Skip to content

Commit c84cb0b

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into four-how-to-connect-articles
2 parents af368fc + 5aeb27a commit c84cb0b

File tree

216 files changed

+3496
-1816
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

216 files changed

+3496
-1816
lines changed

.openpublishing.redirection.defender-for-cloud.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -710,6 +710,11 @@
710710
"redirect_url": "/azure/defender-for-cloud/defender-for-containers-usage",
711711
"redirect_document_id": true
712712
},
713+
{
714+
"source_path_from_root": "/articles/defender-for-cloud/file-integrity-monitoring-usage.md",
715+
"redirect_url": "/azure/defender-for-cloud/file-integrity-monitoring-enable-log-analytics",
716+
"redirect_document_id": true
717+
},
713718
{
714719
"source_path_from_root": "/articles/defender-for-cloud/release-notes.md#auto-deployment-of-azure-monitor-agent-preview",
715720
"redirect_url": "/azure/defender-for-cloud/release-notes#azure-monitor-agent-integration-now-in-preview",

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -27872,6 +27872,11 @@
2787227872
"source_path_from_root": "/articles/virtual-machines/scripts/virtual-machines-cli-sample-copy-managed-disks-to-same-or-different-subscription.md",
2787327873
"redirect_url": "/previous-versions/azure/virtual-machines/scripts/virtual-machines-cli-sample-copy-managed-disks-to-same-or-different-subscription",
2787427874
"redirect_document_id": false
27875+
},
27876+
{
27877+
"source_path_from_root": "/articles/virtual-machines/disks-cross-tenant-cmk.md",
27878+
"redirect_url": "/azure/virtual-machines/disks-cross-tenant-customer-managed-keys",
27879+
"redirect_document_id": false
2787527880
},
2787627881
{
2787727882
"source_path_from_root": "/articles/virtual-machines/scripts/virtual-machines-cli-sample-copy-managed-disks-vhd.md",

articles/active-directory-b2c/add-web-api-application.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ ms.subservice: B2C
1717

1818
This article shows you how to register web API resources in your Azure Active Directory B2C (Azure AD B2C) tenant so that they can accept and respond to requests by client applications that present an access token.
1919

20-
To register an application in your Azure AD B2C tenant, you can use Azure portal's new unified **App registrations** experience the legacy **Applications (Legacy)** experience. [Learn more about the new experience](./app-registrations-training-guide.md).
20+
To register an application in your Azure AD B2C tenant, you can use the Azure portal's new unified **App registrations** experience or the legacy **Applications (Legacy)** experience. [Learn more about the new experience](./app-registrations-training-guide.md).
2121

2222
#### [App registrations](#tab/app-reg-ga/)
2323

@@ -60,4 +60,4 @@ To call a protected web API from an application, you need to grant your applicat
6060

6161
[!INCLUDE [active-directory-b2c-permissions-api](../../includes/active-directory-b2c-permissions-api.md)]
6262

63-
Your application is registered to call the protected web API. A user authenticates with Azure AD B2C to use the application. The application obtains an authorization grant from Azure AD B2C to access the protected web API.
63+
Your application is registered to call the protected web API. A user authenticates with Azure AD B2C to use the application. The application obtains an authorization grant from Azure AD B2C to access the protected web API.

articles/active-directory/authentication/concept-authentication-passwordless.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 08/17/2022
9+
ms.date: 09/13/2022
1010

1111
ms.author: justinha
1212
author: justinha
@@ -179,7 +179,7 @@ Here are some factors for you to consider when choosing Microsoft passwordless t
179179

180180
||**Windows Hello for Business**|**Passwordless sign-in with the Authenticator app**|**FIDO2 security keys**|
181181
|:-|:-|:-|:-|
182-
|**Pre-requisite**| Windows 10, version 1809 or later<br>Azure Active Directory| Authenticator app<br>Phone (iOS and Android devices running Android 6.0 or above.)|Windows 10, version 1903 or later<br>Azure Active Directory|
182+
|**Pre-requisite**| Windows 10, version 1809 or later<br>Azure Active Directory| Authenticator app<br>Phone (iOS and Android devices running Android 8.0 or above.)|Windows 10, version 1903 or later<br>Azure Active Directory|
183183
|**Mode**|Platform|Software|Hardware|
184184
|**Systems and devices**|PC with a built-in Trusted Platform Module (TPM)<br>PIN and biometrics recognition |PIN and biometrics recognition on phone|FIDO2 security devices that are Microsoft compatible|
185185
|**User experience**|Sign in using a PIN or biometric recognition (facial, iris, or fingerprint) with Windows devices.<br>Windows Hello authentication is tied to the device; the user needs both the device and a sign-in component such as a PIN or biometric factor to access corporate resources.|Sign in using a mobile phone with fingerprint scan, facial or iris recognition, or PIN.<br>Users sign in to work or personal account from their PC or mobile phone.|Sign in using FIDO2 security device (biometrics, PIN, and NFC)<br>User can access device based on organization controls and authenticate based on PIN, biometrics using devices such as USB security keys and NFC-enabled smartcards, keys, or wearables.|

