Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Permalink
main
Switch branches/tags

Name already in use

A tag already exists with the provided branch name. Many Git commands accept both tag and branch names, so creating this branch may cause unexpected behavior. Are you sure you want to create this branch?
Go to file
 
 
Cannot retrieve contributors at this time
title description services documentationcenter author manager editor ms.service ms.workload ms.tgt_pltfrm ms.topic ms.subservice ms.date ms.author ms.reviewer ms.collection
Complete an access review of groups & applications
Learn how to complete an access review of group members or application access in Microsoft Entra access reviews.
active-directory
amsliu
amycolannino
markwahl-msft
active-directory
identity
na
how-to
compliance
02/18/2022
amsliu
mwahl
M365-identity-device-management

Complete an access review of groups and applications in access reviews

As an administrator, you create an access review of groups or applications and reviewers perform the access review. This article describes how to see the results of the access review and apply them.

[!INCLUDE GDPR-related guidance]

Prerequisites

  • Azure AD Premium P2
  • Global administrator, User administrator, or Identity Governance administrator to manage access of reviews on groups and applications. Global administrators and Privileged Role administrators can manage reviews of role-assignable groups See Use Azure AD groups to manage role assignments
  • Security readers have read access.

For more information, see License requirements.

View the status of an access review

You can track the progress of access reviews as they are completed.

  1. Sign in to the Azure portal and open the Identity Governance page.

  2. In the left menu, click Access reviews.

  3. In the list, click an access review.

    On the Overview page, you can see the progress of the Current instance of the review. If there is not an active instance open at the time, you will see information on the previous instance. No access rights are changed in the directory until the review is completed.

    Review of All company group

    All blades under Current are only viewable during the duration of each review instance.

    [!NOTE] While the Current access review only shows information about the active review instance, you can get information about reviews yet to take place in the Series under the Scheduled review section.

    The Results page provides more information on each user under review in the instance, including the ability to Stop, Reset, and Download results.

    Review guest access across Microsoft 365 groups

    If you are viewing an access review that reviews guest access across Microsoft 365 groups, the Overview blade lists each group in the review.

    review guest access across Microsoft 365 groups

    Click on a group to see the progress of the review on that group, also to Stop, Reset, Apply, and Delete.

    review guest access across Microsoft 365 groups in detail

  4. If you want to stop an access review before it has reached the scheduled end date, click the Stop button.

    When you stop a review, reviewers will no longer be able to give responses. You can't restart a review after it's stopped.

  5. If you're no longer interested in the access review, you can delete it by clicking the Delete button.

View status of multi-stage review (preview)

To see the status and stage of a multi-stage access review:

  1. Select the multi-stage review you want to check the status of or see what stage it's in.

  2. Click Results on the left nav menu under Current.

  3. Once you are on the results page, under Status it will tell you which stage the multi-stage review is in. The next stage of the review won't become active until the duration specified during the access review setup has passed.

  4. If a decision has been made, but the review duration for this stage has not expired yet, you can select Stop current stage button on the results page. This will trigger the next stage of review.

Retrieve the results

To view the results for a review, click the Results page. To view just a user's access, in the Search box, type the display name or user principal name of a user whose access was reviewed.

Retrieve results for an access review

To view the results of a completed instance of an access review that is recurring, click Review history, then select the specific instance from the list of completed access review instances, based on the instance's start and end date. The results of this instance can be obtained from the Results page. Recurring access reviews allow you to have a constant picture of access to resources that may need to be updated more often than one-time access reviews.

To retrieve the results of an access review, both in-progress or completed, click the Download button. The resulting CSV file can be viewed in Excel or in other programs that open UTF-8 encoded CSV files.

Apply the changes

If Auto apply results to resource was enabled based on your selections in Upon completion settings, auto-apply will be executed once a review instance completes, or earlier if you manually stop the review.

If Auto apply results to resource wasn't enabled for the review, navigate to Review History under Series after the review duration ends or the review was stopped early, and click on the instance of the review you’d like to Apply.

Apply access review changes

Click Apply to manually apply the changes. If a user's access was denied in the review, when you click Apply, Azure AD removes their membership or application assignment.

Apply access review changes button

The status of the review will change from Completed through intermediate states such as Applying and finally to state Result applied. You should expect to see denied users, if any, being removed from the group membership or application assignment in a few minutes.

Manually or automatically applying results doesn't have an effect on a group that originates in an on-premises directory. If you want to change a group that originates on-premises, download the results and apply those changes to the representation of the group in that directory.

[!NOTE] Some denied users are unable to have results applied to them. Scenarios where this could happen include:

  • Reviewing members of a synced on-premises Windows AD group: If the group is synced from on-premises Windows AD, the group cannot be managed in Azure AD and therefore membership cannot be changed.
  • Reviewing a resource (role, group, application) with nested groups assigned: For users who have membership through a nested group, we will not remove their membership to the nested group and therefore they will retain access to the resource being reviewed.
  • User not found / other errors can also result in an apply result not being supported.

Actions taken on denied guest users in an access review

On review creation, the creator can choose between two options for denied guest users in an access review.

  • Denied guest users can have their access to the resource removed. This is the default.
  • The denied guest user can be blocked from signing in for 30 days, then deleted from the tenant. During the 30-day period the guest user is able to be restored access to the tenant by an administrator. After the 30-day period is completed, if the guest user has not had access to the resource granted to them again, they will be removed from the tenant permanently. In addition, using the Azure portal, a Global Administrator can explicitly permanently delete a recently deleted user before that time period is reached. Once a user has been permanently deleted, the data about that guest user will be removed from active access reviews. Audit information about deleted users remains in the audit log.

Actions taken on denied B2B direct connect users

Denied B2B direct connect users and teams will lose access to all shared channels in the Team.

Next steps