Skip to content

Commit 43475a4

Browse files
authored
Merge pull request #5665 from MicrosoftDocs/main
10/23/2024 PM Publish
2 parents d814697 + 5360b69 commit 43475a4

File tree

15 files changed

+49
-23
lines changed

15 files changed

+49
-23
lines changed

.docutune/dictionaries/known-guids.json

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1233,7 +1233,6 @@
12331233
"Microsoft Cloud App Security_1": "df845ce7-05f9-4894-b5f2-11bbfbcfd2b6",
12341234
"Microsoft Cloud App Security_2": "2e2ddb96-6af9-4b1d-a3f0-d6ecfd22edb2",
12351235
"Marketo Sales Engage": "0b4dcf5f-e476-465b-8d46-538e19df4943",
1236-
"Azure VPN Client": "41b23e61-6c1e-4545-b367-cd054e0ed4b4",
12371236
"Microsoft Commerce Tools Authentication Service": "dae9ab2c-0d46-41d1-969c-15f3b5005024",
12381237
"Microsoft Forms": "c9a559d2-7aab-4f13-a6ed-e7e9c52aec87",
12391238
"Microsoft Frontbridge": "0fe2f700-2fcd-47cd-8347-d6b245233ffc",
@@ -3678,5 +3677,8 @@
36783677
"Azure VPN client - Manually registered, Azure Public" : "41b23e61-6c1e-4545-b367-cd054e0ed4b4",
36793678
"Azure VPN client - Manually registered, Azure Government" : "51bb15d4-3a4f-4ebf-9dca-40096fe32426",
36803679
"Azure VPN client - Manually registered, Azure Germany" : "538ee9e6-310a-468d-afef-ea97365856a9",
3681-
"Azure VPN client - Manually registered, Microsoft Azure operated by 21Vianet" : "49f817b6-84ae-4cc0-928c-73f27289b3aa"
3680+
"Azure VPN client - Manually registered, Microsoft Azure operated by 21Vianet" : "49f817b6-84ae-4cc0-928c-73f27289b3aa",
3681+
"Azure Resource Manager tenant ID - hardcoded" : "c0257de7-538f-415c-993a-1b87a031879d",
3682+
"Azure Databricks app ID" : "2ff814a6-3304-4ab8-85cb-cd0e6f879c1d",
3683+
"MQTT broker state store ID" : "FA9AE35F-2F64-47CD-9BFF-08E2B32A0FE8"
36823684
}

docs/fundamentals/concept-learn-about-groups.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -44,7 +44,7 @@ There are two group types and three group membership types. Review the options t
4444
For example, you can create a security group so that all group members have the same set of security permissions. Members of a security group can include users, devices, [service principals](~/architecture/service-accounts-principal.md), and other groups (also known as nested groups), which define [access policy and permissions](identity-fundamental-concepts.md). Owners of a security group can include users and service principals.
4545

4646
> [!NOTE]
47-
> When nesting an existing security group to another security group, only members in the parent group will have access to shared resources and applications. Nested group members don't have the same assigned membership as the parent group members. For more info about managing nested groups, see [How to manage groups](how-to-manage-groups.yml#add-members-or-owners-of-a-group).
47+
> When nesting an existing security group to another security group, only members in the parent group will have access to shared resources and applications. Nested group members don't have the same assigned membership as the parent group members. For more info about managing nested groups, see [How to manage groups](how-to-manage-groups.yml#add-a-group-to-another-group).
4848
4949
**Microsoft 365:** Provides collaboration opportunities by giving group members access to a shared mailbox, calendar, files, SharePoint sites, and more.
5050

docs/fundamentals/how-to-manage-stay-signed-in-prompt.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ metadata:
77
ms.author: sarahlipsey
88
manager: amycolannino
99
ms.reviewer: almars
10-
ms.date: 01/16/2024
10+
ms.date: 10/23/2024
1111
ms.service: entra
1212
ms.subservice: fundamentals
1313
ms.topic: how-to
@@ -27,7 +27,7 @@ prerequisites:
2727
summary: |
2828
Configuring the 'keep me signed in' (KMSI) option requires one of the following licenses:
2929
30-
- Microsoft Entra ID P1 or P2
30+
- Microsoft Entra ID Free
3131
- Office 365 (for Office apps)
3232
- Microsoft 365
3333
-7.94 KB
Loading
-9.75 KB
Loading
6.11 KB
Loading

docs/identity/authentication/concept-mfa-regional-opt-in.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -205,12 +205,13 @@ For voice verification, the following region codes require an opt-in.
205205
| 252 | Somalia | 10 | 30 |
206206
| 501 | Belize | 10 | 30 |
207207
| 855 | Cambodia | 50 | 200 |
208-
| 84 | Vietnam | 50 | 200 |
209-
| 94 | Sri Lanka | 50 | 200 |
208+
| 84 | Vietnam | 150 | 500 |
209+
| 94 | Sri Lanka | 100 | 500 |
210210
| 63 | Philippines | 50 | 200 |
211211
| 62 | Indonesia | 50 | 200 |
212-
| 7 | Russia | 50 | 200 |
212+
| 7 | Russia | 100 | 1000 |
213213
| 258 | Mozambique | 50 | 200 |
214+
| 92 | Pakistan | 100 | 1000 |
214215

