Skip to content

Commit e8f48ad

Browse files
authored
Merge pull request #99853 from MicrosoftDocs/master
12/30 AM Publish
2 parents ce4a99b + 6710b54 commit e8f48ad

File tree

96 files changed

+1960
-1254
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

96 files changed

+1960
-1254
lines changed

.openpublishing.redirection.json

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -27455,6 +27455,16 @@
2745527455
"redirect_url": "/azure/security-center/security-center-enable-data-collection",
2745627456
"redirect_document_id": false
2745727457
},
27458+
{
27459+
"source_path": "articles/security-center/recommendations-network.md",
27460+
"redirect_url": "/azure/security-center/recommendations-reference#recs-network",
27461+
"redirect_document_id": false
27462+
},
27463+
{
27464+
"source_path": "articles/security-center/recommendations-compute-and-apps.md",
27465+
"redirect_url": "/azure/security-center/recommendations-reference#recs-computeapp",
27466+
"redirect_document_id": false
27467+
},
2745827468
{
2745927469
"source_path": "azure/security-center/security-center-resolve-endpoint-protection-health-alerts.md",
2746027470
"redirect_url": "/azure/security-center/security-center-faq",

articles/active-directory/cloud-provisioning/concept-attributes.md

Lines changed: 35 additions & 34 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title: 'Understanding the Azure AD schema and custom expressions'
3-
description: This topic describes the Azure AD schema, the attributes that the provisioning agent flows and custom expressions.
2+
title: 'Understand the Azure AD schema and custom expressions'
3+
description: This article describes the Azure AD schema, the attributes that the provisioning agent flows, and custom expressions.
44
services: active-directory
55
documentationcenter: ''
66
author: billmath
@@ -19,41 +19,41 @@ ms.collection: M365-identity-device-management
1919
---
2020

2121

22-
# Understanding the Azure AD schema
23-
An object in Azure AD, like any directory, is a programmatic high-level data construct that represents such things as users, groups, and contacts. When you create a new user or contact in Azure AD, you are creating a new instance of that object. These instances can be differentiated based on their properties.
22+
# Understand the Azure AD schema
23+
An object in Azure Active Directory (Azure AD), like any directory, is a programmatic high-level data construct that represents such things as users, groups, and contacts. When you create a new user or contact in Azure AD, you're creating a new instance of that object. These instances can be differentiated based on their properties.
2424

25-
Properties, in Azure AD are the elements responsible for storing information about an instance of an object in Azure AD.
25+
Properties in Azure AD are the elements responsible for storing information about an instance of an object in Azure AD.
2626

27-
The Azure AD schema defines the rules for which properties may be used in an entry, the kinds of values that those properties may have, and how users may interact with those values.
27+
The Azure AD schema defines the rules for which properties might be used in an entry, the kinds of values that those properties might have, and how users might interact with those values.
2828

29-
Azure AD has two types of properties. The properties are:
30-
- **Built in properties**Properties that are pre-defined by the Azure AD schema. These properties provide different uses and may or may not be accessible.
31-
- **Directory extensions**Properties that are provided so that you can customize Azure AD for your own use. For example, if you have extended your on-premises Active Directory with a certain attribute and want to flow that attribute, you can use one of the custom properties that are provided.
29+
Azure AD has two types of properties:
30+
- **Built-in properties**: Properties that are predefined by the Azure AD schema. These properties provide different uses and might or might not be accessible.
31+
- **Directory extensions**: Properties that are provided so that you can customize Azure AD for your own use. For example, if you've extended your on-premises Active Directory with a certain attribute and want to flow that attribute, you can use one of the custom properties that's provided.
3232

3333
## Attributes and expressions
34-
When an object, such as a user is provisioned to Azure AD, a new instance of the user object is created. This creation includes the properties of that object, which are also known as attributes. Initially, the newly created object will have its attributes set to values that are determined by the synchronization rules. These attributes are then kept up to date via the cloud provisioning agent.
34+
When an object such as a user is provisioned to Azure AD, a new instance of the user object is created. This creation includes the properties of that object, which are also known as attributes. Initially, the newly created object has its attributes set to values that are determined by the synchronization rules. These attributes are then kept up to date via the cloud provisioning agent.
3535

