πŸ“‹ Microsoft Entra Documentation Changes

Daily summary for changes since November 30th 2025, 7:24 PM PST

Report generated on December 1st 2025, 7:24 PM PST

πŸ“Š Summary

35
Total Commits
3
New Files
20
Modified Files
4
Deleted Files
11
Contributors

πŸ†• New Documentation Files

+83 lines added
Commit: add-back-add-notes
+71 lines added
Commit: add-back-add-notes
+64 lines added
Commit: add-back-add-notes

πŸ“ Modified Documentation Files

Modified by shlipsey3 on Dec 1, 2025 6:05 PM
πŸ“– View on learn.microsoft.com
+30 / -3 lines changed
Commit: add-back-add-notes
Changes:
Before
After
author: shlipsey3
ms.author: sarahlipsey
manager: pmwongera
ms.date: 09/22/2025
ms.update-cycle: 180-days
ms.topic: overview
ms.service: entra
 
| Attribute | Description |
|---------------------|------------ |
| Identity | A unique agent identity is created when the agent is turned on. Learn more about [agent identities]().<br><br>The agent uses this identity to scan your tenant for active access reviews, gather additional insights, and save its recommendations and justifications for the reviewer. For more information, see: [How it works](access-review-agent.md#how-it-works).<br><br>Final decisions, submitted through the Microsoft Teams conversation, use the reviewer's identity. |
| Licenses | [Microsoft Entra ID Governance or Microsoft Entra Suite](../id-governance/licensing-fundamentals.md) |
| Permissions | Get details for access reviews<br>Read details and lifecycle workflow history for users, groups, apps, and access packages. Save access review recommendations and justifications |
| Plugins | [Microsoft Entra](/entra/fundamentals/copilot-security-entra) |
| Role-based access | Both [Identity Governance Administrator](../identity/role-based-access-control/permissions-reference.md#security-administrator) and [Lifecycle Workflows Administrator](../identity/role-based-access-control/permissions-reference.md#security-administrator) are required to configure and use the agent |
| Trigger | Runs every 24 hours or triggered manually |
 
### Conditional Access Optimization Agent
 
The [Conditional Access Optimization Agent](./conditional-access-agent-optimization.md) ensures comprehensive user protection by analyzing your Conditional Access policies and recommending improvements. The agent evaluates your current policy configuration against Microsoft best practices and Zero Trust principles.
author: shlipsey3
ms.author: sarahlipsey
manager: pmwongera
ms.date: 12/01/2025
ms.update-cycle: 180-days
ms.topic: overview
ms.service: entra
 
| Attribute | Description |
|---------------------|------------ |
| Identity | Uses [Microsoft Entra Agent ID](../agent-id/identity-professional/authorization-agent-id.md) for authorization. A unique agent identity is created when the agent is turned on. Learn more about [agent identities]().<br><br>The agent uses this identity to scan your tenant for active access reviews, gather additional insights, and save its recommendations and justifications for the reviewer. For more information, see: [How it works](access-review-agent.md#how-it-works).<br><br>Final decisions, submitted through the Microsoft Teams conversation, use the reviewer's identity. |
| Licenses | [Microsoft Entra ID Governance or Microsoft Entra Suite](../id-governance/licensing-fundamentals.md) |
| Permissions | Get details for access reviews<br>Read details and lifecycle workflow history for users, groups, apps, and access packages. Save access review recommendations and justifications |
| Plugins | [Microsoft Entra](/entra/fundamentals/copilot-security-entra) |
| Role-based access | Both [Identity Governance Administrator](../identity/role-based-access-control/permissions-reference.md#security-administrator) and [Lifecycle Workflows Administrator](../identity/role-based-access-control/permissions-reference.md#security-administrator) are required to configure and use the agent |
| Trigger | Runs every 24 hours or triggered manually |
 
### Application Lifecycle Management Agent (Preview)
 
Identify, onboard, and monitor applications in your environment with the Application Lifecycle Management Agent. This agent uses application discovery capabilities of Microsoft Entra Internet Access and Microsoft Entra Private Access to find unmanaged applications, recommend onboarding actions, and monitor application security posture over time. This agent is currently being deployed and might not be available in all tenants.
+15 / -8 lines changed
Commit: update Graph references
Changes:
Before
After
1. Select **Create**.
 
 
## Get Access Review Object and Instance ID
 
After creating the catalog access review, but before uploading your custom data, you must get both the Access Review object ID, and the Access Review instance object ID. To get this information, you'd do the following:
## Applying stage
 
 
In the **Applying** stage, you manually get a list of denied users by making the following API call:
 
``` http
GET /identityGovernance/accessReviews/definitions/{access review object ID}/instances/{access review instance object ID}/decisions?$filter=(decision eq β€˜Deny’ and resourceId eq β€˜<custom data provided resource ID>’)
```
 
For each decision item:
 
Remove access from your own system and Patch each decision item to indicate success or failure for removal by making the following API call:
 
``` http
1. Select **Create**.
 
 
You can also create an access review programmatically using Microsoft Graph. For more information, see [Create a single stage access review on a catalog](graph/api/accessreviewset-post-definitions?view=graph-rest-beta&tabs=http#example-6-create-a-single-stage-access-review-on-a-catalog).
 
## Get Access Review Object and Instance ID
 
After creating the catalog access review, but before uploading your custom data, you must get both the Access Review object ID, and the Access Review instance object ID. To get this information, you'd do the following:
## Applying stage
 
 
In the **Applying** stage, you can get a list of denied users by making the [list decisions](/graph/api/accessreviewinstance-list-decisions?view=graph-rest-beta&tabs=http) API call:
 