215216
## Next steps
216217

docs/identity/authentication/how-to-enable-authenticator-passkey.md

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ description: Learn about how to enable passkeys in Microsoft Authenticator for M
55
ms.service: entra-id
66
ms.subservice: authentication
77
ms.topic: how-to
8-
ms.date: 10/14/2024
8+
ms.date: 10/23/2024
99

1010

1111
ms.author: justinha
@@ -47,7 +47,10 @@ An Authentication Policy Administrator needs to consent to allow Authenticator i
4747
When attestation is enabled in the passkey (FIDO) policy, Microsoft Entra ID tries to verify the legitimacy of the passkey being created. When the user is registering a passkey in the Authenticator, attestation verifies that the legitimate Microsoft Authenticator app created the passkey by using Apple and Google services. Here’s more details:
4848

4949
- iOS: Authenticator attestation uses the [iOS App Attest service](https://developer.apple.com/documentation/devicecheck/preparing-to-use-the-app-attest-service) to ensure the legitimacy of the Authenticator app before registering the passkey.
50-
50+
51+
>[!NOTE]
52+
>Support for registering passkeys in Authenticator when attestation is enforced is currently rolling out to iOS Authenticator app users. Support for registering attested passkeys in Authenticator on Android devices is available to all users in the latest version of the app.
53+
5154
- Android:
5255
- For Play Integrity attestation, Authenticator attestation uses the [Play Integrity API](https://developer.android.com/google/play/integrity/overview) to ensure the legitimacy of the Authenticator app before registering the passkey.
5356
- For Key attestation, Authenticator attestation uses [key attestation by Android](https://developer.android.com/privacy-and-security/security-key-attestation) to verify that the passkey being registered is hardware-backed.

docs/identity/authentication/how-to-register-passkey-authenticator.md

Lines changed: 8 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ description: Registration and management of passkey with Authenticator on Androi
55
ms.service: entra-id
66
ms.subservice: authentication
77
ms.topic: how-to
8-
ms.date: 10/21/2024
8+
ms.date: 10/23/2024
99

1010
ms.author: justinha
1111
author: justinha
@@ -24,6 +24,9 @@ This article shows how to register a passkey using Microsoft Authenticator on yo
2424

2525
Alternatively, you can add a passkey from your mobile device browser, or through cross-device registration using another device, such as a laptop. Your mobile device needs to run iOS version 17, or Android version 14, or later.
2626

27+
>[!NOTE]
28+
>Support for registering passkeys in Authenticator when attestation is enforced is currently rolling out to iOS Authenticator app users. Support for registering attested passkeys in Authenticator on Android devices is available to all users in the latest version of the app.
29+
2730
| Scenario | iOS | Android |
2831
|------------------|---------------------------------|----------------|
2932
| **Same-device registration by signing into Authenticator** | ✅ | ✅ |
@@ -36,6 +39,7 @@ Alternatively, you can add a passkey from your mobile device browser, or through
3639

3740
### Registration by signing in to Authenticator (iOS) (preview)
3841

42+
3943
You can sign in to Authenticator to create a passkey in the app and get seamless single sign-on (SSO) across Microsoft native apps. **This is the recommended and preferred flow to set up a passkey in Authenticator.** If you're signed in or already have an account in Authenticator, you still need to complete these steps to add a passkey in Authenticator.
4044

4145
1. Download Authenticator from the App Store, open it, and go through the privacy screens.
@@ -91,7 +95,7 @@ You can sign in to Authenticator to create a passkey in the app and get seamless
9195
:::image type="content" border="true" source="media/howto-register-passwordless-passkey-direct-ios/new-authenticator-account.png" alt-text="Screenshot of a new account in Authenticator for iOS devices.":::
9296

9397

94-
### Passkey registration from Security Info (iOS)
98+
### Passkey registration from Security info (iOS)
9599

96100
Security info by default will prompt users to sign in to the Authenticator app to register their passkey.
97101

@@ -114,6 +118,7 @@ Security info by default will prompt users to sign in to the Authenticator app t
114118
:::image type="content" border="true" source="media/howto-authenticate-passwordless-passkey-ios/complete-setup-in-authenticator.png" alt-text="Screenshot of wizard to complete the passkey setup in Authenticator.":::
115119

116120
1. Add your account in Authenticator on your iOS device. If you just downloaded Authenticator, you can tap **Add work or school account** near the bottom of your iOS device. If already using Authenticator, tap **+** in the upper right corner of the app and then tap on **Add work or school account**.
121+
117122
:::image type="content" border="true" source="media/howto-register-passwordless-passkey-direct-ios/add-account-ios.png" alt-text="Screenshot 233x433 of how to register using Microsoft Authenticator for iOS devices.":::
118123

119124
1. The rest of the flow is similar to the flow shared earlier to sign in to the Authenticator and complete passkey registration. Complete MFA on your iOS device, and tap **Sign in**.
@@ -305,7 +310,7 @@ Security info by default will prompt users to sign in to the Authenticator app t
305310

