{"id":600,"date":"2021-06-22T20:08:02","date_gmt":"2021-06-22T20:08:02","guid":{"rendered":"https:\/\/www.spktechfit.com\/?p=600"},"modified":"2021-06-23T19:14:49","modified_gmt":"2021-06-23T19:14:49","slug":"4-managing-azure-active-directory","status":"publish","type":"post","link":"https:\/\/www.spktechfit.com\/?p=600","title":{"rendered":"4. Managing Azure Active Directory"},"content":{"rendered":"<h1 style=\"margin: 0in; font-family: Calibri; font-size: 16.0pt; color: #1e4e79;\">What is Azure AD?<\/h1>\n<p style=\"margin: 0in; font-family: Calibri; font-size: 11.0pt;\">Azure Active Directory (Azure AD) is Microsoft\u2019s enterprise cloud-based identity and access management (IAM) solution. Azure AD is the backbone of the Office 365 system, and it can sync with on-premise Active Directory and provide authentication to other cloud-based systems via OAuth.<\/p>\n<p style=\"margin: 0in; font-family: Calibri; font-size: 11.0pt;\"><a href=\"https:\/\/www.varonis.com\/blog\/azure-active-directory\/#:~:text=Azure%20Active%20Directory%20(Azure%20AD,cloud%2Dbased%20systems%20via%20OAuth\">https:\/\/www.varonis.com\/blog\/azure-active-directory\/#:~:text=Azure%20Active%20Directory%20(Azure%20AD,cloud%2Dbased%20systems%20via%20OAuth<\/a>.<\/p>\n<h1 style=\"margin: 0in; font-family: Calibri; font-size: 16.0pt; color: #1e4e79;\"><\/h1>\n<h1><\/h1>\n<h1 style=\"margin: 0in; font-family: Calibri; font-size: 16.0pt; color: #1e4e79;\">Azure AD &#8211; Free Vs Premium<\/h1>\n<ul style=\"margin-left: .375in; direction: ltr; unicode-bidi: embed; margin-top: 0in; margin-bottom: 0in;\" type=\"disc\">\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><span style=\"font-weight: bold; font-family: Calibri; font-size: 11.0pt;\">Free:<\/span><span style=\"font-family: Calibri; font-size: 11.0pt;\"> You get a lot with the Free version including:<br \/>\n&#8211; 500,000 object limit<br \/>\n&#8211; SSO<br \/>\n&#8211; AD sync<br \/>\n&#8211; Self service password change for cloud users<br \/>\n<\/span><\/li>\n<\/ul>\n<p style=\"margin: 0in; font-family: Calibri; font-size: 11.0pt;\"><span style=\"font-weight: bold;\">O365: Extra features here include<\/span><\/p>\n<ul style=\"margin-left: .375in; direction: ltr; unicode-bidi: embed; margin-top: 0in; margin-bottom: 0in;\" type=\"disc\">\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><span style=\"font-family: Calibri; font-size: 11.0pt;\">Company branding<\/span><\/li>\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><span style=\"font-family: Calibri; font-size: 11.0pt;\">Self password reset for cloud users<\/span><\/li>\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><span style=\"font-family: Calibri; font-size: 11.0pt;\">SLA guaranteeing uptime<\/span><\/li>\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><span style=\"font-family: Calibri; font-size: 11.0pt;\">Device write back 2 way synch between on premise directories and Azure<\/span><\/li>\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><span style=\"font-weight: bold; font-family: Calibri; font-size: 11.0pt;\">\u00a0<\/span><\/li>\n<\/ul>\n<p style=\"margin: 0in; font-family: Calibri; font-size: 11.0pt;\"><span style=\"font-weight: bold;\">P1:<\/span><\/p>\n<ul style=\"margin-left: .375in; direction: ltr; unicode-bidi: embed; margin-top: 0in; margin-bottom: 0in;\" type=\"disc\">\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><span style=\"font-family: Calibri; font-size: 11.0pt;\">Password Protection (ban certain words)<\/span><\/li>\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><span style=\"font-family: Calibri; font-size: 11.0pt;\">Group access management<\/span><\/li>\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><span style=\"font-family: Calibri; font-size: 11.0pt;\">Hybrid identities<\/span><\/li>\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><span style=\"font-family: Calibri; font-size: 11.0pt;\">Advanced Group access management<\/span><\/li>\n<\/ul>\n<p style=\"margin: 0in; font-family: Calibri; font-size: 11.0pt;\"><span style=\"font-weight: bold;\">P2: advanced features like Identity Protection and Governance<\/span><\/p>\n<h2><\/h2>\n<h2 style=\"margin: 0in; font-family: Calibri; font-size: 14.0pt; color: #2e75b5;\">Custom Domains<\/h2>\n<p style=\"margin: 0in; font-family: Calibri; font-size: 11.0pt;\">You can add your custom domain to Azure AD which will allow you to create users using your domain name.<\/p>\n<p style=\"margin: 0in; font-family: Calibri; font-size: 11.0pt;\">To add the domain you will need to verify you won the own by using a TXT record in your DNS for the domain.