``` http
GET https://graph.microsoft.com/beta/identityGovernance/accessReviews/definitions/{access review object ID}/instances/{access review instance object ID}/decisions?$filter=(decision eq 'Deny' and resourceId eq '<custom data provided resource ID>')
```
 
For each decision item:
 
Remove access from your own system and then patch each decision item to indicate success or failure for removal by making the [update accessReviewInstanceDecisionItem](/graph/api/accessreviewinstancedecisionitem-update?view=graph-rest-beta&tabs=http) API call:
+13 / -3 lines changed
Commit: add links to inheritance, builder platforms, list of roles
Changes:
Before
After
 
## Agent identities basics
 
[Microsoft Entra Agent ID](../agent-id/identity-platform/what-is-agent-id.md) includes four new types of object: agent identity blueprint, agent identity blueprint principal, agent identity, and agent user. The agent identity, and optionally the agent user, allows AI agents to take on digital identities within Microsoft Entra. Once a digital identity is established, these agent identities are able to be governed using lifecycle and access features. Sponsors can be assigned to agent identities after creation. Sponsors of agent identities are human users accountable for making decisions about its lifecycle and access. For more information about the role of a sponsor of agent identities, see: [Administrative relationships for agent IDs](../agent-id/identity-platform/agent-owners-sponsors-managers.md).
 
## Assigning access to agent identities
 
Agent identities can have resources assigned to them directly via access packages. Resource assignments allow agent identities to request an access package for themselves, or have their owner or sponsor request one on their behalf. With access packages, you're able to assign agent identities the following resources:
 
- Security Groups
- [Application roles and API permissions](../identity/enterprise-apps/assign-agent-identities-to-applications.md), including Graph permissions
- Microsoft Entra roles
 
To use access packages for agent identities, configure an access package with the required policy settings. When creating an access package assignment policy, in the **Who can get access** section, select **For users, service principals, and agent identities in your directory**, and then select the option of **All agents (preview)**.
 
> [!NOTE]
> If your agents aren't using Microsoft Entra agent IDs, then also create an access package assignment policy with the option **All Service principals (preview)** to allow service principals in your directory to be able to request this access package.
 
For a guide on creating an access package, see: [Create an access package in entitlement management](entitlement-management-access-package-create.md). For a guide on assigning identities to an existing access package, see: [View, add, and remove assignments for an access package in entitlement management](entitlement-management-access-package-assignments.md).
 
 
## Agent identities basics
 
[Microsoft Entra Agent ID](../agent-id/identity-platform/what-is-agent-id.md) includes four new types of object: agent identity blueprint, agent identity blueprint principal, agent identity, and agent user. These can be created in [Microsoft Foundry](/azure/ai-foundry/agents/concepts/agent-identity), [Microsoft Copilot Studio](/microsoft-copilot-studio/admin-use-entra-agent-identities), or other platforms. The agent identity, and optionally the agent user, allows AI agents to take on digital identities within Microsoft Entra. Once a digital identity is established, these agent identities are able to be governed using lifecycle and access features. Sponsors can be assigned to agent identities after creation. Sponsors of agent identities are human users accountable for making decisions about its lifecycle and access. For more information about the role of a sponsor of agent identities, see: [Administrative relationships for agent IDs](../agent-id/identity-platform/agent-owners-sponsors-managers.md).
 
## Assigning access to agent identities
 
When created, agent identities have limited permissions, such as OAuth 2 delegated permission scopes [inherited from their parent agent identity blueprint](../agent-id/identity-professional/configure-inheritable-permissions-blueprints.md). In addition, agent identities can have resources assigned to them directly via access packages. Resource assignments allow agent identities to request an access package for themselves, or have their owner or sponsor request one on their behalf. With access packages, you're able to assign agent identities the following resources:
 
- Security Groups
- [Application roles and API permissions](../identity/enterprise-apps/assign-agent-identities-to-applications.md), including Graph permissions
- [Microsoft Entra roles](../agent-id/identity-professional/authorization-agent-id.md#role-assignments-for-agent-identities)
 
To use access packages for agent identities, configure an access package with the required policy settings. When creating an access package assignment policy, in the **Who can get access** section, select **For users, service principals, and agent identities in your directory**, and then select the option of **All agents (preview)**.
 
> [!NOTE]
> If your agents aren't using Microsoft Entra agent IDs, then also create an access package assignment policy with the option **All Service principals (preview)** to allow service principals in your directory to be able to request this access package.
 
Agents can then be assigned access packages through three different request pathways.
 
+10 / -1 lines changed
Commit: add links to AR BYO to app integration articles
Changes:
Before
After
 
# Govern an application's existing users - Microsoft PowerShell
 
There are three common scenarios in which it's necessary to populate Microsoft Entra ID with existing users of an application before you use the application with a Microsoft Entra ID Governance feature such as [access reviews](access-reviews-application-preparation.md).
 
## License requirements
[!INCLUDE [active-directory-entra-governance-license.md](~/includes/entra-entra-governance-license.md)]
 
