Skip to content

Commit da769ef

Browse files
authored
Merge pull request #182850 from MicrosoftDocs/repo_sync_working_branch
Confirm merge from repo_sync_working_branch to master to sync with https://github.com/MicrosoftDocs/azure-docs (branch master)
2 parents 08b343a + 0024311 commit da769ef

File tree

8 files changed

+28
-52
lines changed

8 files changed

+28
-52
lines changed

articles/active-directory/authentication/concept-mfa-licensing.md

Lines changed: 20 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -39,20 +39,26 @@ The following table details the different ways to get Azure AD Multi-Factor Auth
3939

4040
The following table provides a list of the features that are available in the various versions of Azure AD Multi-Factor Authentication. Plan out your needs for securing user authentication, then determine which approach meets those requirements. For example, although Azure AD Free provides security defaults that provide Azure AD Multi-Factor Authentication, only the mobile authenticator app can be used for the authentication prompt, not a phone call or SMS. This approach may be a limitation if you can't ensure the mobile authentication app is installed on a user's personal device. See [Azure AD Free tier](#azure-ad-free-tier) later in this topic for more details.
4141

42-
| Feature | Azure AD Free - Security defaults (enabled for all users) | Azure AD Free - Global Administrators only | Office 365 | Azure AD Premium P1 or P2 |
43-
| --- |:---:|:---:|:---:|:---:|
44-
| Protect Azure AD tenant admin accounts with MFA || ● (*Azure AD Global Administrator* accounts only) |||
45-
| Mobile app as a second factor |||||
46-
| Phone call as a second factor | ||||
47-
| SMS as a second factor | ||||
48-
| Admin control over verification methods | ||||
49-
| Fraud alert | | | ||
50-
| MFA Reports | | | ||
51-
| Custom greetings for phone calls | | | ||
52-
| Custom caller ID for phone calls | | | ||
53-
| Trusted IPs | | | ||
54-
| Remember MFA for trusted devices | ||||
55-
| MFA for on-premises applications | | | ||
42+
| Feature | Azure AD Free - Security defaults (enabled for all users) | Azure AD Free - Global Administrators only | Office 365 | Azure AD Premium P1 | Azure AD Premium P2 |
43+
| --- |:---:|:---:|:---:|:---:|:---:|
44+
| Protect Azure AD tenant admin accounts with MFA || ● (*Azure AD Global Administrator* accounts only) ||||
45+
| Mobile app as a second factor ||||||
46+
| Phone call as a second factor | |||||
47+
| SMS as a second factor | |||||
48+
| Admin control over verification methods | |||||
49+
| Fraud alert | | | |||
50+
| MFA Reports | | | |||
51+
| Custom greetings for phone calls | | | |||
52+
| Custom caller ID for phone calls | | | |||
53+
| Trusted IPs | | | |||
54+
| Remember MFA for trusted devices | |||||
55+
| MFA for on-premises applications | | | |||
56+
| Conditional access | | | |||
57+
| Risk-based conditional access | | | | ||
58+
| Identity Protection (Risky sign-ins, risky users) | | | | ||
59+
| Access Reviews | | | | ||
60+
| Entitlements Management | | | | ||
61+
| Privileged Identity Management (PIM), just-in-time access | | | | ||
5662

5763
## Compare multi-factor authentication policies
5864

articles/active-directory/develop/msal-authentication-flows.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -80,7 +80,7 @@ The [OAuth 2 client credentials flow](v2-oauth2-client-creds-grant-flow.md) allo
8080
The client credentials grant flow permits a web service (a confidential client) to use its own credentials, instead of impersonating a user, to authenticate when calling another web service. In this scenario, the client is typically a middle-tier web service, a daemon service, or a website. For a higher level of assurance, the Microsoft identity platform also allows the calling service to use a certificate (instead of a shared secret) as a credential.
8181

8282
> [!NOTE]
83-
> The confidential client flow isn't available on mobile platforms like UWP, Xamarin.iOS, and Xamarin.Android because they support only public client applications. Public client applications don't know how to prove the application's identity to the identity provider. A secure connection can be achieved on web app or web API back-ends by deploying a certificate.
83+
> The confidential client flow isn't available on mobile platforms like UWP, iOS, and Android because they support only public client applications. Public client applications don't know how to prove the application's identity to the identity provider. A secure connection can be achieved on web app or web API back-ends by deploying a certificate.
8484
8585
### Application secrets
8686

articles/active-directory/devices/howto-vm-sign-in-azure-ad-windows.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -261,7 +261,7 @@ The AADLoginForWindows extension must install successfully in order for the VM t
261261
| `curl -H @{"Metadata"="true"} "http://169.254.169.254/metadata/identity/oauth2/token?resource=urn:ms-drs:enterpriseregistration.windows.net&api-version=2018-02-01"` | Valid access token issued by Azure Active Directory for the managed identity that is assigned to this VM |
262262

263263
> [!NOTE]
264-
> The access token can be decoded using a tool like [calebb.net](http://calebb.net/). Verify the `appid` in the access token matches the managed identity assigned to the VM.
264+
> The access token can be decoded using a tool like [calebb.net](http://calebb.net/). Verify the `oid` in the access token matches the managed identity assigned to the VM.
265265
266266
1. Ensure the required endpoints are accessible from the VM using PowerShell:
267267

articles/active-directory/reports-monitoring/concept-all-sign-ins.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -64,7 +64,7 @@ The sign-in log provides answers to questions like:
6464

6565
## What Azure AD license do you need?
6666

67-
Your tenant must have an Azure AD Premium license associated with it to see sign-in activities. See [Getting started with Azure Active Directory Premium](../fundamentals/active-directory-get-started-premium.md) to upgrade your Azure Active Directory edition. It will take a couple of days for the data to show up in the logs after you upgrade to a premium license with no data activities before the upgrade.
67+
The sign-in activity report is available in [all editions of Azure AD](reference-reports-data-retention.md#how-long-does-azure-ad-store-the-data). If you have an Azure Active Directory P1 or P2 license, you also can access the sign-in activity report through the Microsoft Graph API. See [Getting started with Azure Active Directory Premium](../fundamentals/active-directory-get-started-premium.md) to upgrade your Azure Active Directory edition. It will take a couple of days for the data to show up in Graph after you upgrade to a premium license with no data activities before the upgrade.
6868

6969

7070

articles/active-directory/reports-monitoring/overview-reports.md

Lines changed: 1 addition & 31 deletions
Original file line numberDiff line numberDiff line change
@@ -31,33 +31,6 @@ Azure Active Directory (Azure AD) reports provide a comprehensive view of activi
3131
- Detect potential risks affecting the health of your environment
3232
- Troubleshoot issues preventing your users from getting their work done
3333

34-
The reporting architecture relies on two main pillars:
35-
36-
- [Security reports](#security-reports)
37-
- [Activity reports](#activity-reports)
38-
39-
![Reporting](./media/overview-reports/01.png)
40-
41-
42-
## Security reports
43-
44-
Security reports help you to protect your organization's identities. There are two types of security reports:
45-
46-
- **Users flagged for risk** - From the [users flagged for risk security report](../identity-protection/overview-identity-protection.md), you get an overview of user accounts that might have been compromised.
47-
48-
- **Risky sign-ins** - With the [risky sign-in security report](../identity-protection/overview-identity-protection.md), you get an indicator for sign-in attempts that might have been performed by someone who is not the legitimate owner of a user account.
49-
50-
### What Azure AD license do you need to access a security report?
51-
52-
All editions of Azure AD provide you with users flagged for risk and risky sign-ins reports. However, the level of report granularity varies between the editions:
53-
54-
- In the **Azure Active Directory Free and Basic editions**, you get a list of users flagged for risk and risky sign-ins.
55-
56-
- The **Azure Active Directory Premium 1** edition extends this model by also enabling you to examine some of the underlying risk detections that have been detected for each report.
57-
58-
- The **Azure Active Directory Premium 2** edition provides you with the most detailed information about the underlying risk detections and it also enables you to configure security policies that automatically respond to configured risk levels.
59-
60-
6134
## Activity reports
6235

6336
Activity reports help you understand the behavior of users in your organization. There are two types of activity reports in Azure AD:
@@ -70,9 +43,6 @@ Activity reports help you understand the behavior of users in your organization.
7043

7144
> [!VIDEO https://www.youtube.com/embed/ACVpH6C_NL8]
7245
73-
74-
75-
7646
### Audit logs report
7747

7848
The [audit logs report](concept-audit-logs.md) provides you with records of system activities for compliance. This data enables you to address common scenarios such as:
@@ -108,4 +78,4 @@ In addition to the user interface, Azure AD also provides you with [programmatic
10878

10979
- [Risky sign-ins report](../identity-protection/overview-identity-protection.md)
11080
- [Audit logs report](concept-audit-logs.md)
111-
- [Sign-ins logs report](concept-sign-ins.md)
81+
- [Sign-ins logs report](concept-sign-ins.md)

articles/applied-ai-services/form-recognizer/containers/form-recognizer-container-configuration.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -90,7 +90,7 @@ In this example, enter {FORM_RECOGNIZER_ENDPOINT_URI} and {FORM_RECOGNIZER_API_K
9090
```yml
9191
version: "3.9"
9292
services:
93-
azure-cognitive-service-layout:
93+
azure-cognitive-service-layout:
9494
container_name: azure-cognitive-service-layout
9595
image: mcr.microsoft.com/azure-cognitive-services/form-recognizer/layout
9696
environment:

articles/cloud-services-extended-support/in-place-migration-powershell.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -152,12 +152,12 @@ Move-AzureService -Prepare -ServiceName $serviceName -DeploymentName $deployment
152152

153153
Check the configuration for the prepared Cloud Service (extended support) by using either Azure PowerShell or the Azure portal. If you're not ready for migration and you want to go back to the old state, abort the migration.
154154
```powershell
155-
Move-AzureService -Abort -ServiceName $serviceName -DeploymentName $deploymentName -CreateNewVirtualNetwork
155+
Move-AzureService -Abort -ServiceName $serviceName -DeploymentName $deploymentName
156156
```
157157
If you're ready to complete the migration, commit the migration
158158

159159
```powershell
160-
Move-AzureService -Commit -ServiceName $serviceName -DeploymentName $deploymentName -CreateNewVirtualNetwork
160+
Move-AzureService -Commit -ServiceName $serviceName -DeploymentName $deploymentName
161161
```
162162

163163
### 5.1) Option 2 - Migrate a Cloud Service in a virtual network

articles/defender-for-cloud/troubleshooting-guide.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ Defender for Cloud uses the Log Analytics agent to collect and store data. See [
1515
> [!TIP]
1616
> A dedicated area of the Defender for Cloud pages in the Azure portal provides a collated, ever-growing set of self-help materials for solving common challenges with Defender for Cloud.
1717
>
18-
> When you're facing an issue, or are seeking advice from our support team, **Diagnose and solve problems*- is good place to look for solutions:
18+
> When you're facing an issue, or are seeking advice from our support team, **Diagnose and solve problems** is good place to look for solutions:
1919
>
2020
> :::image type="content" source="media/release-notes/solve-problems.png" alt-text="Defender for Cloud's 'Diagnose and solve problems' page":::
2121

0 commit comments

Comments
 (0)