Skip to content

Commit bb96316

Browse files
authored
Merge pull request #232148 from MicrosoftDocs/main
Publish to live, Sunday 4PM PST, 3/26
2 parents ff7fb93 + 271fac7 commit bb96316

File tree

17 files changed

+312
-160
lines changed

17 files changed

+312
-160
lines changed

articles/active-directory/fundamentals/whats-new-archive.md

Lines changed: 108 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -27,6 +27,114 @@ The What's new in Azure Active Directory? release notes provide information abou
2727
- Deprecated functionality
2828
- Plans for changes
2929

30+
---
31+
32+
## September 2022
33+
34+
### General Availability - SSPR writeback is now available for disconnected forests using Azure AD Connect cloud sync
35+
36+
37+
38+
**Type:** New feature
39+
**Service category:** Azure AD Connect Cloud Sync
40+
**Product capability:** Identity Lifecycle Management
41+
42+
Azure AD Connect Cloud Sync Password writeback now provides customers the ability to synchronize Azure AD password changes made in the cloud to an on-premises directory in real time. This can be accomplished using the lightweight Azure AD cloud provisioning agent. For more information, see: [Tutorial: Enable cloud sync self-service password reset writeback to an on-premises environment](../authentication/tutorial-enable-cloud-sync-sspr-writeback.md).
43+
44+
---
45+
46+
### General Availability - Device-based conditional access on Linux Desktops
47+
48+
49+
50+
**Type:** New feature
51+
**Service category:** Conditional Access
52+
**Product capability:** SSO
53+
54+
55+
56+
This feature empowers users on Linux clients to register their devices with Azure AD, enroll into Intune management, and satisfy device-based Conditional Access policies when accessing their corporate resources.
57+
58+
- Users can register their Linux devices with Azure AD.
59+
- Users can enroll in Mobile Device Management (Intune), which can be used to provide compliance decisions based upon policy definitions to allow device based conditional access on Linux Desktops.
60+
- If compliant, users can use Microsoft Edge Browser to enable Single-Sign on to M365/Azure resources and satisfy device-based Conditional Access policies.
61+
62+
For more information, see:
63+
64+
- [Azure AD registered devices](../devices/concept-azure-ad-register.md)
65+
- [Plan your Azure Active Directory device deployment](../devices/plan-device-deployment.md)
66+
67+
---
68+
69+
### General Availability - Azure AD SCIM Validator
70+
71+
72+
73+
**Type:** New feature
74+
**Service category:** Provisioning
75+
**Product capability:** Outbound to SaaS Applications
76+
77+
78+
79+
Independent Software Vendors(ISVs) and developers can self-test their SCIM endpoints for compatibility: We have made it easier for ISVs to validate that their endpoints are compatible with the SCIM-based Azure AD provisioning services. This is now in general availability (GA) status.
80+
81+
For more information, see: [Tutorial: Validate a SCIM endpoint](../app-provisioning/scim-validator-tutorial.md)
82+
83+
---
84+
85+
### General Availability - prevent accidental deletions
86+
87+
88+
89+
**Type:** New feature
90+
**Service category:** Provisioning
91+
**Product capability:** Outbound to SaaS Applications
92+
93+
94+
95+
Accidental deletion of users in any system could be disastrous. We’re excited to announce the general availability of the accidental deletions prevention capability as part of the Azure AD provisioning service. When the number of deletions to be processed in a single provisioning cycle spikes above a customer defined threshold the following will happen. The Azure AD provisioning service pauses, provide you with visibility into the potential deletions, and allow you to accept or reject the deletions. This functionality has historically been available for Azure AD Connect, and Azure AD Connect Cloud Sync. It's now available across the various provisioning flows, including both HR-driven provisioning and application provisioning.
96+
97+
For more information, see: [Enable accidental deletions prevention in the Azure AD provisioning service](../app-provisioning/accidental-deletions.md)
98+
99+
---
100+
101+
### General Availability - Identity Protection Anonymous and Malicious IP for ADFS on-premises logins
102+
103+
104+
105+
**Type:** New feature
106+
**Service category:** Identity Protection
107+
**Product capability:** Identity Security & Protection
108+
109+
110+
111+
Identity protection expands its Anonymous and Malicious IP detections to protect ADFS sign-ins. This automatically applies to all customers who have AD Connect Health deployed and enabled, and show up as the existing "Anonymous IP" or "Malicious IP" detections with a token issuer type of "AD Federation Services".
112+
113+
For more information, see: [What is risk?](../identity-protection/concept-identity-protection-risks.md)
114+
115+
---
116+
117+
118+
### New Federated Apps available in Azure AD Application gallery - September 2022
119+
120+
121+
122+
**Type:** New feature
123+
**Service category:** Enterprise Apps
124+
**Product capability:** 3rd Party Integration
125+
126+
127+
128+
In September 2022 we've added the following 15 new applications in our App gallery with Federation support:
129+
130+
[RocketReach SSO](../saas-apps/rocketreach-sso-tutorial.md), [Arena EU](../saas-apps/arena-eu-tutorial.md), [Zola](../saas-apps/zola-tutorial.md), [FourKites SAML2.0 SSO for Tracking](../saas-apps/fourkites-tutorial.md), [Syniverse Customer Portal](../saas-apps/syniverse-customer-portal-tutorial.md), [Rimo](https://rimo.app/), [Q Ware CMMS](https://qware.app/), [Mapiq (OIDC)](https://app.mapiq.com/), [NICE Cxone](../saas-apps/nice-cxone-tutorial.md), [dominKnow|ONE](../saas-apps/dominknowone-tutorial.md), [Waynbo for Azure AD](https://webportal-eu.waynbo.com/Login), [innDex](https://web.inndex.co.uk/azure/authorize), [Profiler Software](https://www.profiler.net.au/), [Trotto go links](https://trot.to/_/auth/login), [AsignetSSOIntegration](../saas-apps/asignet-sso-tutorial.md).
131+
132+
You can also find the documentation of all the applications from here https://aka.ms/AppsTutorial,
133+
134+
For listing your application in the Azure AD app gallery, read the details here: https://aka.ms/AzureADAppRequest
135+
136+
137+
30138
---
31139