36-
![](media/concept-attributes/attribute1.png)
36+
![Object provisioning](media/concept-attributes/attribute1.png)
3737

38-
For example, if a user is part of the Marketing department, their Azure AD department attribute will initially be created when they are provisioned and then the value would be set to Marketing. But then, six months later, they change to Sales. Their on-premises AD department attribute is changed to Sales. This change will then synchronize to Azure AD and be reflected on their Azure AD user object.
38+
For example, a user might be part of a Marketing department. Their Azure AD department attribute is initially created when they're provisioned, and the value is set to Marketing. Six months later if they change to Sales, their on-premises Active Directory department attribute is changed to Sales. This change synchronizes to Azure AD and is reflected in their Azure AD user object.
3939

40-
Attribute synchronization may be either direct, where the value in Azure AD is directly set to the value of the on-premises attribute. Or, there may be a programmatic expression that handles this synchronization. A programmatic expression would be needed in cases where some logic or a determination needed to be made in order to populate the value.
40+
Attribute synchronization might be direct, where the value in Azure AD is directly set to the value of the on-premises attribute. Or, a programmatic expression might handle the synchronization. A programmatic expression is needed in cases where some logic or a determination must be made to populate the value.
4141

42-
For example, if I had my mail attribute ("[email protected]") and I needed to strip out the "@contoso.com" portion and flow just the value "john.smith" I would use something like this:
42+
For example, if you had the mail attribute "[email protected]" and needed to strip out the "@contoso.com" portion and flow only the value "john.smith," you'd use something like this:
4343

4444
`Replace([mail], "@contoso.com", , ,"", ,)`
4545

46-
**Sample input / output:** <br>
46+
**Sample input/output:** <br>
4747

4848
* **INPUT** (mail): "[email protected]"
49-
* **OUTPUT**: "john.smith"
49+
* **OUTPUT**: "john.smith"
5050

51-
For additional information, on writing custom expressions, and the syntax see [Writing Expressions for Attribute Mappings in Azure Active Directory](https://docs.microsoft.com/azure/active-directory/manage-apps/functions-for-customizing-application-data).
51+
For more information on how to write custom expressions and the syntax, see [Writing expressions for attribute mappings in Azure Active Directory](https://docs.microsoft.com/azure/active-directory/manage-apps/functions-for-customizing-application-data).
5252

53-
The following list are common attributes and how they are synchronized to Azure AD.
53+
The following table lists common attributes and how they're synchronized to Azure AD.
5454

5555

56-
|On-premises Active Directory|Mapping Type|Azure AD|
56+
|On-premises Active Directory|Mapping type|Azure AD|
5757
|-----|-----|-----|
5858
|cn|Direct|commonName
5959
|countryCode|Direct|countryCode|
@@ -63,14 +63,14 @@ The following list are common attributes and how they are synchronized to Azure
6363
|userprincipalName|Direct|userPrincipalName|
6464
|ProxyAdress|Direct|ProxyAddress|
6565

66-
## Viewing the schema
67-
In order to view the schema and verify it, do the following steps:
66+
## View the schema
67+
To view the schema and verify it, follow these steps.
6868