306311
:::image type="content" border="true" source="media/howto-authenticate-passwordless-passkey-android/passkey-android-security-info-laptop.png" alt-text="Screenshot of a new passkey on Android sign-in method in Security info on your other device.":::
307312

308-
## Alternate registration flow on Security Info (Android)
313+
## Alternate registration flow on Security info (Android)
309314

310315
If a user is unable to sign in to the Authenticator to register a passkey, you can fall back to triggering registration directly from Security Info. If initiating this flow from a browser on a different device, Bluetooth, an internet connection, and connectivity to these two endpoints must be allowed in your organization to enable cross-device registration and authentication:
311316

docs/identity/monitoring-health/howto-use-health-scenario-alerts.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,21 +1,21 @@
11
---
2-
title: How to use Microsoft Entra health monitoring alerts (preview)
2+
title: How to use Microsoft Entra Health monitoring alerts (preview)
33
description: Learn how to use the Microsoft Entra health monitoring alerts to monitor and improve the health of your tenant.
44
author: shlipsey3
55
manager: amycolannino
66
ms.service: entra-id
77
ms.topic: how-to
88
ms.subservice: monitoring-health
9-
ms.date: 10/14/2024
9+
ms.date: 10/23/2024
1010
ms.author: sarahlipsey
1111
ms.reviewer: sarbar
1212

1313
# Customer intent: As an IT admin, I want to learn how to use Microsoft Entra health monitoring to observe and improve the health of my tenant.
1414
---
1515

16-
# How to use Microsoft Entra health monitoring alerts (preview)
16+
# How to use Microsoft Entra Health monitoring alerts (preview)
1717

18-
Microsoft Entra Health monitoring provides the ability to monitor the health of your Microsoft Entra tenant through a set of health metrics and intelligent alerts. Health metrics are fed into our anomaly detection service, which uses machine learning to understand the patterns for your tenant. When the anomaly detection service identifies a significant change one of the tenant-level patterns, it triggers an alert. You can also receive email notifications when a potential issue or failure condition is detected within the health scenarios. For more information on Microsoft Entra Health, see [What is Microsoft Entra Health](concept-microsoft-entra-health.md).
18+
Microsoft Entra Health monitoring provides the ability to monitor the health of your Microsoft Entra tenant through a set of health metrics and intelligent alerts. Health metrics are fed into our anomaly detection service, which uses machine learning to understand the patterns for your tenant. When the anomaly detection service identifies a significant change in one of the tenant-level patterns, it triggers an alert. You can receive email notifications when a potential issue or failure condition is detected within the health scenarios. For more information on Microsoft Entra Health, see [What is Microsoft Entra Health](concept-microsoft-entra-health.md).
1919

2020
This article provides guidance on how to:
2121

@@ -32,7 +32,7 @@ This article provides guidance on how to:
3232
- Newly onboarded tenants might not have enough data to generate alerts for about 30 days.
3333
- Currently, alerts are only available with the Microsoft Graph API.
3434

35-
## How to access Microsoft Entra Health
35+
## Access Microsoft Entra Health
3636

3737
You can view the Microsoft Entra Health service level agreement (SLA) attainment report and the health monitoring signals from the Microsoft Entra admin center. You can also view these data streams, and the public preview of health monitoring alerts, using [Microsoft Graph APIs](/graph/api/resources/healthmonitoring-overview?view=graph-rest-beta&preserve-view=true). [Enable the Scenario monitoring preview](https://entra.microsoft.com/?feature.tokencaching=true&feature.internalgraphapiversion=true#view/Microsoft_AAD_IAM/FeaturePreviewsListBlade).
3838

@@ -128,7 +128,7 @@ With the email notifications configured, you and your team can more effectively
128128
```http
129129
GET https://graph.microsoft.com/beta/reports/healthMonitoring/alerts/{alertId}
130130
```
131-
For sample requests and responses, see [Health monitoring List alert objects](/graph/api/healthmonitoring-healthmonitoringroot-list-alerts?view=graph-rest-beta&preserve-view=true).
131+
For sample requests and responses, see [Health monitoring List alert objects](/graph/api/healthmonitoring-healthmonitoringroot-list-alerts?view=graph-rest-beta&preserve-view=true).
132132
- The portion of the response after `impacts` make up the impact summary for the alert.
133133
- The `supportingData` portion includes the full query used to generate the alert.
134134
- The results of the query include everything identified by the anomaly detection service, but there might be results that aren't directly related to the alert.
@@ -139,7 +139,7 @@ For sample requests and responses, see [Health monitoring List alert objects](/
139139
- If you need to modify Conditional Access policies, you need the [Conditional Access Administrator](../role-based-access-control/permissions-reference.md#conditional-access-administrator) role.
140140
1. Browse to **Monitoring & health** > **Sign-in logs**.
141141
- Adjust the time range to match the alert time frame.
142-
- Add a **filter** for Conditional Access.
142+
- Add a filter for Conditional Access.
143143
- Select a log entry to view the sign-in logs details and select the Conditional Access tab to see the policies that were applied.
144144
145145
### View the scenario-specific resources

0 commit comments

Comments
 (0)