Skip to content

Commit f6edfda

Browse files
committed
Merging changes synced from https://github.com/MicrosoftDocs/azure-docs-pr (branch live)
2 parents 86e45ea + 057af05 commit f6edfda

File tree

75 files changed

+1211
-39850
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

75 files changed

+1211
-39850
lines changed

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,10 @@
11
{
22
"redirections": [
3+
{
4+
"source_path": "articles/storage/blobs/storage-ios-how-to-use-blob-storage.md",
5+
"redirect_url": "/previous-versions/azure/storage/blobs/storage-ios-how-to-use-blob-storage",
6+
"redirect_document_id": false
7+
},
38
{
49
"source_path": "articles/virtual-machines/linux/login-using-aad.md",
510
"redirect_url": "/previous-versions/azure/virtual-machines/linux/login-using-aad",
20.3 KB
Loading
3.49 KB
Loading

articles/active-directory/reports-monitoring/toc.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -130,6 +130,8 @@
130130
href: workbook-conditional-access-gap-analyzer.md
131131
- name: Cross-tenant access activity
132132
href: workbook-cross-tenant-access-activity.md
133+
- name: Risk analysis
134+
href: workbook-risk-analysis.md
133135
- name: Sensitive Operations Report
134136
href: workbook-sensitive-operations-report.md
135137
- name: Recommendations
Lines changed: 107 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,107 @@
1+
---
2+
3+
title: Identity protection risk analysis workbook in Azure AD | Microsoft Docs
4+
description: Learn how to use the identity protection risk analysis workbook.
5+
services: active-directory
6+
documentationcenter: ''
7+
author: MarkusVi
8+
manager: karenho
9+
editor: ''
10+
11+
ms.service: active-directory
12+
ms.topic: reference
13+
ms.workload: identity
14+
ms.subservice: report-monitor
15+
ms.date: 03/08/2022
16+
ms.author: markvi
17+
ms.reviewer: sahandle
18+
19+
ms.collection: M365-identity-device-management
20+
---
21+
22+
# Identity protection risk analysis workbook
23+
24+
Azure AD Identity Protection detects, remediates, and prevents compromised identities. As an IT administrator, you want to understand risk trends in your organizations and opportunities for better policy configuration. With the Identity Protection Risky Analysis Workbook, you can answer common questions about your Identity Protection implementation.
25+
26+
This article provides you with an overview of this workbook.
27+
28+
29+
## Description
30+
31+
![Workbook category](./media/workbook-risk-analysis/workbook-category.png)
32+
33+
34+
As an IT administrator, you need to understand trends in identity risks and gaps in your policy implementations to ensure you are best protecting your organizations from identity compromise. The identity protection risk analysis workbook helps you analyze the state of risk in your organization.
35+
36+
**This workbook:**
37+
38+
- Provides visualizations of where in the world risk is being detected.
39+
40+
- Allows you to understand the trends in real time vs. Offline risk detections.
41+
42+
- Provides insight into how effective you are at responding to risky users.
43+
44+
45+
46+
47+
48+
## Sections
49+
50+
This workbook has five sections:
51+
52+
- Heatmap of risk detections
53+
54+
- Offline vs real-time risk detections
55+
56+
- Risk detection trends
57+
58+
- Risky users
59+
60+
- Summary
61+
62+
63+
64+
65+
66+
67+
68+
## Filters
69+
70+
71+
This workbook supports setting a time range filter.
72+
73+
74+
![Set time range filter](./media/workbook-risk-analysis/time-range-filter.png)
75+
76+
There are more filters in the risk detection trends and risky users sections.
77+
78+
Risk Detection Trends:
79+
80+
- Detection timing type (real-time or offline)
81+
82+
- Risk level (low, medium, high, or none)
83+
84+
Risky Users:
85+
86+
- Risk detail (which indicates what changed a user’s risk level)
87+
88+
- Risk level (low, medium, high, or none)
89+
90+
91+
## Best practices
92+
93+
94+
- **[Enable risky sign-in policies](../identity-protection/concept-identity-protection-policies.md)** - To prompt for multi-factor authentication (MFA) on medium risk or above. Enabling the policy reduces the proportion of active real-time risk detections by allowing legitimate users to self-remediate the risk detections with MFA.
95+
96+
- **[Enable a risky user policy](../identity-protection/howto-identity-protection-configure-risk-policies.md#user-risk-with-conditional-access)** - To enable users to securely remediate their accounts when they are high risk. Enabling the policy reduces the number of active at-risk users in your organization by returning the user’s credentials to a safe state.
97+
98+
99+
100+
101+
102+
## Next steps
103+
104+
- To learn more about identity protection, see [What is identity protection](../identity-protection/overview-identity-protection.md).
105+
106+
- For more information about Azure AD workbooks, see [How to use Azure AD workbooks](howto-use-azure-monitor-workbooks.md).
107+

articles/active-directory/verifiable-credentials/TOC.yml

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -47,10 +47,10 @@
4747
items:
4848
- name: Sample Applications
4949
href: https://github.com/Azure-Samples/active-directory-verifiable-credentials
50-
- name: Sample Issuer
51-
href: https://didvc-issuer-sample.azurewebsites.net/
52-
- name: Sample Verifier
53-
href: https://didvc-verifier-sample.azurewebsites.net/
50+
# - name: Sample Issuer
51+
# href:
52+
- name: End to End Demo
53+
href: https://woodgroveemployee.azurewebsites.net/
5454
- name: Reference
5555
expanded: true
5656
items:

articles/active-directory/verifiable-credentials/decentralized-identifier-overview.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -94,9 +94,9 @@ The scenario we use to explain how VCs work involves:
9494

9595

9696

97-
Today, Alice provides a username and password to log onto Woodgrove’s networked environment. Woodgrove is deploying a VC solution to provide a more manageable way for Alice to prove she is an employee of Woodgrove. Proseware is using a VC solution compatible with Woodgrove's VC solution and they accept credentials issued by Woodgrove as proof of employment.
97+
Today, Alice provides a username and password to log onto Woodgrove’s networked environment. Woodgrove is deploying a verifiable credential solution to provide a more manageable way for Alice to prove that she is an employee of Woodgrove. Proseware accepts verifiable credentials issued by Woodgrove as proof of employment to offer corporate discounts as part of their corporate discount program.
9898

99-
The issuer of the credential, Woodgrove Inc., creates a public key and a private key. The public key is stored on ION. When the key is added to the infrastructure, the entry is recorded in a blockchain-based decentralized ledger. The issuer provides Alice the private key that is stored in a wallet application. Each time Alice successfully uses the private key the transaction is logged in the wallet application.
99+
Alice requests Woodgrove Inc for a proof of employment verifiable credential. Woodgrove Inc attests Alice's identiy and issues a signed verfiable credential that Alice can accept and store in her digital wallet application. Alice can now present this verifiable credential as a proof of employement on the Proseware site. After a succesfull presentation of the credential, Prosware offers discount to Alice and the transaction is logged in Alice's wallet application so that she can track where and to whom she has presented her proof of employment verifiable credential.
100100

101101
![microsoft-did-overview](media/decentralized-identifier-overview/did-overview.png)
102102

articles/analysis-services/analysis-services-create-bicep-file.md

Lines changed: 3 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Quickstart - Create an Azure Analysis Services server resource by using Bicep
33
description: Quickstart showing how to an Azure Analysis Services server resource by using a Bicep file.
4-
ms.date: 03/04/2022
4+
ms.date: 03/08/2022
55
ms.topic: quickstart
66
ms.service: azure-analysis-services
77
ms.author: jgao
@@ -73,18 +73,13 @@ When no longer needed, use the Azure portal, Azure CLI, or Azure PowerShell to d
7373
# [CLI](#tab/CLI)
7474

7575
```azurecli-interactive
76-
echo "Enter the Resource Group name:" &&
77-
read resourceGroupName &&
78-
az group delete --name $resourceGroupName &&
79-
echo "Press [ENTER] to continue ..."
76+
az group delete --name exampleRG
8077
```
8178

8279
# [PowerShell](#tab/PowerShell)
8380

8481
```azurepowershell-interactive
85-
$resourceGroupName = Read-Host -Prompt "Enter the Resource Group name"
86-
Remove-AzResourceGroup -Name $resourceGroupName
87-
Write-Host "Press [ENTER] to continue..."
82+
Remove-AzResourceGroup -Name exampleRG
8883
```
8984

9085
---

articles/application-gateway/how-application-gateway-works.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -53,11 +53,11 @@ When an application gateway sends the original request to the backend server, it
5353
5454
### Modifications to the request
5555

56-
Application gateway inserts five additional headers to all requests before it forwards the requests to the backend. These headers are x-forwarded-for, x-forwarded-proto, x-forwarded-port, x-original-host, and x-appgw-trace-id. The format for x-forwarded-for header is a comma-separated list of IP:port.
56+
Application gateway inserts six additional headers to all requests before it forwards the requests to the backend. These headers are x-forwarded-for, x-forwarded-port, x-forwarded-proto, x-original-host, x-original-url, and x-appgw-trace-id. The format for x-forwarded-for header is a comma-separated list of IP:port.
5757

5858
The valid values for x-forwarded-proto are HTTP or HTTPS. X-forwarded-port specifies the port where the request reached the application gateway. X-original-host header contains the original host header with which the request arrived. This header is useful in Azure website integration, where the incoming host header is modified before traffic is routed to the backend. If session affinity is enabled as an option, then it adds a gateway-managed affinity cookie.
5959

60-
x-appgw-trace-id is a unique guid generated by application gateway for each client request and presented in the forwarded request to the backend pool member. The guid consists of 32 alphanumeric characters presented without dashes (for example: ac882cd65a2712a0fe1289ec2bb6aee7). This guid can be used to correlate a request received by application gateway and initiated to a backend pool member via the transactionId property in [Diagnostic Logs](application-gateway-diagnostics.md#diagnostic-logging).
60+
X-appgw-trace-id is a unique guid generated by application gateway for each client request and presented in the forwarded request to the backend pool member. The guid consists of 32 alphanumeric characters presented without dashes (for example: ac882cd65a2712a0fe1289ec2bb6aee7). This guid can be used to correlate a request received by application gateway and initiated to a backend pool member via the transactionId property in [Diagnostic Logs](application-gateway-diagnostics.md#diagnostic-logging).
6161

6262
You can configure application gateway to modify request and response headers and URL by using [Rewrite HTTP headers and URL](rewrite-http-headers-url.md) or to modify the URI path by using a path-override setting. However, unless configured to do so, all incoming requests are proxied to the backend.
6363

articles/automation/delete-account.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -169,7 +169,7 @@ To recover an Automation account, ensure that the following conditions are met:
169169
- Before you attempt to recover a deleted Automation account, ensure that resource group for that account exists.
170170

171171
> [!NOTE]
172-
> * If the resource group of the Automation account is deleted, to recover, you must recreate the resource group with the same name. After a few hours, the Automation account is repopulated in the list of deleted accounts. Then you can restore the account.
172+
> * If the resource group of the Automation account is deleted, to recover, you must recreate the resource group with the same name.
173173
> * Though the resource group isn't present, you can see the Automation account in the deleted list. If the resource group isn't present, the account restore operation fails with the error *Account restore failed*.
174174
175175
### Recover a deleted Automation account

0 commit comments

Comments
 (0)