69-
1. Navigate to [Graph Explorer](https://developer.microsoft.com/graph/graph-explorer).
70-
2. Sign in with your global administrator account
71-
3. On the left, click **modify permissions** and ensure that **Directory.ReadWrite.All** is Consented.
72-
4. Run the following query: https://graph.microsoft.com/beta/serviceprincipals/. This query will return a list of service principals.
73-
5. Locate "appDisplayName": "Active Directory to Azure Active Directory Provisioning" and note the "id:" value.
69+
1. Go to [Graph Explorer](https://developer.microsoft.com/graph/graph-explorer).
70+
1. Sign in with your global administrator account.
71+
1. On the left, select **modify permissions** and ensure that **Directory.ReadWrite.All** is *Consented*.
72+
1. Run the query https://graph.microsoft.com/beta/serviceprincipals/. This query returns a list of service principals.
73+
1. Locate `"appDisplayName": "Active Directory to Azure Active Directory Provisioning"` and note the value for `"id"`.
7474
```
7575
"value": [
7676
{
@@ -143,8 +143,8 @@ In order to view the schema and verify it, do the following steps:
143143
"passwordCredentials": []
144144
},
145145
```
146-
6. Replace the {Service Principal id} with your value and run the following query: `https://graph.microsoft.com/beta/serviceprincipals/{Service Principal id}/synchronization/jobs/`
147-
7. Locate the "id": "AD2AADProvisioning.fd1c9b9e8077402c8bc03a7186c8f976" section and note the "id:".
146+
1. Replace `{Service Principal id}` with your value, and run the query `https://graph.microsoft.com/beta/serviceprincipals/{Service Principal id}/synchronization/jobs/`.
147+
1. Locate `"id": "AD2AADProvisioning.fd1c9b9e8077402c8bc03a7186c8f976"` and note the value for `"id"`.
148148
```
149149
{
150150
"id": "AD2AADProvisioning.fd1c9b9e8077402c8bc03a7186c8f976",
@@ -235,16 +235,17 @@ In order to view the schema and verify it, do the following steps:
235235
]
236236
}
237237
```
238-
8. Now run the following query: `https://graph.microsoft.com/beta/serviceprincipals/{Service Principal Id}/synchronization/jobs/{AD2AAD Provisioning id}/schema`
238+
1. Now run the query `https://graph.microsoft.com/beta/serviceprincipals/{Service Principal Id}/synchronization/jobs/{AD2AAD Provisioning id}/schema`.
239239
240-
Example: https://graph.microsoft.com/beta/serviceprincipals/653c0018-51f4-4736-a3a3-94da5dcb6862/synchronization/jobs/AD2AADProvisioning.e9287a7367e444c88dc67a531c36d8ec/schema
240+
Example: https://graph.microsoft.com/beta/serviceprincipals/653c0018-51f4-4736-a3a3-94da5dcb6862/synchronization/jobs/AD2AADProvisioning.e9287a7367e444c88dc67a531c36d8ec/schema
241241
242-
Replace the {Service Principal Id} and {AD2ADD Provisioning Id} with your values.
242+
Replace `{Service Principal Id}` and `{AD2ADD Provisioning Id}` with your values.
243243
244-
9. This query will return the schema.
245-
![](media/concept-attributes/schema1.png)
244+
1. This query returns the schema.
245+
246+
![Returned schema](media/concept-attributes/schema1.png)
246247
247-
## Next steps
248+
## Next steps
248249
249250
- [What is provisioning?](what-is-provisioning.md)
250251
- [What is Azure AD Connect cloud provisioning?](what-is-cloud-provisioning.md)

articles/active-directory/cloud-provisioning/how-to-automatic-upgrade.md

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: 'Azure AD Connect cloud provisioning agent: Automatic upgrade | Microsoft Docs'
3-
description: This topic describes the built-in automatic upgrade feature in the Azure AD Connect cloud provisioning agent.
3+
description: This article describes the built-in automatic upgrade feature in the Azure AD Connect cloud provisioning agent.
44
services: active-directory
55
documentationcenter: ''
66
author: billmath
@@ -19,26 +19,26 @@ ms.collection: M365-identity-device-management
1919
---
2020
# Azure AD Connect cloud provisioning agent: Automatic upgrade
2121

22-
Making sure your Azure AD Connect cloud provisioning agent installation is always up to date has never been easier with the **automatic upgrade** feature. This feature is enabled by default and cannot be disabled.
22+
Making sure your Azure Active Directory (Azure AD) Connect cloud provisioning agent installation is always up to date is easy with the automatic upgrade feature. This feature is enabled by default and can't be disabled.
2323

24-
The agent is installed here: **"Program files\Azure AD Connect Provisioning Agent\AADConnectProvisioningAgent.exe"**
24+
The agent is installed here: "Program files\Azure AD Connect Provisioning Agent\AADConnectProvisioningAgent.exe"
2525