<\/p>\n<h2><\/h2>\n<h2 style=\"margin: 0in; font-family: Calibri; font-size: 14.0pt; color: #2e75b5;\">Azure AD Join<\/h2>\n<p style=\"margin: 0in; font-family: Calibri; font-size: 11.0pt;\">Azure AD join is intended for organizations that want to be cloud-first or cloud-only. Any organization can deploy Azure AD joined devices no matter the size or industry. Azure AD join works even in a hybrid environment, enabling access to both cloud and on-premises apps and resources.<\/p>\n<p style=\"margin: 0in; font-family: Calibri; font-size: 11.0pt;\"><span style=\"font-weight: bold;\">Scenarios<\/span><\/p>\n<p style=\"margin: 0in; font-family: Calibri; font-size: 11.0pt;\">While Azure AD join is primarily intended for organizations that do not have an on-premises Windows Server Active Directory infrastructure, you can certainly use it in scenarios where:<\/p>\n<ul style=\"margin-left: .375in; direction: ltr; unicode-bidi: embed; margin-top: 0in; margin-bottom: 0in;\" type=\"disc\">\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><span style=\"font-family: Calibri; font-size: 11.0pt;\">You want to transition to cloud-based infrastructure using Azure AD and MDM like Intune.<\/span><\/li>\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><span style=\"font-family: Calibri; font-size: 11.0pt;\">You can\u2019t use an on-premises domain join, for example, if you need to get mobile devices such as tablets and phones under control.<\/span><\/li>\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><span style=\"font-family: Calibri; font-size: 11.0pt;\">Your users primarily need to access Microsoft 365 or other SaaS apps integrated with Azure AD.<\/span><\/li>\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><span style=\"font-family: Calibri; font-size: 11.0pt;\">You want to manage a group of users in Azure AD instead of in Active Directory. This scenario can apply, for example, to seasonal workers, contractors, or students.<\/span><\/li>\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><span style=\"font-family: Calibri; font-size: 11.0pt;\">You want to provide joining capabilities to workers in remote branch offices with limited on-premises infrastructure.<\/span><\/li>\n<\/ul>\n<p style=\"margin: 0in; font-family: Calibri; font-size: 11.0pt;\">You can configure Azure AD joined devices for all Windows 10 devices with the exception of Windows 10 Home.<\/p>\n<p style=\"margin: 0in; font-family: Calibri; font-size: 11.0pt;\">The goal of Azure AD joined devices is to simplify:<\/p>\n<ul style=\"margin-left: .375in; direction: ltr; unicode-bidi: embed; margin-top: 0in; margin-bottom: 0in;\" type=\"disc\">\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><span style=\"font-family: Calibri; font-size: 11.0pt;\">Windows deployments of work-owned devices<\/span><\/li>\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><span style=\"font-family: Calibri; font-size: 11.0pt;\">Access to organizational apps and resources from any Windows device<\/span><\/li>\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><span style=\"font-family: Calibri; font-size: 11.0pt;\">Cloud-based management of work-owned devices<\/span><\/li>\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><span style=\"font-family: Calibri; font-size: 11.0pt;\">Users to sign in to their devices with their Azure AD or synced Active Directory work or school accounts.<\/span><\/li>\n<\/ul>\n<h1><\/h1>\n<h1 style=\"margin: 0in; font-family: Calibri; font-size: 16.0pt; color: #1e4e79;\">Azure AD Identity Protection<\/h1>\n<p style=\"margin: 0in; font-family: Calibri; font-size: 11.0pt;\">You need Azure P2 level for these features.<\/p>\n<p style=\"margin: 0in; font-family: Calibri; font-size: 11.0pt;\">Identity Protection uses advanced machine learning algorithms to monitor accounts and alert you of potential risks. This includes things like:<\/p>\n<ul style=\"margin-left: .375in; direction: ltr; unicode-bidi: embed; margin-top: 0in; margin-bottom: 0in;\" type=\"disc\">\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><span style=\"font-family: Calibri; font-size: 11.0pt;\">Suspicious logins<\/span><\/li>\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><span style=\"font-family: Calibri; font-size: 11.0pt;\">Unorthodox use of accounts (eg: someone signing in from a different geographical level)<\/span><\/li>\n<\/ul>\n<p style=\"margin: 0in; font-family: Calibri; font-size: 11.0pt;\">You set policies to perform actions if a risky event occurs. This can do things like block logins, require password resets etc\u2026<\/p>\n<h2><\/h2>\n<h2 style=\"margin: 0in; font-family: Calibri; font-size: 14.0pt; color: #2e75b5;\">Identity Protection Service<\/h2>\n<p style=\"margin: 