![]() There is no additional work to enable this feature, the unfamiliar properties will be shown by default. Identity Protection now surfaces the unfamiliar properties in the Azure portal on UX and in API as Additional Info with a user-friendly description explaining that the following properties are unfamiliar for this sign-in of the given user. Unfamiliar sign-in properties risk detection now provides risk reasons as to which properties are unfamiliar for customers to better investigate that risk. Type: Changed feature Service category: Identity Protection Product capability: Identity Security & Protection General Availability - More information on why a sign-in was flagged as "unfamiliar" Now you can require users who are eligible for a role to satisfy Conditional Access policy requirements for activation: use specific authentication method enforced through Authentication Strengths, activate from Intune compliant device, comply with Terms of Use, and use 3rd party MFA and satisfy location requirements.įor more information, see: Configure Azure AD role settings in Privileged Identity Management. ![]() Public Preview - Azure AD PIM + Conditional Access integration Use the Azure AD recommendations API to implement Azure AD best practices for your tenant.What are Azure Active Directory recommendations?.Minimize MFA prompts from known devices.Migration applications from AD FS to AAD.Convert from per-user MFA to Conditional Access MFA.This release includes our first 3 recommendations: If a recommendation is flagged as applicable to your tenant, the recommendation appears in the Recommendations section of the Azure AD Overview. During this analysis, Azure AD compares the data of a recommendation with the actual configuration of your tenant. On a daily basis, Azure AD analyzes the configuration of your tenant. Type: New feature Service category: Reporting Product capability: Monitoring & ReportingĪzure AD recommendations help you improve your tenant posture by surfacing opportunities to implement best practices. General Availability - Follow Azure AD best practices with recommendations By integrating PIM capabilities into different Azure portal blades, this new feature allows users to gain temporary access to view or edit subscriptions and resources more easily.įor more information Microsoft cloud settings, see: Activate my Azure resource roles in Privileged Identity Management. In Access control (IAM) for a resource, you can now select View my access to see your currently active and eligible role assignments and activate directly. From there, you can activate an eligible assignment in the same pane. ![]() From the Subscriptions blade, select View eligible subscriptions in the horizontal command menu to check your eligible, active, and expired assignments. Shortcuts have been added to Subscriptions (billing) and Access Control (AD) to allow users to activate PIM roles directly from these blades. Privileged Identity Management (PIM) role activation has been expanded to the Billing and AD extensions in the Azure portal. Type: New feature Service category: Privileged Identity Management Product capability: Privileged Identity Management February 2023 General Availability - Expanding Privileged Identity Management Role Activation across the Azure portal If you're looking for items older than six months, you can find them in Archive for What's new in Azure Active Directory. ![]() This page updates monthly, so revisit it regularly. To stay up to date with the most recent developments, this article provides you with information about: Get notified about when to revisit this page for updates by copying and pasting this URL: into your feed reader.Īzure AD receives improvements on an ongoing basis. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |