You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/fundamentals/whats-new-archive.md
+148-4Lines changed: 148 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,5 +1,5 @@
1
1
---
2
-
title: Archive for What's new? - Azure Active Directory | Microsoft Docs
2
+
title: Archive for What's new in Azure Active Directory? | Microsoft Docs
3
3
description: The What's new release notes in the Overview section of this content set contains 6 months of activity. After 6 months, the items are removed from the main article and put into this archive article.
# Archive for What's new? in Azure Active Directory
19
+
# Archive for What's new in Azure Active Directory?
20
20
21
-
The primary [What's new release notes](whats-new.md) article contains the latest 6 months of information, while this article includes all the older information.
21
+
The primary [What's new in Azure Active Directory? release notes](whats-new.md) article contains updates for the last six months, while this article contains all the older information.
22
22
23
-
The What's new release notes provide you with information about:
23
+
The What's new in Azure Active Directory? release notes provide information about:
24
24
25
25
- The latest releases
26
26
- Known issues
@@ -30,6 +30,150 @@ The What's new release notes provide you with information about:
30
30
31
31
---
32
32
33
+
## April 2019
34
+
35
+
### New Azure AD threat intelligence detection is now available as part of Azure AD Identity Protection
36
+
37
+
**Type:** New feature
38
+
**Service category:** Azure AD Identity Protection
Azure AD threat intelligence detection is now available as part of the updated Azure AD Identity Protection feature. This new functionality helps to indicate unusual user activity for a specific user or activity that’s consistent with known attack patterns based on Microsoft’s internal and external threat intelligence sources.
42
+
43
+
For more information about the refreshed version of Azure AD Identity Protection, see the [Four major Azure AD Identity Protection enhancements are now in public preview](https://techcommunity.microsoft.com/t5/Azure-Active-Directory-Identity/Four-major-Azure-AD-Identity-Protection-enhancements-are-now-in/ba-p/326935) blog and the [What is Azure Active Directory Identity Protection (refreshed)?](https://docs.microsoft.com/azure/active-directory/identity-protection/overview-v2) article. For more information about Azure AD threat intelligence detection, see the [Azure Active Directory Identity Protection risk detections](https://docs.microsoft.com/azure/active-directory/identity-protection/risk-events-reference#azure-ad-threat-intelligence) article.
44
+
45
+
---
46
+
47
+
### Azure AD entitlement management is now available (Public preview)
48
+
49
+
**Type:** New feature
50
+
**Service category:** Identity Governance
51
+
**Product capability:** Identity Governance
52
+
53
+
Azure AD entitlement management, now in public preview, helps customers to delegate management of access packages, which defines how employees and business partners can request access, who must approve, and how long they have access. Access packages can manage membership in Azure AD and Office 365 groups, role assignments in enterprise applications, and role assignments for SharePoint Online sites. Read more about entitlement management at the [overview of Azure AD entitlement management](https://docs.microsoft.com/azure/active-directory/governance/entitlement-management-overview). To learn more about the breadth of Azure AD Identity Governance features, including Privileged Identity Management, access reviews and terms of use, see [What is Azure AD Identity Governance?](../governance/identity-governance-overview.md).
54
+
55
+
---
56
+
57
+
### Configure a naming policy for Office 365 groups in Azure AD portal (Public preview)
58
+
59
+
**Type:** New feature
60
+
**Service category:** Group Management
61
+
**Product capability:** Collaboration
62
+
63
+
Administrators can now configure a naming policy for Office 365 groups, using the Azure AD portal. This change helps to enforce consistent naming conventions for Office 365 groups created or edited by users in your organization.
64
+
65
+
You can configure naming policy for Office 365 groups in two different ways:
66
+
67
+
- Define prefixes or suffixes, which are automatically added to a group name.
68
+
69
+
- Upload a customized set of blocked words for your organization, which are not allowed in group names (for example, “CEO, Payroll, HR”).
70
+
71
+
For more information, see [Enforce a Naming Policy for Office 365 groups](https://docs.microsoft.com/azure/active-directory/users-groups-roles/groups-naming-policy).
72
+
73
+
---
74
+
75
+
### Azure AD Activity logs are now available in Azure Monitor (General availability)
76
+
77
+
**Type:** New feature
78
+
**Service category:** Reporting
79
+
**Product capability:** Monitoring & Reporting
80
+
81
+
To help address your feedback about visualizations with the Azure AD Activity logs, we're introducing a new Insights feature in Log Analytics. This feature helps you gain insights about your Azure AD resources by using our interactive templates, called Workbooks. These pre-built Workbooks can provide details for apps or users, and include:
82
+
83
+
-**Sign-ins.** Provides details for apps and users, including sign-in location, the in-use operating system or browser client and version, and the number of successful or failed sign-ins.
84
+
85
+
-**Legacy authentication and Conditional Access.** Provides details for apps and users using legacy authentication, including Multi-Factor Authentication usage triggered by Conditional Access policies, apps using Conditional Access policies, and so on.
