Skip to content

Commit ce53c60

Browse files
authored
Merge branch 'MicrosoftDocs:main' into main
2 parents b6eec30 + e135822 commit ce53c60

File tree

304 files changed

+2738
-1785
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

304 files changed

+2738
-1785
lines changed

.openpublishing.redirection.active-directory.json

Lines changed: 55 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -5265,6 +5265,61 @@
52655265
"redirect_url": "/azure/active-directory/fundamentals/concept-fundamentals-security-defaults",
52665266
"redirect_document_id": true
52675267
},
5268+
{
5269+
"source_path_from_root": "/articles/active-directory/reports-monitoring/howto-use-azure-monitor-workbooks.md",
5270+
"redirect_url": "/azure/active-directory/reports-monitoring/howto-use-workbooks",
5271+
"redirect_document_id": true
5272+
},
5273+
{
5274+
"source_path_from_root": "/articles/active-directory/reports-monitoring/concept-activity-logs-azure-monitor.md",
5275+
"redirect_url": "/azure/active-directory/reports-monitoring/concept-log-monitoring-integration-options-considerations",
5276+
"redirect_document_id": true
5277+
},
5278+
{
5279+
"source_path_from_root": "/articles/active-directory/reports-monitoring/tutorial-log-analytics-wizard.md",
5280+
"redirect_url": "/azure/active-directory/reports-monitoring/tutorial-configure-log-analytics-workspace",
5281+
"redirect_document_id": true
5282+
},
5283+
{
5284+
"source_path_from_root": "/articles/active-directory/reports-monitoring/quickstart-azure-monitor-route-logs-to-storage-account.md",
5285+
"redirect_url": "/azure/active-directory/reports-monitoring/howto-archive-logs-to-storage-account",
5286+
"redirect_document_id": true
5287+
},
5288+
{
5289+
"source_path_from_root": "/articles/active-directory/reports-monitoring/overview-monitoring.md",
5290+
"redirect_url": "/azure/active-directory/reports-monitoring/overview-monitoring-health",
5291+
"redirect_document_id": false
5292+
},
5293+
{
5294+
"source_path_from_root": "/articles/active-directory/reports-monitoring/overview-reports.md",
5295+
"redirect_url": "/azure/active-directory/reports-monitoring/overview-monitoring-health",
5296+
"redirect_document_id": true
5297+
},
5298+
{
5299+
"source_path_from_root": "/articles/active-directory/reports-monitoring/howto-integrate-activity-logs-with-sumologic.md",
5300+
"redirect_url": "/azure/active-directory/reports-monitoring/howto-stream-logs-to-event-hub",
5301+
"redirect_document_id": true
5302+
},
5303+
{
5304+
"source_path_from_root": "/articles/active-directory/reports-monitoring/howto-integrate-activity-logs-with-splunk.md",
5305+
"redirect_url": "/azure/active-directory/reports-monitoring/howto-stream-logs-to-event-hub",
5306+
"redirect_document_id": false
5307+
},
5308+
{
5309+
"source_path_from_root": "/articles/active-directory/reports-monitoring/howto-integrate-activity-logs-with-arcsight.md",
5310+
"redirect_url": "/azure/active-directory/reports-monitoring/howto-stream-logs-to-event-hub",
5311+
"redirect_document_id": false
5312+
},
5313+
{
5314+
"source_path_from_root": "/articles/active-directory/reports-monitoring/howto-integrate-activity-logs-with-log-analytics.md",
5315+
"redirect_url": "/azure/active-directory/reports-monitoring/howto-integrate-activity-logs-with-azure-monitor-logs",
5316+
"redirect_document_id": true
5317+
},
5318+
{
5319+
"source_path_from_root": "/articles/active-directory/reports-monitoring/overview-service-health-notifications.md",
5320+
"redirect_url": "/azure/service-health/service-health-portal-update",
5321+
"redirect_document_id": true
5322+
},
52685323
{
52695324
"source_path_from_root": "/articles/active-directory/reports-monitoring/quickstart-configure-named-locations.md",
52705325
"redirect_url": "/azure/active-directory/conditional-access/location-condition",

CODEOWNERS

Lines changed: 0 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -4,11 +4,6 @@
44
# Background: https://github.blog/2017-07-06-introducing-code-owners/
55
# NOTE: The people you choose as code owners must have _write_ permissions for the repository. When the code owner is a team, that team must be _visible_ and it must have _write_ permissions, even if all the individual members of the team already have write permissions directly, through organization membership, or through another team membership.
66

