See the [Quickstart: Add an enterprise application](add-application-portal.md).
32
+
* An enterprise application that has been configured in your Azure AD tenant.
33
33
* At least one user account added and assigned to the application. For more information, see [Quickstart: Create and assign a user account](add-application-portal-assign-users.md).
34
34
35
35
## Grant tenant wide admin consent
36
36
37
-
For the application that Juan added to his tenant, he wants to set it up so that all users in the organization can use it and not have to individually request consent to use it. To avoid the need for user consent, Juan can grant consent for the application on behalf of all users in the organization. For more information, see [Consent and permissions overview](consent-and-permissions-overview.md).
37
+
For the application that the administrator added to their tenant, they want to set it up so that all users in the organization can use it and not have to individually request consent to use it. To avoid the need for user consent, they can grant consent for the application on behalf of all users in the organization. For more information, see [Consent and permissions overview](consent-and-permissions-overview.md).
38
38
39
39
1. Sign in to the [Azure portal](https://portal.azure.com/) with one of the roles listed in the prerequisites.
40
40
2. Search for and select **Azure Active Directory**.
@@ -45,11 +45,11 @@ For the application that Juan added to his tenant, he wants to set it up so that
45
45
46
46
## Create a Conditional Access policy
47
47
48
-
Juan wants to make sure that only the people he assigns to the application can securely sign in. To do this he can configure a Conditional Access policy for a group of users that enforces multi-factor authentication (MFA). For more information, see [What is Conditional Access?](../conditional-access/overview.md).
48
+
The administrator wants to make sure that only the people they assign to the application can securely sign in. To do this they can configure a conditional access policy for a group of users that enforces multi-factor authentication (MFA). For more information, see [What is Conditional Access?](../conditional-access/overview.md).
49
49
50
50
### Create a group
51
51
52
-
It is easier for Juan to manage access to the application by assigning all users of the application to a group. Juan can then manage access at a group level.
52
+
It's easier for an administrator to manage access to the application by assigning all users of the application to a group. The administrator can then manage access at a group level.
53
53
54
54
1. In the left menu of the tenant overview, select **Groups**.
55
55
1. Select **New group** at the top of the pane.
@@ -69,7 +69,7 @@ It is easier for Juan to manage access to the application by assigning all users
69
69
70
70
### Configure multi-factor authentication
71
71
72
-
In this tutorial, Juan can find the basic steps to configure the application, but he should consider creating a plan for MFA before starting. For more information, see [Plan an Azure Active Directory Multi-Factor Authentication deployment](../authentication/howto-mfa-getstarted.md).
72
+
In this tutorial, the administrator can find the basic steps to configure the application, but they should consider creating a plan for MFA before starting. For more information, see [Plan an Azure Active Directory Multi-Factor Authentication deployment](../authentication/howto-mfa-getstarted.md).
73
73
74
74
1. Under **Cloud apps or actions**, select **No cloud apps, actions, or authentication contexts selected**. For this tutorial, on the **Include** tab, choose **Select apps**.
75
75
1. Search for and select your application, and then select **Select**.
@@ -119,7 +119,7 @@ The My Apps portal enables administrators and users to manage the applications u
119
119
1. Open the Azure portal.
120
120
1. Go to **Azure Active Directory**, and then select **Enterprise Applications**.
121
121
1. Under **Manage**, select **Collections**.
122
-
1. Select **New collection**. In the New collection page, enter a **Name** for the collection (it is recommended to not use "collection" in the name. Then enter a **Description**.
122
+
1. Select **New collection**. In the New collection page, enter a **Name** for the collection (it's recommended to not use "collection" in the name. Then enter a **Description**.
123
123
1. Select the **Applications** tab. Select **+ Add application**, and then in the Add applications page, select all the applications you want to add to the collection, or use the Search box to find applications.
124
124
1. When you're finished adding applications, select **Add**. The list of selected applications appears. You can use the arrows to change the order of applications in the list.
125
125
1. Select the **Owners** tab. Select **+ Add users and groups**, and then in the Add users and groups page, select the users or groups you want to assign ownership to. When you're finished selecting users and groups, choose **Select**.
@@ -128,13 +128,13 @@ The My Apps portal enables administrators and users to manage the applications u
128
128
129
129
## Clean up resources
130
130
131
-
You can keep the resources that you created to use in the next tutorial, or if you're not going to continue to use the resources created in this tutorial, delete them with the following steps.
131
+
You can keep the resources for future use, or if you're not going to continue to use the resources created in this tutorial, delete them with the following steps.
132
132
133
133
## Delete the application
134
134
135
-
1. In the left menu, select **Enterprise applications**. The **All applications** pane opens and displays a list of the applications in your Azure AD tenant. Search for and select the application that you want to delete. For example, **Azure AD SAML Toolkit**.
135
+
1. In the left menu, select **Enterprise applications**. The **All applications** pane opens and displays a list of the applications in your Azure AD tenant. Search for and select the application that you want to delete.
136
136
1. In the **Manage** section of the left menu, select **Properties**.
137
-
1. At the top of the **Properties** pane, select **Delete**, and then select *Yes* to confirm you want to delete the application from your Azure AD tenant.
137
+
1. At the top of the **Properties** pane, select **Delete**, and then select **Yes** to confirm you want to delete the application from your Azure AD tenant.
138
138
139
139
## Delete the conditional access policy
140
140
@@ -151,6 +151,6 @@ You can keep the resources that you created to use in the next tutorial, or if y
151
151
152
152
## Next steps
153
153
154
-
Advance to the next article to learn how to...
154
+
For information about how you can make sure that your application is healthy and being used correctly, see:
155
155
> [!div class="nextstepaction"]
156
156
> [Govern and monitor your application](tutorial-govern-monitor.md)
0 commit comments