26-
You can verify your version by right-clicking on the executable and selecting properties and then details.
26+
To verify your version, right-click the executable and select properties and then details.
2727

2828
![Agent file version](media/how-to-automatic-upgrade/agent1.png)
2929

30-
The agent updater is installed here: **"Program files\Azure AD Connect Provisioning Agent Updater\AzureADConnectAgentUpdater.exe"**
30+
The agent updater is installed here: "Program files\Azure AD Connect Provisioning Agent Updater\AzureADConnectAgentUpdater.exe"
3131

32-
You can verify your version by right-clicking on the executable and selecting properties and then details.
32+
To verify your version, right-click the executable and select properties and then details.
3333

3434
![Agent updater version](media/how-to-automatic-upgrade/agent2.png)
3535

36-
## Uninstalling the agent
37-
To remove the agent, navigate to **Uninstall or change a program** and uninstall the following:
36+
## Uninstall the agent
37+
To remove the agent, go to **Uninstall or change a program** and uninstall the following:
3838

39-
- Microsoft Azure AD Connect Agent Updater
40-
- Microsoft Azure AD Connect Provisioning Agent
41-
- Microsoft Azure AD Connect Provisioning Agent Package
39+
- **Microsoft Azure AD Connect Agent Updater**
40+
- **Microsoft Azure AD Connect Provisioning Agent**
41+
- **Microsoft Azure AD Connect Provisioning Agent Package**
4242

4343
![Agent removal](media/how-to-automatic-upgrade/agent3.png)
4444

articles/active-directory/cloud-provisioning/how-to-configure.md

Lines changed: 52 additions & 43 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: 'Azure AD Connect cloud provisioning new agent configuration'
3-
description: This topic describes how to install cloud provisioning.
3+
description: This article describes how to install cloud provisioning.
44
services: active-directory
55
author: billmath
66
manager: daveba
@@ -13,67 +13,76 @@ ms.author: billmath
1313
ms.collection: M365-identity-device-management
1414
---
1515

16-
# Azure AD Connect cloud provisioning new configuration
16+
# Azure AD Connect cloud provisioning new agent configuration
1717

18-
Once you have installed the agent, you need to sign-in to the Azure portal and configure provisioning. Use the following steps to enable the agent.
18+
After you've installed the agent, you need to sign in to the Azure portal and configure Azure Active Directory (Azure AD) Connect cloud provisioning. Follow these steps to enable the agent.
1919

2020
## Configure provisioning
21-
To configure provisioning, use the following steps:
21+
To configure provisioning, follow these steps.
2222

23-
1. In the Azure AD portal, click **Azure Active Directory**
24-
2. Click **Azure AD Connect**
25-
3. Select **Manage provisioning (Preview)**
26-
![](media/how-to-configure/manage1.png)
23+
1. In the Azure portal, select **Azure Active Directory**.
24+
1. Select **Azure AD Connect**.
25+
1. Select **Manage provisioning (Preview)**.
2726

28-
4. Click on **New configuration**.
29-
5. On the configuration screen, the on-premises domain is pre-populated
30-
6. Enter a **Notification email**. This email will be notified when provisioning is not healthy.
31-
8. Move the selector to **Enable** and click **Save**.
32-
![](media/tutorial-single-forest/configure2.png)
27+
![Manage provisioning (Preview)](media/how-to-configure/manage1.png)
3328

34-
## Scoping provisioning to specific users and groups
35-
If you want to scope the agent to only synchronize specific users and groups, you can do this. You can scope using on-premises AD groups or Organizational Units. You cannot configure groups and Organizational Units within a configuration.
29+
1. Select **New configuration**.
30+
1. On the configuration screen, the on-premises domain is prepopulated.
31+
1. Enter a **Notification email**. This email will be notified when provisioning isn't healthy.
32+
1. Move the selector to **Enable**, and select **Save**.
3633