That scenario of an application which does not support provisioning protocols, is covered in a separate article, [Govern the existing users of an application that does not support provisioning](identity-governance-applications-not-provisioned-users.md).
 
## Terminology
 
This article illustrates the process for managing application role assignments by using the [Microsoft Graph PowerShell cmdlets](https://www.powershellgallery.com/packages/Microsoft.Graph). It uses the following Microsoft Graph terminology.
 
 
 
 
 
 
 
 
# Govern an application's existing users - Microsoft PowerShell
 
There are four common scenarios in which it's necessary to populate Microsoft Entra ID with existing access rights and users of an application before you use the application with a Microsoft Entra ID Governance feature such as [access reviews](access-reviews-application-preparation.md).
 
## License requirements
[!INCLUDE [active-directory-entra-governance-license.md](~/includes/entra-entra-governance-license.md)]
 
That scenario of an application which does not support provisioning protocols, is covered in a separate article, [Govern the existing users of an application that does not support provisioning](identity-governance-applications-not-provisioned-users.md).
 
### Application uses Microsoft Entra ID as its identity provider and has additional access rights for users
 
Using custom data provided resources, you can include access rights from applications in Microsoft Entra ID access reviews by uploading their access data directly into a catalog.
 
You can then run user Access Reviews (UARs) across both Microsoft Entra-connected resources and those access rights. Reviewers can easily review and certify users’ access in the My Access portal, helping ensure consistent governance, improved visibility, and compliance across all resources whether or not they’re connected to Microsoft Entra.
 
This scenario is covered in a separate article, [include custom data provided resource in the catalog for catalog user Access Reviews (Preview)](custom-data-resource-access-reviews.md).
 
 
## Terminology
+9 / -0 lines changed
Commit: Document Global Secure Access Government Cloud limitations
Changes:
Before
After
## B2B guest access (preview) limitations
<a name="b2b-guest-access-limitations"></a>
- The Global Secure Access client doesn't support multi-session Azure Virtual Desktop.
 
 
 
 
 
 
 
 
 
## B2B guest access (preview) limitations
<a name="b2b-guest-access-limitations"></a>
- The Global Secure Access client doesn't support multi-session Azure Virtual Desktop.
 
## Global Secure Access In Government Cloud limitations
Global Secure Access is not available in the US Government community cloud High (GCC-H), Department of Defense cloud and other Govt/Sovereign cloud environments.
 
For usage in US Government community (GCC) cloud, known limitations/disclaimers include:
 
- Non Federal Information Processing Standard (FIPS) 140-2 certified: Note that while the GSA service is FedRAMP High accredited, it is not yet FIPS 140-2 certified. Microsoft is actively working toward achieving FIPS accreditation/certification, and this process is currently underway. Customers should consider this status when evaluating compliance requirements. FIPS 140-2 is a US government standard that defines FedRAMP minimum security requirements for cryptographic modules in products and systems. For more information, see [Federal Information Processisng Standard (FIPS) 140](https://learn.microsoft.com/azure/compliance/offerings/offering-fips-140-2).
- Data Residency Requirements: Customers should carefully consider data residency requirements when evaluating the GSA solution for their needs. When using GSA, there is a possibility that your data (up to and including customer content) may be Transport Layer Security (TLS) terminated and processed outside the United States esp. in cases where the users access GSA while traveling outside of the USA and its territories. Additionally, data may also be TLS terminated and processed outside of the USA when GSA routes traffic through the nearest available edge location, which may be outside U.S. borders depending on several factors. Factors for TLS termination and processing outside the US may include but not limited to: user’s physical location, proximity to edge locations, network latency, service availability, performance considerations, customer configurations and so on. As an example, a user near a US border with a non-US country may connect to a non-U.S. edge, where data inspection and policy enforcement take place.
 
+6 / -3 lines changed
Commit: preview-notes
Changes:
Before
After
ms.service: entra-id-protection
 
ms.topic: concept-article
ms.date: 11/07/2025
 
author: shlipsey3
ms.author: sarahlipsey
manager: pmwongera
ms.reviewer: chuqiaoshi
---
# Identity Risk Management Agent
 
IT administrators and security analysts face mounting pressure to identify and respond to threats quickly while managing increasingly complex environments. They're often overwhelmed by the sheer volume of alerts, struggle to prioritize which risks need immediate attention, and find it difficult to connect scattered data points across their organization's systems. The Identity Risk Management Agent with Security Copilot in Microsoft Entra helps these professionals investigate potential risks, understand their effect, and take decisive action to protect their organization's critical assets.
 
## Prerequisites
 
 
 
 
ms.service: entra-id-protection
 
ms.topic: concept-article
ms.date: 12/01/2025
 
author: shlipsey3
ms.author: sarahlipsey
manager: pmwongera
ms.reviewer: chuqiaoshi
---
# Identity Risk Management Agent (Preview)
 
IT administrators and security analysts face mounting pressure to identify and respond to threats quickly while managing increasingly complex environments. They're often overwhelmed by the sheer volume of alerts, struggle to prioritize which risks need immediate attention, and find it difficult to connect scattered data points across their organization's systems. The Identity Risk Management Agent with Security Copilot in Microsoft Entra helps these professionals investigate potential risks, understand their effect, and take decisive action to protect their organization's critical assets.
 
> [!NOTE]
> The Identity Risk Management Agent is currently being deployed and in preview. This information relates to a prerelease product that might be substantially modified before it's released. Microsoft makes no warranties, expressed or implied, with respect to the information provided here.
 
## Prerequisites
 
Modified by Mark Wahl on Dec 1, 2025 5:14 PM
πŸ“– View on learn.microsoft.com
+7 / -1 lines changed
Commit: add links to AR agent article from AR overview articles
Changes:
Before
After
| [Self-review your access](../id-governance/privileged-identity-management/pim-perform-roles-and-resource-roles-review.md?toc=/azure/active-directory/governance/toc.json)| If you're assigned to an administrative role, approve or deny access to your role. |
| [Complete an access review](../id-governance/privileged-identity-management/pim-complete-roles-and-resource-roles-review.md?toc=/azure/active-directory/governance/toc.json)| View an access review and apply the results. |
 
## Use the Access Reviews API
 
To interact with and manage reviewable resources, see [Microsoft Graph API methods](/graph/api/resources/accessreviewsv2-overview) and [role and application permission authorization checks](/graph/api/resources/accessreviewsv2-overview). The access reviews methods in the Microsoft Graph API are available for both application and user contexts. When you run scripts in the application context, the account used to run the API (the service principle) must be granted the AccessReview.Read.All permission to query access reviews information.
| | Apply decision |
| Date range| Seven days |
 
For more advanced queries and analysis of access reviews, and to track changes and completion of reviews, export your Microsoft Entra audit logs to [Azure Monitor Log Analytics](../identity/monitoring-health/howto-archive-logs-to-storage-account.md) or Azure Event Hubs. When audit logs are stored in Log Analytics, you can use the [powerful analytics language](../identity/monitoring-health/howto-analyze-activity-logs-log-analytics.md) and build your own dashboards. For more information, see [Archive logs and reporting on entitlement management in Azure Monitor](entitlement-management-logs-and-reporting.md).
 
## Next steps
 
 
 
 
 
 
 
| [Self-review your access](../id-governance/privileged-identity-management/pim-perform-roles-and-resource-roles-review.md?toc=/azure/active-directory/governance/toc.json)| If you're assigned to an administrative role, approve or deny access to your role. |
| [Complete an access review](../id-governance/privileged-identity-management/pim-complete-roles-and-resource-roles-review.md?toc=/azure/active-directory/governance/toc.json)| View an access review and apply the results. |
 
## Access Review Agent (Preview)
 
The Access Review Agent works for your reviewers by automatically gathering insights and generating recommendations. It then guides reviewers through the review process in Microsoft Teams with natural language, with simple summaries and proposed decisions, so they can make the final call with confidence and clarity. For more information, see [Access Review Agent](../security-copilot/access-review-agent.md).
 
## Use the Access Reviews API
 
To interact with and manage reviewable resources, see [Microsoft Graph API methods](/graph/api/resources/accessreviewsv2-overview) and [role and application permission authorization checks](/graph/api/resources/accessreviewsv2-overview). The access reviews methods in the Microsoft Graph API are available for both application and user contexts. When you run scripts in the application context, the account used to run the API (the service principle) must be granted the AccessReview.Read.All permission to query access reviews information.
| | Apply decision |
| Date range| Seven days |
 
You can also use Microsoft Security Copilot to query current and recent access reviews. For more information, see [validate access through access reviews](../security-copilot/entra-governance-optimization.md#validate-access-through-access-reviews).
 
For more advanced queries and analysis of access reviews, and to track changes and completion of reviews over time, export your Microsoft Entra audit logs to [Azure Monitor Log Analytics](../identity/monitoring-health/howto-archive-logs-to-storage-account.md) or Azure Event Hubs. When audit logs are stored in Log Analytics, you can use the [powerful analytics language](../identity/monitoring-health/howto-analyze-activity-logs-log-analytics.md) and build your own dashboards. For more information, see [Archive logs and reporting on entitlement management in Azure Monitor](entitlement-management-logs-and-reporting.md).
 
## Next steps
 
Modified by Mark Wahl on Dec 1, 2025 5:36 PM
πŸ“– View on learn.microsoft.com
+5 / -2 lines changed
Commit: expand
Changes:
Before
After
The Access Review Agent assists you in completing your pending access reviews by guiding you in Microsoft Teams with natural language, insights, and recommendations.
 
### Go directly to the Access Review Agent
1. Select the [Access Review Agent](https://teams.microsoft.com/l/app/b99caf01-1dd7-43cf-981a-0de444e783f3) link to open the agent
1. Select **Add** or **Open** to access the conversation with the Access Review Agent
1. Prompt the agent with **Help me with my access reviews** and the agent will assist you in completing your pending access reviews.
 
### Use email to go to the Access Review Agent
 
 
 
The Access Review Agent assists you in completing your pending access reviews by guiding you in Microsoft Teams with natural language, insights, and recommendations.
 
### Go directly to the Access Review Agent
 
If you are in the middle of reviews, you can go directly to the Access Review agent in Microsoft Teams.
 
1. Select the [Access Review Agent](https://teams.microsoft.com/l/app/b99caf01-1dd7-43cf-981a-0de444e783f3) link to open the agent.
1. Select **Add** or **Open** to access the conversation with the Access Review Agent.
1. Prompt the agent with **Help me with my access reviews** and the agent will assist you in completing your pending access reviews.
 
### Use email to go to the Access Review Agent
+3 / -3 lines changed
Commit: acrolinx
Changes:
Before
After
 
For more information on those first two scenarios, where the application supports provisioning, or uses an LDAP directory, SQL database, has a SOAP or REST API or relies upon Microsoft Entra ID as its identity provider, see the article [govern an application's existing users](identity-governance-applications-existing-users.md). That article covers how to use identity governance features for existing users of those categories of applications.
 
This article covers the third scenario. For some legacy applications it might not be feasible to remove other identity providers or local credential authentication from the application, or enable support for provisioning protocols for those applications. For those applications, if you want to use Microsoft Entra ID to review who has access to that application, or remove someone's access from that application, you'll need to create assignments in Microsoft Entra ID that represent application users. This article covers that scenario of an application that does not use Microsoft Entra ID as its identity provider and does not support provisioning.
 
For more information on the fourth scenario, see [include custom data provided resource in the catalog for catalog user Access Reviews (Preview)](custom-data-resource-access-reviews.md).
 
 
If your application has an LDAP directory or SQL database, then see [Collect existing users from an application](identity-governance-applications-existing-users.md#collect-existing-users-from-an-application) for recommendations on how to extract the user collection.
 
Otherwise, if the application does not have a directory or database, you will need to contact the owner of the application and have them supply a list of users. This could be in a format such as a CSV file, with one line per user. Ensure that one field of each user in the file contains a unique identifier, such as an email address, that is also present on users in Microsoft Entra ID.
 
If this system doesn't have the Microsoft Graph PowerShell cmdlets installed or doesn't have connectivity to Microsoft Entra ID, transfer the CSV file that contains the list of users to a system that has the [Microsoft Graph PowerShell cmdlets](https://www.powershellgallery.com/packages/Microsoft.Graph) installed.
 
 
## Configure entitlement management integration with ServiceNow for ticketing (optional)
 
If you have ServiceNow then you can optionally configure automated ServiceNow ticket creation, using the [entitlement management integration](entitlement-management-ticketed-provisioning.md) via Logic Apps. In that scenario, entitlement management can automatically create ServiceNow tickets for manual provisioning of users who have received access package assignments.
 
## Next steps
 
For more information on those first two scenarios, where the application supports provisioning, or uses an LDAP directory, SQL database, has a SOAP or REST API or relies upon Microsoft Entra ID as its identity provider, see the article [govern an application's existing users](identity-governance-applications-existing-users.md). That article covers how to use identity governance features for existing users of those categories of applications.
 
This article covers the third scenario. For some legacy applications, it might not be feasible to remove other identity providers or local credential authentication from the application, or enable support for provisioning protocols for those applications. For those applications, if you want to use Microsoft Entra ID to review who has access to that application, or remove someone's access from that application, you'll need to create assignments in Microsoft Entra ID that represent application users. This article covers that scenario of an application that does not use Microsoft Entra ID as its identity provider and does not support provisioning.
 
For more information on the fourth scenario, see [include custom data provided resource in the catalog for catalog user Access Reviews (Preview)](custom-data-resource-access-reviews.md).
 
 
If your application has an LDAP directory or SQL database, then see [Collect existing users from an application](identity-governance-applications-existing-users.md#collect-existing-users-from-an-application) for recommendations on how to extract the user collection.
 
Otherwise, if the application does not have a directory or database, you will need to contact the owner of the application and have them supply a list of users. This could be in a format such as a CSV file, with one line per user. Ensure that one field of each user in the file contains a unique identifier, such as an email address, that is also present on users in Microsoft Entra ID.
 
If this system doesn't have the Microsoft Graph PowerShell cmdlets installed or doesn't have connectivity to Microsoft Entra ID, transfer the CSV file that contains the list of users to a system that has the [Microsoft Graph PowerShell cmdlets](https://www.powershellgallery.com/packages/Microsoft.Graph) installed.
 
 
## Configure entitlement management integration with ServiceNow for ticketing (optional)
 
If you have ServiceNow, then you can optionally configure automated ServiceNow ticket creation, using the [entitlement management integration](entitlement-management-ticketed-provisioning.md) via Logic Apps. In that scenario, entitlement management can automatically create ServiceNow tickets for manual provisioning of users who have received access package assignments.
 
## Next steps
Modified by shlipsey3 on Dec 1, 2025 6:05 PM
πŸ“– View on learn.microsoft.com
+4 / -1 lines changed
Commit: add-back-add-notes
Changes:
Before
After
 
Knowing which users are at risk and *why* they're at risk is a key responsibility of security and identity administrators. The Risky user report in Microsoft Entra ID Protection provides the full report, along with a risk data summary, and an activity timeline.
 
This article provides an overview of the information and actions available in the Risky user report.
 