articles/active-directory/authentication/howto-authentication-passwordless-phone.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ services: active-directory
77
ms.service: active-directory
88
ms.subservice: authentication
99
ms.topic: how-to
10-
ms.date: 07/19/2022
10+
ms.date: 09/13/2022
1111

1212

1313
ms.author: justinha
@@ -48,7 +48,7 @@ The Azure AD accounts can be in the same tenant or different tenants. Guest acco
4848
To use passwordless phone sign-in with Microsoft Authenticator, the following prerequisites must be met:
4949

5050
- Recommended: Azure AD Multi-Factor Authentication, with push notifications allowed as a verification method. Push notifications to your smartphone or tablet help the Authenticator app to prevent unauthorized access to accounts and stop fraudulent transactions. The Authenticator app automatically generates codes when set up to do push notifications so a user has a backup sign-in method even if their device doesn't have connectivity.
51-
- Latest version of Microsoft Authenticator installed on devices running iOS 12.0 or greater, or Android 6.0 or greater.
51+
- Latest version of Microsoft Authenticator installed on devices running iOS 12.0 or greater, or Android 8.0 or greater.
5252
- For Android, the device that runs Microsoft Authenticator must be registered to an individual user. We're actively working to enable multiple accounts on Android.
5353
- For iOS, the device must be registered with each tenant where it's used to sign in. For example, the following device must be registered with Contoso and Wingtiptoys to allow all accounts to sign in:
5454
@@ -152,4 +152,4 @@ To learn about Azure AD authentication and passwordless methods, see the followi
152152

153153
- [Learn how passwordless authentication works](concept-authentication-passwordless.md)
154154
- [Learn about device registration](../devices/overview.md)
155-
- [Learn about Azure AD Multi-Factor Authentication](../authentication/howto-mfa-getstarted.md)
155+
- [Learn about Azure AD Multi-Factor Authentication](../authentication/howto-mfa-getstarted.md)

articles/active-directory/develop/access-tokens.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -280,7 +280,7 @@ An application may receive tokens for a user or directly from an application thr
280280
- Use `roles` to see permissions that have been granted to the subject of the token.
281281
- Use `oid` or `sub` to validate that the calling service principal is the expected one.
282282

283-
If the application needs to distinguish between app-only access tokens and access tokens for users, use the `idtyp` [optional claim](active-directory-optional-claims.md). Add the `idtyp` claim to the `accessToken` field, and check for the value `app`, app-only access tokens can be detected. ID tokens and access tokens for users won't have the `idtyp` claim included.
283+
If the application needs to distinguish between app-only access tokens and access tokens for users, use the `idtyp` [optional claim](active-directory-optional-claims.md). To detect app-only access tokens, add the `idtyp` claim to the `accessToken` field, and check for the value `app`. ID tokens and access tokens for users won't have the `idtyp` claim included.
284284

285285
## Token revocation
286286

articles/active-directory/governance/TOC.yml

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -233,12 +233,14 @@
233233
- name: Reference
234234
expanded: true
235235
items:
236+
- name: Identity Governance - PowerShell
237+
href: /powershell/module/microsoft.graph.identity.governance/?view=graph-powershell-beta
236238
- name: Access reviews - Microsoft Graph API
237239
href: /graph/api/resources/accessreviewsv2-overview
238240
- name: Entitlement management - Microsoft Graph API
239241
href: /graph/api/resources/entitlementmanagement-overview
240242
- name: Lifecycle Workflows - Microsoft Graph API
241-
href: /graph/api/resources/identitygovernance-lifecycleworkflows-overview?view=graph-rest-beta
243+
href: /graph/api/resources/identitygovernance-lifecycleworkflows-overview
242244
- name: Lifecycle Workflows - FAQs (Preview)
243245
href: workflows-faqs.md
244246
- name: Developer API reference Lifecycle Workflows- Azure Active Directory

articles/active-directory/governance/entitlement-management-organization.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -78,20 +78,20 @@ To add an external Azure AD directory or domain as a connected organization, fol
7878

