Skip to content

Commit e0d6cc6

Browse files
committed
January 2023 sovereign clouds update
1 parent 029c352 commit e0d6cc6

File tree

1 file changed

+52
-0
lines changed

1 file changed

+52
-0
lines changed

articles/active-directory/fundamentals/whats-new-sovereign-clouds.md

Lines changed: 52 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -22,6 +22,58 @@ Azure AD receives improvements on an ongoing basis. To stay up to date with the
2222
This page is updated monthly, so revisit it regularly.
2323

2424

25+
## January 2023
26+
27+
### General Availability - Azure AD Domain Services: Deeper Insights
28+
29+
**Type:** New feature
30+
**Service category:** Azure AD Domain Services
31+
**Product capability:** Azure AD Domain Services
32+
33+
Now within the Azure Portal you have access to view key data for your Azure AD-DS Domain Controllers such as: LDAP Searches/sec, Total Query Received/sec, DNS Total Response Sent/sec, LDAP Successful Binds/sec, memory usage, processor time, Kerberos Authentications, and NTLM Authentications. For more information, see: [Check fleet metrics of Azure Active Directory Domain Services](/azure/active-directory-domain-services/fleet-metrics).
34+
35+
---
36+
37+
### General Availability - Add multiple domains to the same SAML/Ws-Fed based identity provider configuration for your external users
38+
39+
**Type:** New feature
40+
**Service category:** B2B
41+
**Product capability:** B2B/B2C
42+
43+
An IT admin can now add multiple domains to a single SAML/WS-Fed identity provider configuration to invite users from multiple domains to authenticate from the same identity provider endpoint. For more information, see: [Federation with SAML/WS-Fed identity providers for guest users](../external-identities/direct-federation.md).
44+
45+
---
46+
47+
### General Availability - New risk in Identity Protection: Anomalous user activity
48+
49+
**Type:** New feature
50+
**Service category:** Conditional Access
51+
**Product capability:** Identity Security & Protection
52+
53+
This risk detection baselines normal administrative user behavior in Azure AD, and spots anomalous patterns of behavior like suspicious changes to the directory. The detection is triggered against the administrator making the change or the object that was changed. For more information, see: [User-linked detections](../identity-protection/concept-identity-protection-risks.md#user-linked-detections).
54+
55+
---
56+
57+
### General Availability - Administrative unit support for devices
58+
59+
**Type:** New feature
60+
**Service category:** Directory Management
61+
**Product capability:** AuthZ/Access Delegation
62+
63+
You can now use administrative units to delegate management of specified devices in your tenant by adding devices to an administrative unit, and assigning built-in and custom device management roles scoped to that administrative unit. For more information, see: [Device management](../roles/administrative-units.md#device-management).
64+
65+
---
66+
67+
### General Availability - Azure AD Terms of Use (ToU) API
68+
69+
**Type:** New feature
70+
**Service category:** Conditional Access
71+
**Product capability:** Identity Security & Protection
72+
73+
Represents a tenant's customizable terms of use agreement that is created, and managed, with Azure Active Directory (Azure AD). You can use the following methods to create and manage the [Azure Active Directory Terms of Use feature](/graph/api/resources/agreement?#json-representation) according to your scenario. For more information, see: [agreement resource type](/graph/api/resources/agreement).
74+
75+
---
76+
2577
## December 2022
2678

2779
### General Availability - Risk-based Conditional Access for workload identities

0 commit comments

Comments
 (0)