## Prerequisites
- Microsoft Entra ID Free, Microsoft Entra ID P1 for limited data on users.
- Microsoft Entra ID P2 licenses for full access to the risky user data.
- [Security Reader](../identity/role-based-access-control/permissions-reference.md#security-reader) and [Security Operator](../identity/role-based-access-control/permissions-reference.md#security-operator) are the least privileged roles required to use the *standard view* of the report.
- [User Administrator](../identity/role-based-access-control/permissions-reference.md#user-administrator) is required to reset passwords.
 
## Risky user report
 
The standard view of the Risky user report contains three main sections: The summary chart of risky users at each level, new risky users per day, and the full list of risky users.
 
The **Percentage of risky users at each risk level** chart shows a visual representation of your user and their risk levels. This visual summary allows you to quickly see the state of things in your organization. Hover over each segment of the chart to see the percentage of users at each risk level.
 
 
 
 
 
Knowing which users are at risk and *why* they're at risk is a key responsibility of security and identity administrators. The Risky user report in Microsoft Entra ID Protection provides the full report, along with a risk data summary, and an activity timeline.
 
The Risky user report is also integrated with the Identity Risk Management Agent for enhanced agent suggestions and insights. If you have the Identity Risk Management Agent enabled, you can switch between the standard view and the agent view of the report.
 
This article provides an overview of the information and actions available in the Risky user report.
 
## Prerequisites
- Microsoft Entra ID Free, Microsoft Entra ID P1 for limited data on users.
- Microsoft Entra ID P2 licenses for full access to the risky user data.
- [Security Reader](../identity/role-based-access-control/permissions-reference.md#security-reader) and [Security Operator](../identity/role-based-access-control/permissions-reference.md#security-operator) are the least privileged roles required to use the *standard view* of the report.
- [Security Administrator](../identity/role-based-access-control/permissions-reference.md#search-administrator) is required to use the *agent view* of the report and access the Risk Management Agent features.
- [User Administrator](../identity/role-based-access-control/permissions-reference.md#user-administrator) is required to reset passwords.
 
## Risky user report
 
The standard view of the Risky user report contains three main sections: The summary chart of risky users at each level, new risky users per day, and the full list of risky users. If you have the [Identity Risk Management Agent](identity-risk-management-agent-risky-user-report.md) turned on, you can use the **Agent view** to see agent suggestions and insights.
 
The **Percentage of risky users at each risk level** chart shows a visual representation of your user and their risk levels. This visual summary allows you to quickly see the state of things in your organization. Hover over each segment of the chart to see the percentage of users at each risk level.
 
+4 / -1 lines changed
Commit: preview-notes
Changes:
Before
After
---
# Review agent findings
 
The Identity Risk Management Agent in Microsoft Entra ID Protection provides proactive risk management capabilities by analyzing the risky identities and suggesting actions to remediate them. By using a Large Language Model, the agent helps security administrators review and respond to risky activities before they lead to security incidents.
 
## Prerequisites
 
 
 
 
---
# Review agent findings
 
The Identity Risk Management Agent (Preview) in Microsoft Entra ID Protection provides proactive risk management capabilities by analyzing the risky identities and suggesting actions to remediate them. By using a Large Language Model, the agent helps security administrators review and respond to risky activities before they lead to security incidents.
 
> [!NOTE]
> The Identity Risk Management Agent is currently being deployed and in preview. This information relates to a prerelease product that might be substantially modified before it's released. Microsoft makes no warranties, expressed or implied, with respect to the information provided here.
 
## Prerequisites
 
+4 / -1 lines changed
Commit: preview-notes
Changes:
Before
After
ms.reviewer: chuqiaoshi
---
 
# Identity Risk Management Agent settings
 
The Identity Risk Management Agent in Microsoft Entra ID Protection provides proactive risk management capabilities by analyzing user behavior and suggesting actions to mitigate potential identity risks. You can configure the settings to meet your organization's needs, such as how often it runs, and email notifications.
 
## Access the agent settings
 
Once the agent is enabled, you can adjust a few settings. To review and adjust the settings:
 
 
 
ms.reviewer: chuqiaoshi
---
 
# Identity Risk Management Agent (Preview) settings
 
The Identity Risk Management Agent in Microsoft Entra ID Protection provides proactive risk management capabilities by analyzing user behavior and suggesting actions to mitigate potential identity risks. You can configure the settings to meet your organization's needs, such as how often it runs, and email notifications.
 
> [!NOTE]
> The Identity Risk Management Agent is currently being deployed and in preview. This information relates to a prerelease product that might be substantially modified before it's released. Microsoft makes no warranties, expressed or implied, with respect to the information provided here.
 
## Access the agent settings
 
Once the agent is enabled, you can adjust a few settings. To review and adjust the settings:
Modified by Barclay Neira on Dec 1, 2025 9:13 PM
πŸ“– View on learn.microsoft.com
+3 / -1 lines changed
Commit: Update licensing date in documentation
Changes:
Before
After
manager: pmwongera
ms.service: entra
ms.topic: article
ms.date: 06/20/2025
ms.subservice: fundamentals
ms.author: barclayn
---
 