7979
The **Select directories + domains** pane opens.
8080

81-
1. In the search box, enter a domain name to search for the Azure AD directory or domain. You can also add domains that are not in Azure AD. Be sure to enter the entire domain name.
81+
1. In the search box, enter a domain name to search for the Azure AD directory or domain. Be sure to enter the entire domain name.
8282

83-
1. Confirm that the organization name(s) and authentication type(s) are correct. User sign in, prior to being able to access the MyAccess portal, depends on the authentication type for their organization. If the authentication type for a connected organization is Azure AD, all users with an account in any verified domain of that Azure AD directory will sign into their directory, and then can request access to access packages that allow that connected organization. If the authentication type is One-time passcode, this allows users with email addresses from just that domain to visit the MyAccess portal. After they authenticate with the passcode, the user can make a request.
83+
1. Confirm that the organization name and authentication type are correct. User sign in, prior to being able to access the MyAccess portal, depends on the authentication type for their organization. If the authentication type for a connected organization is Azure AD, all users with an account in any verified domain of that Azure AD directory will sign into their directory, and then can request access to access packages that allow that connected organization. If the authentication type is One-time passcode, this allows users with email addresses from just that domain to visit the MyAccess portal. After they authenticate with the passcode, the user can make a request.
8484

8585
![The "Select directories + domains" pane](./media/entitlement-management-organization/organization-select-directories-domains.png)
8686

8787
> [!NOTE]
8888
> Access from some domains could be blocked by the Azure AD business to business (B2B) allow or deny list. For more information, see [Allow or block invitations to B2B users from specific organizations](../external-identities/allow-deny-list.md).
8989
90-
1. Select **Add** to add the Azure AD directory or domain. **You can add multiple Azure AD directories and domains**.
90+
1. Select **Add** to add the Azure AD directory or domain. Currently, you can add only one Azure AD directory or domain per connected organization.
9191

92-
1. After you've added the Azure AD directories or domains, select **Select**.
92+
1. After you've added the Azure AD directory or domain, select **Select**.
9393

94-
The organization(s) appears in the list.
94+
The organization appears in the list.
9595

9696
![The "Directory + domain" pane](./media/entitlement-management-organization/organization-directory-domain.png)
9797

articles/active-directory/hybrid/reference-connect-health-version-history.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ ms.collection: M365-identity-device-management
2222
The Azure Active Directory team regularly updates Azure AD Connect Health with new features and functionality. This article lists the versions and features that have been released.
2323