32140
## August 2022

articles/automation/automation-solution-vm-management.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ ms.custom: devx-track-azurepowershell, engagement-fy23
1111
# Start/Stop VMs during off-hours overview
1212

1313
> [!NOTE]
14-
> Start/Stop VM during off-hours version 1 is unavailable in the marketplace now as it will retire by 30 September 2023. We recommend you start using [version 2](../azure-functions/start-stop-vms/overview.md), which is now generally available. The new version offers all existing capabilities and provides new features, such as multi-subscription support from a single Start/Stop instance. If you have the version 1 solution already deployed, you can still use the feature, and we will provide support until 30 September 2023. The details of the announcement will be shared soon.
14+
> Start/Stop VM during off-hours version 1 is unavailable in the marketplace now as it will retire by 30 September 2023. We recommend you start using [version 2](../azure-functions/start-stop-vms/overview.md) which is now generally available. The new version offers all existing capabilities and provides new features, such as multi-subscription support from a single Start/Stop instance. If you have the version 1 solution already deployed, you can still use the feature, and we will provide support until 30 September 2023. The details of the announcement will be shared soon.
1515
1616
The Start/Stop VMs during off-hours feature start or stops enabled Azure VMs. It starts or stops machines on user-defined schedules, provides insights through Azure Monitor logs, and sends optional emails by using [action groups](../azure-monitor/alerts/action-groups.md). The feature can be enabled on both Azure Resource Manager and classic VMs for most scenarios.
1717