37-
1. In the Azure AD portal, click **Azure Active Directory**
38-
2. Click **Azure AD Connect**
39-
3. Select **Manage provisioning (Preview)**
40-
4. Under **Configuration** click on your configuration.
41-
![](media/how-to-configure/scope1.png)
34+
![Azure AD provisioning (Preview)](media/tutorial-single-forest/configure2.png)
4235

43-
5. Under **Configure**, select **All users** to change the scope of the configuration rule.
44-
![](media/how-to-configure/scope2.png)
36+
## Scope provisioning to specific users and groups
37+
You can scope the agent to synchronize specific users and groups by using on-premises Active Directory groups or organizational units. You can't configure groups and organizational units within a configuration.
4538

46-
6. On the right, you can change the scope to include only security groups by entering the distinguished name of the group and clicking **Add**.
47-
![](media/how-to-configure/scope3.png)
39+
1. In the Azure portal, select **Azure Active Directory**.
40+
1. Select **Azure AD Connect**.
41+
1. Select **Manage provisioning (Preview)**.
42+
1. Under **Configuration**, select your configuration.
4843

49-
7. Or change it to include only specific OUs. Click **Done** and **Save**.
50-
![](media/how-to-configure/scope4.png)
44+
![Configuration section](media/how-to-configure/scope1.png)
45+
46+
1. Under **Configure**, select **All users** to change the scope of the configuration rule.
47+
48+
![All users option](media/how-to-configure/scope2.png)
49+
50+
1. On the right, you can change the scope to include only security groups. Enter the distinguished name of the group, and select **Add**.
51+
52+
![Selected security groups option](media/how-to-configure/scope3.png)
53+
54+
1. Or you can change the scope to include only specific organizational units. Select **Done** and **Save**.
55+
56+
![Selected organizational units option](media/how-to-configure/scope4.png)
5157

5258

5359
## Restart provisioning
54-
If you do not want to wait for the next scheduled run, you can trigger the provisioning run using the restart provisioning button.
55-
1. In the Azure AD portal, click **Azure Active Directory**
56-
2. Click **Azure AD Connect**
57-
3. Select **Manage provisioning (Preview)**
58-
4. Under **Configuration** click on your configuration.
59-
![](media/how-to-configure/scope1.png)
60+
If you don't want to wait for the next scheduled run, trigger the provisioning run by using the **Restart provisioning** button.
61+
1. In the Azure portal, select **Azure Active Directory**.
62+
1. Select **Azure AD Connect**.
63+
1. Select **Manage provisioning (Preview)**.
64+
1. Under **Configuration**, select your configuration.
65+
66+
![Configuration selection to restart provisioning](media/how-to-configure/scope1.png)
67+
68+
1. At the top, select **Restart provisioning**.
69+
70+
## Remove a configuration
71+
To delete a configuration, follow these steps.
6072

61-
5. At the top, click **Restart provisioning**.
73+
1. In the Azure portal, select **Azure Active Directory**.
74+
1. Select **Azure AD Connect**.
75+
1. Select **Manage provisioning (Preview)**.
76+
1. Under **Configuration**, select your configuration.
6277

63-
## Removing a configuration
64-
If you want to delete a configuration you can do that by using the following steps.
78+
![Configuration selection to remove configuration](media/how-to-configure/scope1.png)
6579

66-
1. In the Azure AD portal, click **Azure Active Directory**
67-
2. Click **Azure AD Connect**
68-
3. Select **Manage provisioning (Preview)**
69-
4. Under **Configuration** click on your configuration.
70-
![](media/how-to-configure/scope1.png)
80+
1. At the top of the configuration screen, select **Delete**.
7181

72-
5. At the top, click **Delete**.
73-
![](media/how-to-configure/remove1.png)
82+
![Delete button](media/how-to-configure/remove1.png)
7483

7584
>[!IMPORTANT]
76-
>There is no confirmation prior to deleting a configuration so be sure that this is the action you want to take before clicking **Delete**.
85+
>There's no confirmation prior to deleting a configuration. Make sure this is the action you want to take before you select **Delete**.
7786
7887

7988
## Next steps

0 commit comments

Comments
 (0)