2424
> [!NOTE]
25-
> Connect Health agents are updated automatically when new version is released. Please ensure the auto-upgrade settings is enabled from Azure portal.
25+
> Azure AD Connect Health agents are updated automatically when new version is released.
2626
>
2727
2828
Azure AD Connect Health for Sync is integrated with Azure AD Connect installation. Read more about [Azure AD Connect release history](./reference-connect-version-history.md)
Lines changed: 145 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,145 @@
1+
---
2+
3+
title: How to view applied conditional access policies in the Azure AD sign-in logs | Microsoft Docs
4+
description: Learn how to view applied conditional access policies in the Azure AD sign-in logs
5+
services: active-directory
6+
documentationcenter: ''
7+
author: MarkusVi
8+
manager: amycolannino
9+
editor: ''
10+
11+
ms.service: active-directory
12+
ms.topic: how-to
13+
ms.workload: identity
14+
ms.subservice: report-monitor
15+
ms.date: 09/14/2022
16+
ms.author: markvi
17+
ms.reviewer: besiler
18+
19+
ms.collection: M365-identity-device-management
20+
---
21+
22+
# How to: View applied conditional access policies in the Azure AD sign-in logs
23+
24+
With conditional access policies, you can control, how your users get access to the resources of your Azure tenant. As a tenant admin, you need to be able to determine what impact your conditional access policies have on sign-ins to your tenant, so that you can take action if necessary. The sign-in logs in Azure AD provide you with the information you need to assess the impact of your policies.
25+
26+
27+
This article explains how you can get access to the information about applied conditional access policies.
28+
29+
30+
## What you should know
31+
32+
As an Azure AD administrator, you can use the sign-in logs to:
33+
34+
- Troubleshoot sign in problems
35+
- Check on feature performance
36+
- Evaluate security of a tenant
37+
38+
Some scenarios require you to get an understanding for how your conditional access policies were applied to a sign-in event. Common examples include:
39+
40+
- **Helpdesk administrators** who need to look at applied conditional access policies to understand if a policy is the root cause of a ticket opened by a user.
41+
42+
- **Tenant administrators** who need to verify that conditional access policies have the intended impact on the users of a tenant.
43+
44+
45+
You can access the sign-in logs using the Azure portal, MS Graph, and PowerShell.
46+
47+
48+
49+
## Required administrator roles
50+
51+
52+
To see applied conditional access policies in the sign-in logs, administrators must have permissions to:
53+
54+
- View sign-in logs
55+
- View conditional access policies
56+
57+
The least privileged built-in role that grants both permissions is the **Security Reader**. As a best practice, your global administrator should add the **Security Reader** role to the related administrator accounts.
58+
59+
60+
The following built in roles grant permissions to read conditional access policies:
61+
62+
- Global Administrator
63+
64+
- Global Reader
65+
66+
- Security Administrator
67+
68+
- Security Reader
69+
70+
- Conditional Access Administrator
71+
72+
73+
The following built in roles grant permission to view sign-in logs:
74+
75+
- Global Administrator
76+
77+
- Security Administrator
78+
79+
- Security Reader
80+
81+
- Global Reader
82+
83+
- Reports Reader
84+
85+
86+
## Permissions for client apps
87+
88+
If you use a client app to pull sign-in logs from Graph, your app needs permissions to receive the **appliedConditionalAccessPolicy** resource from Graph. As a best practice, assign **Policy.Read.ConditionalAccess** because it's the least privileged permission. Any of the following permissions is sufficient for a client app to access applied CA policies in sign-in logs through Graph:
89+
90+
- Policy.Read.ConditionalAccess
91+
92+
- Policy.ReadWrite.ConditionalAccess
93+
94+
- Policy.Read.All
95+
96+
97+
98+
## Permissions for PowerShell
99+
100+
Like any other client app, the Microsoft Graph PowerShell module needs client permissions to access applied conditional access policies in the sign-in logs. To successfully pull applied conditional access in the sign-in logs, you must consent to the necessary permissions with your administrator account for MS Graph PowerShell. As a best practice, consent to:
101+
102+
- Policy.Read.ConditionalAccess
103+
- AuditLog.Read.All
104+
- Directory.Read.All
105+
106+
These permissions are the least privileged permissions with the necessary access.
107+
108+
To consent to the necessary permissions, use:
109+
110+
` Connect-MgGraph -Scopes Policy.Read.ConditionalAccess, AuditLog.Read.All, Directory.Read.All `
111+
112+
To view the sign-in logs, use:
113+
114+
`Get-MgAuditLogSignIn `
115+
116+
The output of this cmdlet contains a **AppliedConditionalAccessPolicies** property that shows all the conditional access policies applied to the sign-in.
117+
118+
For more information about this cmdlet, see [Get-MgAuditLogSignIn](https://docs.microsoft.com/powershell/module/microsoft.graph.reports/get-mgauditlogsignin?view=graph-powershell-1.0).
119+
120+
The AzureAD Graph PowerShell module doesn't support viewing applied conditional access policies; only the Microsoft Graph PowerShell module returns applied conditional access policies.
121+
122+
## Confirming access
123+
124+
In the **Conditional Access** tab, you see a list of conditional access policies applied to that sign-in event.
125+
126+
127+
To confirm that you have admin access to view applied conditional access policies in the sign-ins logs, do:
128+
129+
1. Navigate to the Azure portal.
130+
131+
2. In the top-right corner, select your directory, and then select **Azure Active Directory** in the left navigation pane.
132+
133+
3. In the **Monitoring** section, select **Sign-in logs**.
134+
135+
4. Click an item in the sign-in row table to bring up the Activity Details: Sign-ins context pane.
136+
137+
5. Click on the Conditional Access tab in the context pane. If your screen is small, you may need to click the ellipsis [] to see all context pane tabs.
138+
139+
140+
141+
142+
## Next steps
143+
144+
* [Sign-ins error codes reference](./concept-sign-ins.md)
145+
* [Sign-ins report overview](concept-sign-ins.md)

0 commit comments

Comments
 (0)