-41.7 KB
Loading

articles/azure-monitor/app/app-insights-overview.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -12,12 +12,12 @@ Application Insights is an extension of [Azure Monitor](../overview.md) and prov
1212
1. *Proactively* understand how an application is performing.
1313
1. *Reactively* review application execution data to determine the cause of an incident.
1414

15+
:::image type="content" source="media/overview-dashboard/0001-dashboard.png" alt-text="Screenshot of Application Insights in the Azure portal." lightbox="media/overview-dashboard/0001-dashboard.png":::
16+
1517
In addition to collecting [Metrics](standard-metrics.md) and application [Telemetry](data-model-complete.md) data, which describe application activities and health, Application Insights can also be used to collect and store application [trace logging data](asp-net-trace-logs.md).
1618

1719
The [log trace](asp-net-trace-logs.md) is associated with other telemetry to give a detailed view of the activity. Adding trace logging to existing apps only requires providing a destination for the logs; the logging framework rarely needs to be changed.
1820

19-
:::image type="content" source="media/overview-dashboard/0001-dashboard.png" alt-text="Screenshot of Application Insights in the Azure portal." lightbox="media/overview-dashboard/0001-dashboard.png":::
20-
2121
Application Insights provides other features including, but not limited to:
2222

2323
- [Live Metrics](live-stream.md) – observe activity from your deployed application in real time with no effect on the host environment

articles/azure-monitor/index.yml

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@ landingContent:
3636
# Card
3737
- title: Common scenarios
3838
linkLists:
39-
- linkListType: deploy
39+
- linkListType: how-to-guide
4040
links:
4141
- text: Multi-cloud monitoring
4242
url: best-practices-multicloud.md
@@ -84,7 +84,7 @@ landingContent:
8484
# Card
8585
- title: Get started with Azure Monitor Logs
8686
linkLists:
87-
- linkListType: deploy
87+
- linkListType: how-to-guide
8888
links:
8989
- text: Set up a Log Analytics workspace
9090
url: logs/log-analytics-workspace-overview.md
@@ -102,7 +102,7 @@ landingContent:
102102
# Card
103103
- title: Get started with Application Insights
104104
linkLists:
105-
- linkListType: get-started
105+
- linkListType: how-to-guide
106106
links:
107107
- text: Application Insights overview
108108
url: app/app-insights-overview.md
@@ -120,7 +120,7 @@ landingContent:
120120
# Card
121121
- title: Visualize monitoring data
122122
linkLists:
123-
- linkListType: deploy
123+
- linkListType: how-to-guide
124124
links:
125125
- text: Insights and curated visualizations
126126
url: /insights/insights-overview
@@ -136,7 +136,7 @@ landingContent:
136136
# Card
137137
- title: Respond to issues
138138
linkLists:
139-
- linkListType: deploy
139+
- linkListType: how-to-guide
140140
links:
141141
- text: Alerts
142142
url: /alerts/alerts-overview.md

articles/azure-monitor/logs/manage-access.md

Lines changed: 6 additions & 96 deletions
Original file line numberDiff line numberDiff line change
@@ -297,105 +297,15 @@ In addition to using the built-in roles for a Log Analytics workspace, you can c
297297

