You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/fundamentals/2-secure-access-current-state.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -33,7 +33,7 @@ Users seeking external collaboration know the applications needed for their work
33
33
34
34
To find collaborating users:
35
35
36
-
*[Microsoft 365 audit log activities, sharing and access request activities](microsoft-365/compliance/audit-log-activities?view=o365-worldwide#sharing-and-access-request-activities)
36
+
*[Microsoft 365 audit log activities, sharing and access request activities](microsoft-365/compliance/audit-log-activities?view=o365-worldwide#sharing-and-access-request-activities&preserve-view=true)
37
37
*[Auditing and reporting a B2B collaboration user](../external-identities/auditing-and-reporting.md)
38
38
39
39
## Collaboration with external users and organizations
@@ -67,19 +67,19 @@ If you use entitlement management, you can confine access packages to a subset o
67
67
68
68
After you have an inventory of external users and organizations, determine the access to grant to these users. You can use the Microsoft Graph API to determine Azure AD group membership or application assignment.
69
69
70
-
*[Working with groups in Microsoft Graph](/graph/api/resources/groups-overview?context=graph%2Fcontext&view=graph-rest-1.0)
71
-
*[Applications API overview](/graph/applications-concept-overview?view=graph-rest-1.0)
70
+
*[Working with groups in Microsoft Graph](/graph/api/resources/groups-overview?context=graph%2Fcontext&view=graph-rest-1.0&preserve-view=true)
71
+
*[Applications API overview](/graph/applications-concept-overview?view=graph-rest-1.0&preserve-view=true)
72
72
73
73
### Enumerate application permissions
74
74
75
-
Investigate access to your sensitive apps for awareness about external access. See, [Grant or revoke API permissions programmatically](/graph/permissions-grant-via-msgraph?view=graph-rest-1.0&tabs=http&pivots=grant-application-permissions).
75
+
Investigate access to your sensitive apps for awareness about external access. See, [Grant or revoke API permissions programmatically](/graph/permissions-grant-via-msgraph?view=graph-rest-1.0&tabs=http&pivots=grant-application-permissions&preserve-view=true).
76
76
77
77
### Detect informal sharing
78
78
79
79
If your email and network plans are enabled, you can investigate content sharing through email or unauthorized software as a service (SaaS) apps.
80
80
81
81
* Identify, prevent, and monitor accidental sharing
82
-
*[Learn about data loss prevention](/microsoft-365/compliance/dlp-learn-about-dlp?view=o365-worldwide)
82
+
*[Learn about data loss prevention](/microsoft-365/compliance/dlp-learn-about-dlp?view=o365-worldwide&preserve-view=true)
83
83
* Identify unauthorized apps
84
84
*[Microsoft Defender for Cloud Apps](/security/business/siem-and-xdr/microsoft-defender-cloud-apps?rtc=1)
0 commit comments