0in; font-family: Calibri; font-size: 11.0pt;\">You need to turn on this service for your account. You can then go this service and see the dashboard where it will show you:<\/p>\n<ul style=\"margin-left: .375in; direction: ltr; unicode-bidi: embed; margin-top: 0in; margin-bottom: 0in;\" type=\"disc\">\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><span style=\"font-family: Calibri; font-size: 11.0pt;\">Users flagged for risk<\/span><\/li>\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><span style=\"font-family: Calibri; font-size: 11.0pt;\">Risk events<\/span><\/li>\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><span style=\"font-family: Calibri; font-size: 11.0pt;\">Vulnerabilities<\/span><\/li>\n<\/ul>\n<h3 style=\"margin: 0in; font-family: Calibri; font-size: 12.0pt; color: #5b9bd5;\">Configuration<\/h3>\n<p style=\"margin: 0in; font-family: Calibri; font-size: 11.0pt;\">This is where you can set the policies. Options for policies:<\/p>\n<ul style=\"margin-left: .375in; direction: ltr; unicode-bidi: embed; margin-top: 0in; margin-bottom: 0in;\" type=\"disc\">\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><span style=\"font-family: Calibri; font-size: 11.0pt;\">Users: all users or just select users<\/span><\/li>\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><span style=\"font-family: Calibri; font-size: 11.0pt;\">Conditions: set a high, medium or low risk level<\/span><\/li>\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><span style=\"font-family: Calibri; font-size: 11.0pt;\">Access: Block, Allow, or require MFA in the case of a security event<\/span><\/li>\n<\/ul>\n<h1><\/h1>\n<h1 style=\"margin: 0in; font-family: Calibri; font-size: 16.0pt; color: #1e4e79;\">Conditional Access<\/h1>\n<p style=\"margin: 0in; font-family: Calibri; font-size: 11.0pt;\">This is also a P2 only feature. You can find this under &#8220;Security -&gt; Conditional Access&#8221;<\/p>\n<h2><\/h2>\n<h2 style=\"margin: 0in; font-family: Calibri; font-size: 14.0pt; color: #2e75b5;\">Conditional Access Policies<\/h2>\n<p style=\"margin: 0in; font-family: Calibri; font-size: 11.0pt;\">By default there is a policy for admins to require MFA.<\/p>\n<h3 style=\"margin: 0in; font-family: Calibri; font-size: 12.0pt; color: #5b9bd5;\">Creating a new Policy<\/h3>\n<p style=\"margin: 0in; font-family: Calibri; font-size: 11.0pt;\">The following is how you would setup a policy to lock users out of cloud apps<\/p>\n<ul style=\"margin-left: .375in; direction: ltr; unicode-bidi: embed; margin-top: 0in; margin-bottom: 0in;\" type=\"disc\">\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><span style=\"font-family: Calibri; font-size: 11.0pt;\">Users: select the users it will effect<\/span><\/li>\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><span style=\"font-family: Calibri; font-size: 11.0pt;\">Cloud apps: select certain apps or all<\/span><\/li>\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><span style=\"font-family: Calibri; font-size: 11.0pt;\">Conditions:<br \/>\n&#8211; Sign in risk (likelihood the sign in is coming from someone other than the user)<br \/>\n&#8211; Device platform (EG: if they login on a phone)<br \/>\n&#8211; Location (any location, a trusted location etc\u2026)<br \/>\n&#8211; Client apps (Browser or mobile apps)<br \/>\n&#8211; Device State (are they part of the hybrid network?)<\/span><\/li>\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><span style=\"font-family: Calibri; font-size: 11.0pt;\">Access Controls:<br \/>\n&#8211; Block or Grant access<br \/>\n&#8211; make them use MFA or use a compliant device<br \/>\n&#8211; Session controls: limited experiences within a cloud app<br \/>\n<\/span><\/li>\n<\/ul>\n<h1><\/h1>\n<h1 style=\"margin: 0in; font-family: Calibri; font-size: 16.0pt; color: #1e4e79;\">Access Reviews<\/h1>\n<p style=\"margin: 0in; font-family: Calibri; font-size: 11.0pt;\"><a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/active-directory\/governance\/access-reviews-overview\">https:\/\/docs.microsoft.com\/en-us\/azure\/active-directory\/governance\/access-reviews-overview<\/a><\/p>\n<p style=\"margin: 0in; font-family: Calibri; font-size: 11.0pt;\">Azure Active Directory (Azure AD) access reviews enable organizations to efficiently manage group memberships, access to enterprise applications, and role assignments. User&#8217;s access can be reviewed on a regular basis to make sure only the right people have continued access.<\/p>\n<p style=\"margin: 0in; font-family: Calibri; font-size: 11.0pt;\">Access Reviews is a service within Azure Portal. You need Azure P2 or E5 to access this.<\/p>\n<p style=\"margin: 0in; font-family: Calibri; font-size: 11.0pt;\">There is an onboarding process to set this up.<\/p>\n<h2><\/h2>\n<h2 style=\"margin: 0in; font-family: Calibri; font-size: 14.0pt; color: #2e75b5;\">Creating Reviews<\/h2>\n<p style=\"margin: 0in; font-family: Calibri; font-size: 11.0pt;\">The options for setting Group Reviews:<\/p>\n<ul style=\"margin-left: .375in; direction: ltr; unicode-bidi: embed; margin-top: 0in; margin-bottom: 0in;\" type=\"disc\">\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><span style=\"font-family: Calibri; font-size: 11.0pt;\">Start date<\/span><\/li>\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><span style=\"font-family: Calibri; font-size: 11.0pt;\">Frequency to run<\/span><\/li>\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><span style=\"font-family: Calibri; font-size: 11.0pt;\">End date<\/span><\/li>\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><span style=\"font-family: Calibri; font-size: 11.0pt;\">Users\/Group to review<\/span><\/li>\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><span style=\"font-family: Calibri; font-size: 11.0pt;\">Completion settings: upon completion (depending on the results) you can set it to auto remove access or approve it, or manually do it<\/span><\/li>\n<\/ul>\n<h1 style=\"margin: 0in; font-family: Calibri; font-size: 16.0pt; color: #1e4e79;\"><\/h1>\n<h1><\/h1>\n<h1 style=\"margin: 0in; font-family: Calibri; font-size: 16.0pt; color: #1e4e79;\">Managing Multiple Directories<\/h1>\n<h2 style=\"margin: 0in; font-family: Calibri; font-size: 14.0pt; color: #2e75b5;\">Switching Directories<\/h2>\n<p style=\"margin: 0in; font-family: Calibri; font-size: 11.0pt;\">By clicking on your name in the top right corner of the portal, you can switch directory. You can also select which directory should be the default.<\/p>\n<h1><\/h1>\n<h1 style=\"margin: 0in; font-family: Calibri; font-size: 16.0pt; color: #1e4e79;\">Administrative Units<\/h1>\n<p style=\"margin: 0in; font-family: Calibri; font-size: 11.0pt;\">This is a premium feature. This is similar to OU&#8217;s in AD on premise.<\/p>\n<p style=\"margin: 0in; font-family: Calibri; font-size: 11.0pt;\"><a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/active-directory\/roles\/administrative-units\">https:\/\/docs.microsoft.com\/en-us\/azure\/active-directory\/roles\/administrative-units<\/a><\/p>\n<p style=\"margin: 0in; font-family: Calibri; font-size: 11.0pt;\">An administrative unit is an Azure AD resource that can be a container for other Azure AD resources. An administrative unit can contain only users and groups.<\/p>\n<p style=\"margin: 0in; font-family: Calibri; font-size: 11.0pt;\">Administrative units restrict permissions in a role to any portion of your organization that you define. You could, for example, use administrative units to delegate the Helpdesk Administrator role to regional support specialists, so they can manage users only in the region that they support.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>What is Azure AD? Azure Active Directory (Azure AD) is Microsoft\u2019s enterprise cloud-based identity and access management (IAM) solution. Azure AD is the backbone of the Office 365 system, and it can sync with on-premise Active Directory and provide authentication to other cloud-based systems via OAuth. https:\/\/www.varonis.com\/blog\/azure-active-directory\/#:~:text=Azure%20Active%20Directory%20(Azure%20AD,cloud%2Dbased%20systems%20via%20OAuth. Azure AD &#8211; Free Vs Premium Free: You [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[13,3],"tags":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.spktechfit.com\/index.php?rest_route=\/wp\/v2\/posts\/600"}],"collection":[{"href":"https:\/\/www.spktechfit.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.spktechfit.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.spktechfit.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.spktechfit.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=600"}],"version-history":[{"count":6,"href":"https:\/\/www.spktechfit.com\/index.php?rest_route=\/wp\/v2\/posts\/600\/revisions"}],"predecessor-version":[{"id":606,"href":"https:\/\/www.spktechfit.com\/index.php?rest_route=\/wp\/v2\/posts\/600\/revisions\/606"}],"wp:attachment":[{"href":"https:\/\/www.spktechfit.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=600"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.spktechfit.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=600"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.spktechfit.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=600"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}