298298
## Set table-level read access
299299

300-
To create a [custom role](../../role-based-access-control/custom-roles.md) that lets specific users or groups read data from specific tables in a workspace:
301-
302-
1. Create a custom role that grants users permission to execute queries in the Log Analytics workspace, based on the built-in Azure Monitor Logs **Reader** role:
303-
304-
1. Navigate to your workspace and select **Access control (IAM)** > **Roles**.
305-
306-
1. Right-click the **Reader** role and select **Clone**.
307-
308-
:::image type="content" source="media/manage-access/access-control-clone-role.png" alt-text="Screenshot that shows the Roles tab of the Access control screen with the clone button highlighted for the Reader role." lightbox="media/manage-access/access-control-clone-role.png":::
309-
310-
This opens the **Create a custom role** screen.
311-
312-
1. On the **Basics** tab of the screen, enter a **Custom role name** value and, optionally, provide a description.
313-
314-
:::image type="content" source="media/manage-access/manage-access-create-custom-role.png" alt-text="Screenshot that shows the Basics tab of the Create a custom role screen with the Custom role name and Description fields highlighted." lightbox="media/manage-access/manage-access-create-custom-role.png":::
315-
316-
1. Select the **JSON** tab > **Edit**::
317-
318-
1. In the `"actions"` section, add:
319-
320-
- `Microsoft.OperationalInsights/workspaces/read`
321-
- `Microsoft.OperationalInsights/workspaces/query/read`
322-
- `Microsoft.OperationalInsights/workspaces/analytics/query/action`
323-
- `Microsoft.OperationalInsights/workspaces/search/action`
324-
325-
1. In the `"not actions"` section, add `Microsoft.OperationalInsights/workspaces/sharedKeys/read`.
326-
327-
:::image type="content" source="media/manage-access/manage-access-create-custom-role-json.png" alt-text="Screenshot that shows the JSON tab of the Create a custom role screen with the actions section of the JSON file highlighted." lightbox="media/manage-access/manage-access-create-custom-role-json.png":::
328-
329-
1. Select **Save** > **Review + Create** at the bottom of the screen, and then **Create** on the next page.
330-
331-
1. Assign your custom role to the relevant users or groups:
332-
1. Select **Access control (AIM)** > **Add** > **Add role assignment**.
333-
334-
:::image type="content" source="media/manage-access/manage-access-add-role-assignment-button.png" alt-text="Screenshot that shows the Access control screen with the Add role assignment button highlighted." lightbox="media/manage-access/manage-access-add-role-assignment-button.png":::
335-
336-
1. Select the custom role you created and select **Next**.
337-
338-
:::image type="content" source="media/manage-access/manage-access-add-role-assignment-screen.png" alt-text="Screenshot that shows the Add role assignment screen with a custom role and the Next button highlighted." lightbox="media/manage-access/manage-access-add-role-assignment-screen.png":::
339-
340-
341-
This opens the **Members** tab of the **Add custom role assignment** screen.
342-
343-
1. Click **+ Select members** to open the **Select members** screen.
344-
345-
:::image type="content" source="media/manage-access/manage-access-add-role-assignment-select-members.png" alt-text="Screenshot that shows the Select members screen." lightbox="media/manage-access/manage-access-add-role-assignment-select-members.png":::
346-
347-
1. Search for and select the relevant user or group and click **Select**.
348-
1. Select **Review and assign**.
349-
350-
1. Grant the users or groups read access to specific tables in a workspace by calling the `https://management.azure.com/batch?api-version=2020-06-01` POST API and sending the following details in the request body:
351-
352-
```json
353-
{
354-
"requests": [
355-
{
356-
"content": {
357-
"Id": "<GUID_1>",
358-
"Properties": {
359-
"PrincipalId": "<user_object_ID>",
360-
"PrincipalType": "User",
361-
"RoleDefinitionId": "/providers/Microsoft.Authorization/roleDefinitions/acdd72a7-3385-48ef-bd42-f606fba81ae7",
362-
"Scope": "/subscriptions/<subscription_ID>/resourceGroups/<resource_group_name>/providers/Microsoft.OperationalInsights/workspaces/<workspace_name>/Tables/<table_name>",
363-
"Condition": null,
364-
"ConditionVersion": null
365-
}
366-
},
367-
"httpMethod": "PUT",
368-
"name": "<GUID_2>",
369-
"requestHeaderDetails": {
370-
"commandName": "Microsoft_Azure_AD."
371-
},
372-
"url": "/subscriptions/<subscription_ID>/resourceGroups/<resource_group_name>/providers/Microsoft.OperationalInsights/workspaces/<workspace_name>/Tables/<table_name>/providers/Microsoft.Authorization/roleAssignments/<GUID_1>?api-version=2020-04-01-preview"
373-
}
374-
]
375-
}
376-
```
377-
378-
Where:
379-
- You can generate a GUID for `<GUID 1>` and `<GUID 2>` using any GUID generator.
380-
- `<user_object_ID>` is the object ID of the user to which you want to grant table read access.
381-
- `<subscription_ID>` is the ID of the subscription related to the workspace.
382-
- `<resource_group_name>` is the resource group of the workspace.
383-
- `<workspace_name>` is the name of the workspace.
384-
- `<table_name>` is the name of the table to which you want to assign the user or group permission to read data from.
385-
386-
### Legacy method of setting table-level read access
387-
388-
[Azure custom roles](../../role-based-access-control/custom-roles.md) let you grant access to specific tables in the workspace, although we recommend defining [table-level read access](#set-table-level-read-access) as described above.
389-
390-
Azure custom roles apply to workspaces with either workspace-context or resource-context [access control modes](#access-control-mode) regardless of the user's [access mode](#access-mode).
300+
[Azure custom roles](../../role-based-access-control/custom-roles.md) let you grant specific users or groups access to specific tables in the workspace. Azure custom roles apply to workspaces with either workspace-context or resource-context [access control modes](#access-control-mode) regardless of the user's [access mode](#access-mode).
391301

392302
To define access to a particular table, create a [custom role](../../role-based-access-control/custom-roles.md):
393303

394304
* Set the user permissions in the **Actions** section of the role definition.
395305
* Use `Microsoft.OperationalInsights/workspaces/query/*` to grant access to all tables.
396306
* To exclude access to specific tables when you use a wildcard in **Actions**, list the tables excluded tables in the **NotActions** section of the role definition.
397307

398-
#### Examples
308+
### Examples
399309

400310
Here are examples of custom role actions to grant and deny access to specific tables.
401311

@@ -434,14 +344,14 @@ Grant access to all tables except the _SecurityAlert_ table:
434344
],
435345
```
436346

437-
#### Custom tables
347+
### Custom tables
438348

439-
Custom tables store data you collect from data sources such as [text logs](../agents/data-sources-custom-logs.md) and the [HTTP Data Collector API](data-collector-api.md). To identify the table type, [view table information in Log Analytics](./log-analytics-tutorial.md#view-table-information).
349+
Custom tables store data you collect from data sources such as [text logs](../agents/data-sources-custom-logs.md) and the [HTTP Data Collector API](data-collector-api.md). To identify the table type, [view table information in Log Analytics](./log-analytics-tutorial.md#view-table-information).
440350

441351
> [!NOTE]
442352
> Tables created by the [Logs ingestion API](../essentials/../logs/logs-ingestion-api-overview.md) don't yet support table-level RBAC.
443353
444-
You can't grant access to individual custom log tables, but you can grant access to all custom logs. To create a role with access to all custom log tables, create a custom role by using the following actions:
354+
You can't grant access to individual custom log tables at the table level, but you can grant access to all custom log tables. To create a role with access to all custom log tables, create a custom role by using the following actions:
445355

446356
```
447357
"Actions": [
@@ -457,7 +367,7 @@ Some custom logs come from sources that aren't directly associated to a specific
457367

458368
For example, if a specific firewall is sending custom logs, create a resource group called *MyFireWallLogs*. Make sure that the API requests contain the resource ID of *MyFireWallLogs*. The firewall log records are then accessible only to users who were granted access to *MyFireWallLogs* or those users with full workspace access.
459369

460-
#### Considerations
370+
### Considerations
461371

462372
- If a user is granted global read permission with the standard Reader or Contributor roles that include the _\*/read_ action, it will override the per-table access control and give them access to all log data.
463373
- If a user is granted per-table access but no other permissions, they can access log data from the API but not from the Azure portal. To provide access from the Azure portal, use Log Analytics Reader as its base role.

0 commit comments

Comments
 (0)