7-
# Azure Policy: Samples and Compliance Controls
8-
/articles/**/policy-reference.md @davidsmatlak
9-
/articles/**/security-controls-policy.md @davidsmatlak
10-
/includes/policy/ @davidsmatlak
11-
127
# Azure Monitor
138
articles/azure-monitor/* @bwren
149
articles/azure-monitor/agents @guywi-ms @bwren
@@ -56,10 +51,6 @@ articles/service-health @rboucher
5651
/articles/container-instances/ @macolso @mimckitt
5752
/articles/container-registry/ @dlepow @mimckitt
5853

59-
# Governance
60-
/articles/governance/policy @davidsmatlak
61-
/articles/governance/resource-graph @davidsmatlak
62-
6354
# Security
6455
/articles/security/fundamentals/feature-availability.md @msmbaldwin @terrylanfear
6556

articles/active-directory-b2c/tenant-management-directory-quota.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -65,7 +65,7 @@ The response from the API call looks similar to the following json:
6565
{
6666
"directorySizeQuota": {
6767
"used": 211802,
68-
"total": 300000
68+
"total": 50000000
6969
}
7070
}
7171
]
@@ -81,4 +81,4 @@ If your tenant usage is higher that 80%, you can remove inactive users or reques
8181

8282
## Request increase directory quota size
8383

84-
You can request to increase the quota size by [contacting support](find-help-open-support-ticket.md)
84+
You can request to increase the quota size by [contacting support](find-help-open-support-ticket.md)

articles/active-directory/app-proxy/application-proxy-faq.yml

Lines changed: 8 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -152,7 +152,7 @@ sections:
152152
- If the certificate was created with Microsoft Software Key Storage Provider, the RSA algorithm must be used.
153153
154154
- question: |
155-
What is the length of the default and "long" back-end timeout? Can the timeout be extended?
155+
What is the length of the default and "long" backend timeout? Can the timeout be extended?
156156
answer: |
157157
The default length is 85 seconds. The "long" setting is 180 seconds. The timeout limit can't be extended.
158158
@@ -170,7 +170,13 @@ sections:
170170
171171
> [!IMPORTANT]
172172
> Deleting CWAP_AuthSecret breaks pre-authentication for Azure AD Application Proxy. Don't delete CWAP_AuthSecret.
173-
173+
174+
- question: |
175+
I'm using or want to use Azure Active Directory Application Proxy. Can I replace the `onmicrosoft.com` fallback domain of my tenant in Microsoft 365 as suggested in the article [Add and replace your onmicrosoft.com fallback domain in Microsoft 365](../../microsoft-365/admin/setup/add-or-replace-your-onmicrosoftcom-domain?view=o365-worldwide)?
176+
answer: |
177+
No. You must use the original fallback domain.
178+
179+
174180
- question: |
175181
How do I change the landing page my application loads?
176182
answer: |

articles/active-directory/authentication/concepts-azure-multi-factor-authentication-prompts-session-lifetime.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: multi-factor-authentication
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 03/28/2023
9+
ms.date: 08/15/2023
1010

1111
ms.author: justinha
1212
author: justinha
@@ -20,7 +20,7 @@ Azure Active Directory (Azure AD) has multiple settings that determine how often
2020

2121
The Azure AD default configuration for user sign-in frequency is a rolling window of 90 days. Asking users for credentials often seems like a sensible thing to do, but it can backfire. If users are trained to enter their credentials without thinking, they can unintentionally supply them to a malicious credential prompt.
2222

23-
It might sound alarming to not ask for a user to sign back in, though any violation of IT policies revokes the session. Some examples include a password change, an incompliant device, or an account disable operation. You can also explicitly [revoke users' sessions using PowerShell](/powershell/module/azuread/revoke-azureaduserallrefreshtoken).
23+
It might sound alarming to not ask for a user to sign back in, though any violation of IT policies revokes the session. Some examples include a password change, an incompliant device, or an account disable operation. You can also explicitly [revoke users' sessions by using Microsoft Graph PowerShell](/powershell/module/microsoft.graph.users.actions/revoke-mgusersigninsession).
2424