86
+
87
+
-**Sign-in failure analysis.** Helps you to determine if your sign-in errors are occurring due to a user action, policy issues, or your infrastructure.
88
+
89
+
-**Custom reports.** You can create new, or edit existing Workbooks to help customize the Insights feature for your organization.
90
+
91
+
For more information, see [How to use Azure Monitor workbooks for Azure Active Directory reports](https://docs.microsoft.com/azure/active-directory/reports-monitoring/howto-use-azure-monitor-workbooks).
92
+
93
+
---
94
+
95
+
### New Federated Apps available in Azure AD app gallery - April 2019
96
+
97
+
**Type:** New feature
98
+
**Service category:** Enterprise Apps
99
+
**Product capability:** 3rd Party Integration
100
+
101
+
In April 2019, we've added these 21 new apps with Federation support to the app gallery:
For more information about the apps, see [SaaS application integration with Azure Active Directory](https://aka.ms/appstutorial). For more information about listing your application in the Azure AD app gallery, see [List your application in the Azure Active Directory application gallery](https://aka.ms/azureadapprequest).
106
+
107
+
---
108
+
109
+
### New access reviews frequency option and multiple role selection
110
+
111
+
**Type:** New feature
112
+
**Service category:** Access Reviews
113
+
**Product capability:** Identity Governance
114
+
115
+
New updates in Azure AD access reviews allow you to:
116
+
117
+
- Change the frequency of your access reviews to **semi-annually**, in addition to the previously existing options of weekly, monthly, quarterly, and annually.
118
+
119
+
- Select multiple Azure AD and Azure resource roles when creating a single access review. In this situation, all roles are set up with the same settings and all reviewers are notified at the same time.
120
+
121
+
For more information about how to create an access review, see [Create an access review of groups or applications in Azure AD access reviews](https://docs.microsoft.com/azure/active-directory/governance/create-access-review).
122
+
123
+
---
124
+
125
+
### Azure AD Connect email alert system(s) are transitioning, sending new email sender information for some customers
126
+
127
+
**Type:** Changed feature
128
+
**Service category:** AD Sync
129
+
**Product capability:** Platform
130
+
131
+
Azure AD Connect is in the process of transitioning our email alert system(s), potentially showing some customers a new email sender. To address this, you must add `[email protected]` to your organization's allow list or you won't be able to continue receiving important alerts from your Office 365, Azure, or your Sync services.
132
+
133
+
---
134
+
135
+
### UPN suffix changes are now successful between Federated domains in Azure AD Connect
136
+
137
+
**Type:** Fixed
138
+
**Service category:** AD Sync
139
+
**Product capability:** Platform
140
+
141
+
You can now successfully change a user's UPN suffix from one Federated domain to another Federated domain in Azure AD Connect. This fix means you should no longer experience the FederatedDomainChangeError error message during the synchronization cycle or receive a notification email stating, "Unable to update this object in Azure Active Directory, because the attribute [FederatedUser.UserPrincipalName], is not valid. Update the value in your local directory services".
142
+
143
+
For more information, see [Troubleshooting Errors during synchronization](https://docs.microsoft.com/azure/active-directory/hybrid/tshoot-connect-sync-errors#federateddomainchangeerror).
144
+
145
+
---
146
+
147
+
### Increased security using the app protection-based Conditional Access policy in Azure AD (Public preview)
App protection-based Conditional Access is now available by using the **Require app protection** policy. This new policy helps to increase your organization's security by helping to prevent:
154
+
155
+
- Users gaining access to apps without a Microsoft Intune license.
156
+
157
+
- Users being unable to get a Microsoft Intune app protection policy.
158
+
159
+
- Users gaining access to apps without a configured Microsoft Intune app protection policy.
160
+
161
+
For more information, see [How to Require app protection policy for cloud app access with Conditional Access](https://docs.microsoft.com/azure/active-directory/conditional-access/app-protection-based-conditional-access).
162
+
163
+
---
164
+
165
+
### New support for Azure AD single sign-on and Conditional Access in Microsoft Edge (Public preview)
We've enhanced our Azure AD support for Microsoft Edge, including providing new support for Azure AD single sign-on and Conditional Access. If you've previously used Microsoft Intune Managed Browser, you can now use Microsoft Edge instead.
172
+
173
+
For more information about setting up and managing your devices and apps using Conditional Access, see [Require managed devices for cloud app access with Conditional Access](https://docs.microsoft.com/azure/active-directory/conditional-access/require-managed-devices) and [Require approved client apps for cloud app access with Conditional Access](https://docs.microsoft.com/azure/active-directory/conditional-access/app-based-conditional-access). For more information about how to manage access using Microsoft Edge with Microsoft Intune policies, see [Manage Internet access using a Microsoft Intune policy-protected browser](https://docs.microsoft.com/intune/app-configuration-managed-browser).
174
+
175
+
---
176
+
33
177
## March 2019
34
178
35
179
### Identity Experience Framework and custom policy support in Azure Active Directory B2C is now available (GA)
0 commit comments