This article discusses licensing options for the Microsoft Entra product family. It's intended for security decision makers, identity and network access administrators, and IT professionals who are considering Microsoft Entra solutions for their organizations.
 
 
## Microsoft Entra licensing options
 
 
 
manager: pmwongera
ms.service: entra
ms.topic: article
ms.date: 12/01/2025
ms.subservice: fundamentals
ms.author: barclayn
---
 
This article discusses licensing options for the Microsoft Entra product family. It's intended for security decision makers, identity and network access administrators, and IT professionals who are considering Microsoft Entra solutions for their organizations.
 
>[!NOTE]
>If you are troubleshooting licensing assignment issues, review [Identify and resolve license assignment problems for a group in the Microsoft 365 Admin Portal](licensing-groups-resolve-problems.md).
 
## Microsoft Entra licensing options
 
Modified by Mark Wahl on Dec 1, 2025 5:14 PM
πŸ“– View on learn.microsoft.com
+4 / -0 lines changed
Commit: add links to AR agent article from AR overview articles
Changes:
Before
After
>[!NOTE]
>Creating a review on inactive users and with [user-to-group affiliation](review-recommendations-access-reviews.md#user-to-group-affiliation) recommendations requires a Microsoft Entra ID Governance license.
 
## Next steps
 
- [Prepare for an access review of users' access to an application](access-reviews-application-preparation.md)
 
 
 
 
>[!NOTE]
>Creating a review on inactive users and with [user-to-group affiliation](review-recommendations-access-reviews.md#user-to-group-affiliation) recommendations requires a Microsoft Entra ID Governance license.
 
## Access Review Agent (Preview)
 
The Access Review Agent works for your reviewers by automatically gathering insights and generating recommendations. It then guides reviewers through the review process in Microsoft Teams with natural language, with simple summaries and proposed decisions, so they can make the final call with confidence and clarity. For more information, see [Access Review Agent](../security-copilot/access-review-agent.md).
 
## Next steps
 
- [Prepare for an access review of users' access to an application](access-reviews-application-preparation.md)
+2 / -2 lines changed
Commit: add links to AR agent article from AR overview articles
Changes:
Before
After
 
Organizations that previously had been using an on-premises identity governance product can [migrate their organizational role model](identity-governance-organizational-roles.md) to Microsoft Entra ID Governance.
 
Furthermore, IT can delegate access management decisions to business decision makers. For example, employees that wish to access confidential customer data in a company's marketing application in Europe could need approval from their manager, a department lead or resource owner, and a security risk officer. [Entitlement management](entitlement-management-overview.md) enables you to define how identities request access across packages of group and team memberships, app roles, and SharePoint Online roles, and enforce separation of duties checks on access requests.
 
Organizations can also control which guest identities have access, including to [on-premises applications](../external-id/hybrid-cloud-to-on-premises.md). These access rights can then be regularly reviewed using recurring [Microsoft Entra access reviews](access-reviews-overview.md) for access recertification.
 
 
## Privileged access lifecycle
 
Organizations that previously had been using an on-premises identity governance product can [migrate their organizational role model](identity-governance-organizational-roles.md) to Microsoft Entra ID Governance.
 
Furthermore, IT can delegate access management decisions to business decision makers. For example, employees that wish to access confidential customer data in a company's marketing application in Europe could need approval from their manager, a department lead or resource owner, and a security risk officer. [Entitlement management](entitlement-management-overview.md) enables you to define how identities request access across packages of group and team memberships, app roles, and SharePoint Online roles, and enforce separation of duties checks on access requests. Access packages can require regular access reviews, and other access rights, such as group memberships, can also be regularly reviewed using recurring [Microsoft Entra access reviews](access-reviews-overview.md) for access recertification. The [Access Review Agent](../security-copilot/access-review-agent.md) helps reviewers by automatically gathering insights and generating recommendations, and guides reviewers through the review process in Microsoft Teams with natural language, with simple summaries and proposed decisions, so they can make the final call with confidence and clarity.
 
Organizations can also control which guest identities have access, including to [on-premises applications](../external-id/hybrid-cloud-to-on-premises.md).
 
 
## Privileged access lifecycle

πŸ—‘οΈ Deleted Documentation Files

DELETED docs/fundamentals/concept-secure-remote-workers.md
Deleted by John Flores on Dec 1, 2025 5:35 PM
πŸ“– Was available at: https://learn.microsoft.com/en-us/entra/fundamentals/concept-secure-remote-workers
-137 lines removed
Commit: [Fundamentals] Securing Microsoft Entra best practices
DELETED docs/id-protection/identity-risk-management-agent-risky-user-report.md
Deleted by shlipsey3 on Dec 1, 2025 5:08 PM
πŸ“– Was available at: https://learn.microsoft.com/en-us/entra/id-protection/identity-risk-management-agent-risky-user-report
-81 lines removed
Commit: agents-120125
DELETED docs/id-protection/identity-risk-management-agent-settings.md
Deleted by shlipsey3 on Dec 1, 2025 5:08 PM
πŸ“– Was available at: https://learn.microsoft.com/en-us/entra/id-protection/identity-risk-management-agent-settings
-69 lines removed
Commit: agents-120125
DELETED docs/id-protection/identity-risk-management-agent-get-started.md
Deleted by shlipsey3 on Dec 1, 2025 5:08 PM
πŸ“– Was available at: https://learn.microsoft.com/en-us/entra/id-protection/identity-risk-management-agent-get-started
-62 lines removed
Commit: agents-120125