2525
This article details recommended configurations and how different settings work and interact with each other.
2626

articles/active-directory/authentication/howto-mfa-nps-extension-errors.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -35,6 +35,7 @@ If you encounter errors with the NPS extension for Azure AD Multi-Factor Authent
3535
| **REQUEST_FORMAT_ERROR** <br> Radius Request missing mandatory Radius userName\Identifier attribute.Verify that NPS is receiving RADIUS requests | This error usually reflects an installation issue. The NPS extension must be installed in NPS servers that can receive RADIUS requests. NPS servers that are installed as dependencies for services like RDG and RRAS don't receive radius requests. NPS Extension does not work when installed over such installations and errors out since it cannot read the details from the authentication request. |
3636
| **REQUEST_MISSING_CODE** | Make sure that the password encryption protocol between the NPS and NAS servers supports the secondary authentication method that you're using. **PAP** supports all the authentication methods of Azure AD MFA in the cloud: phone call, one-way text message, mobile app notification, and mobile app verification code. **CHAPV2** and **EAP** support phone call and mobile app notification. |
3737
| **USERNAME_CANONICALIZATION_ERROR** | Verify that the user is present in your on-premises Active Directory instance, and that the NPS Service has permissions to access the directory. If you are using cross-forest trusts, [contact support](#contact-microsoft-support) for further help. |
38+
| **Challenge requested in Authentication Ext for User** | Organizations using a RADIUS protocol other than PAP will observe user VPN authorization failing with these events appearing in the AuthZOptCh event log of the NPS Extension server. You can configure the NPS Server to support PAP. If PAP is not an option, you can set OVERRIDE_NUMBER_MATCHING_WITH_OTP = FALSE to fall back to Approve/Deny push notifications. For further help, please check [Number matching using NPS Extension](how-to-mfa-number-match.md#nps-extension). |
3839

3940
### Alternate login ID errors
4041

articles/active-directory/hybrid/connect/reference-connect-version-history.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -77,6 +77,7 @@ To read more about autoupgrade, see [Azure AD Connect: Automatic upgrade](how-to
7777
- We have enabled Auto Upgrade for tenants with custom synchronization rules. Note that deleted (not disabled) default rules will be re-created and enabled upon Auto Upgrade.
7878
- We have added Microsoft Azure AD Connect Agent Updater service to the install. This new service will be used for future auto upgrades.
7979
- We have removed the Synchronization Service WebService Connector Config program from the install.
80+
- Default sync rule “In from AD – User Common” was updated to flow the employeeType attribute.
8081

8182
### Bug Fixes
8283
- We have made improvements to accessibility.
Lines changed: 22 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,22 @@
1+
---
2+
title: include file
3+
description: include file
4+
author: shlipsey3
5+
manager: amycolannino
6+
ms.service: active-directory
7+
ms.workload: identity
8+
ms.topic: include
9+
ms.date: 08/08/2023
10+
ms.author: saralipsey
11+
ms.custom: include file
12+
---
13+
14+
1. Sign in to the [Azure portal](https://portal.azure.com) as a **Security Administrator**.
15+
16+
1. Go to **Azure Active Directory** > **Diagnostic settings**. You can also select **Export Settings** from either the **Audit Logs** or **Sign-ins** page.
17+
18+
1. Select **+ Add diagnostic setting** to create a new integration or select **Edit setting** for an existing integration.
19+
20+
1. Enter a **Diagnostic setting name**. If you're editing an existing integration, you can't change the name.
21+
22+
1. Select the log categories that you want to stream.

articles/active-directory/privileged-identity-management/concept-pim-for-groups.md

Lines changed: 14 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ ms.subservice: pim
1111
ms.topic: overview
1212
ms.tgt_pltfrm: na
1313
ms.workload: identity
14-
ms.date: 6/7/2023
14+
ms.date: 8/15/2023
1515
ms.author: billmath
1616
ms.custom: pim
1717
ms.collection: M365-identity-device-management
@@ -72,6 +72,19 @@ One group can be an eligible member of another group, even if one of those group
7272

7373
If a user is an active member of Group A, and Group A is an eligible member of Group B, the user can activate their membership in Group B. This activation will be only for the user that requested the activation for, it does not mean that the entire Group A becomes an active member of Group B.
7474

75+
## Privileged Identity Management and app provisioning (Public Preview)
76+
77+
If the group is configured for [app provisioning](../app-provisioning/index.yml), activation of group membership will trigger provisioning of group membership (and user account itself if it wasn’t provisioned previously) to the application using SCIM protocol.
78+
79+
In Public Preview we have a functionality that triggers provisioning right after group membership is activated in PIM.
80+
Provisioning configuration depends on the application. Generally, we recommend having at least two groups assigned to the application. Depending on the number of roles in your application, you may choose to define additional “privileged groups.”:
81+
82+
83+
|Group|Purpose|Members|Group membership|Role assigned in the application|
84+
|-----|-----|-----|-----|-----|
85+
|All users group|Ensure that all users that need access to the application are constantly provisioned to the application.|All users that need to access application.|Active|None, or low-privileged role|
86+
|Privileged group|Provide just-in-time access to privileged role in the application.|Users that need to have just-in-time access to privileged role in the application.|Eligible|Privileged role|
87+
7588
## Next steps
7689

7790
- [Bring groups into Privileged Identity Management](groups-discover-groups.md)

0 commit comments

Comments
 (0)