📋 Microsoft Entra Documentation Changes

Daily summary for changes since January 8th 2026, 7:38 PM PST

Report generated on January 9th 2026, 7:38 PM PST

📊 Summary

18
Total Commits
0
New Files
5
Modified Files
0
Deleted Files
9
Contributors

📝 Modified Documentation Files

+4 / -4 lines changed
Commit: fix blocking issues
Changes:
Before
After
- **Risk Score** – View applications by their calculated security risk score from 1 (highest risk) to 10 (lowest risk). This score helps identify applications that meet your organization's security requirements.
- **Security Risk Factors** – Search for applications that meet specific security measures such as multifactor authentication, admin audit trail, user audit trail, and other security standards that protect data used by the application.
- **Compliance Risk Factors** – Narrow results to applications with compliance standards and certifications such as SOC 2, ISO 27001, HIPAA, and other regulatory requirements that ensure the application meets industry best practices.
- **Categories** – When an application is added to the gallery it can be classified in a specific category. Many categories are available such as **Business management**, **Collaboration**, or **Education**.
 
> [!NOTE]
> In an [external tenant](/entra/external-id/customers/overview-customers-ciam), enterprise applications are supported, but the application gallery catalog isn't available. To find and add enterprise applications in the external tenant, select **New application** > **Create your own application**, then type the name of the app in the search bar and select it from the list once it appears.
 
If your application uses Kerberos and also requires group memberships, you can populate Windows Server AD groups from corresponding groups in Microsoft Entra ID. For more information, see [Group writeback with Microsoft Entra Cloud Sync](~/identity/hybrid/group-writeback-cloud-sync.md).
 
The second is using the provisioning agent to provision to an on-premises application that has its own user store and doesn't rely upon Windows Server AD. You can configure provisioning to [on-premises applications that support SCIM](../app-provisioning/on-premises-scim-provisioning.md), that use [SQL databases](../app-provisioning/on-premises-sql-connector-configure.md) that use an [LDAP directory](../app-provisioning/on-premises-ldap-connector-configure.md), or support a [SOAP or REST provisioning API](../app-provisioning/on-premises-web-services-connector.md).
 
The third is using Microsoft Entra Private Access, by configuring a Global Secure Access app for per-app connections. For more information, see [Learn about Microsoft Entra Private Access](/entra/global-secure-access/concept-private-access).
 
 
> [!NOTE]
> The **Create** button might appear disabled for certain gallery apps by design. This occurs in two scenarios: First, for linked-based SSO applications. These templates are link-only and don't support creating a new app or service principal in Microsoft Entra ID. They redirect users to an external URL managed by the service provider. Because no Microsoft Entra object is created, the button is intentionally unavailable.
 
Second, when the app already exists in your tenant, as gallery applications are limited to one instance per tenant. In both cases, a disabled **Create** button is expected behavior.
 
- **Risk Score** – View applications by their calculated security risk score from 1 (highest risk) to 10 (lowest risk). This score helps identify applications that meet your organization's security requirements.
- **Security Risk Factors** – Search for applications that meet specific security measures such as multifactor authentication, admin audit trail, user audit trail, and other security standards that protect data used by the application.
- **Compliance Risk Factors** – Narrow results to applications with compliance standards and certifications such as SOC 2, ISO 27001, HIPAA, and other regulatory requirements that ensure the application meets industry best practices.
 
 
> [!NOTE]
> In an [external tenant](/entra/external-id/customers/overview-customers-ciam), enterprise applications are supported, but the application gallery catalog isn't available. To find and add enterprise applications in the external tenant, select **New application** > **Create your own application**, then type the name of the app in the search bar and select it from the list once it appears.
 
If your application uses Kerberos and also requires group memberships, you can populate Windows Server AD groups from corresponding groups in Microsoft Entra ID. For more information, see [Group writeback with Microsoft Entra Cloud Sync](~/identity/hybrid/group-writeback-cloud-sync.md).
 
The second is using the provisioning agent to provision to an on-premises application that has its own user store and doesn't rely upon Windows Server AD. You can configure provisioning to [on-premises applications that support SCIM](../app-provisioning/on-premises-scim-provisioning.md), that use [SQL databases](../app-provisioning/on-premises-sql-connector-configure.md), that use an [LDAP directory](../app-provisioning/on-premises-ldap-connector-configure.md), or support a [SOAP or REST provisioning API](../app-provisioning/on-premises-web-services-connector.md).
 
The third is using Microsoft Entra Private Access, by configuring a Global Secure Access app for per-app connections. For more information, see [Learn about Microsoft Entra Private Access](/entra/global-secure-access/concept-private-access).
 
 
> [!NOTE]
> The **Create** button might appear disabled for certain gallery apps by design. This occurs in two scenarios: First, for linked-based SSO applications. These templates are link-only and don't support creating a new app or service principal in Microsoft Entra ID. They redirect users to an external URL managed by the service provider. Because no Microsoft Entra object is created, the button is intentionally unavailable.
>
> Second, when the app already exists in your tenant, as gallery applications are limited to one instance per tenant. In both cases, a disabled **Create** button is expected behavior.
 
Modified by Ortagus Winfrey on Jan 9, 2026 9:40 PM
📖 View on learn.microsoft.com
+3 / -1 lines changed
Commit: Understanding workflows trigger update
Changes:
Before
After
- Attribute Changes
- Group Membership change
- Time based
 
Depending on which type of workflow you choose will determine which trigger you use for it.
 
 
- For **Attribute changes**, the trigger is rule based and triggered when the attribute you defined is changed for a user.
- For **Group membership change**, the trigger is group-based and triggered if a user is added or removed from a specific group.
- For Time based attribute, the trigger is rule based and triggered when the time value you defined is met by a user.
 
For a detailed guide on setting the execution conditions for a workflow, see: [Create a lifecycle workflow.](create-lifecycle-workflow.md)
 
 
 
- Attribute Changes
- Group Membership change
- Time based
- Sign-in inactivity
 
Depending on which type of workflow you choose will determine which trigger you use for it.
 
 
- For **Attribute changes**, the trigger is rule based and triggered when the attribute you defined is changed for a user.
- For **Group membership change**, the trigger is group-based and triggered if a user is added or removed from a specific group.
- For **Time based attribute**, the trigger is rule based and triggered when the time value you defined is met by a user.
- For **sign-in inactivity**, the trigger is duration-based and triggered when a user has not signed in over that time period.
 
For a detailed guide on setting the execution conditions for a workflow, see: [Create a lifecycle workflow.](create-lifecycle-workflow.md)
 
+3 / -1 lines changed
Commit: Update smart lockout policy image and markdown reference
Changes:
Before
After
> [!NOTE]
> If the first sign-in after a lockout period has expired also fails, the account locks out again. If an account locks repeatedly, the lockout duration increases.
 
![Customize the Microsoft Entra smart lockout policy in the Microsoft Entra admin center](./media/howto-password-smart-lockout/azure-entra-custom-smart-lockout-policy.png)
 
## Testing Smart lockout
 
 
 
> [!NOTE]
> If the first sign-in after a lockout period has expired also fails, the account locks out again. If an account locks repeatedly, the lockout duration increases.
 
:::image type="content" border="true" source="media/howto-password-smart-lockout/custom-smart-lockout-policy.png" alt-text="Screenshot that shows how to customize the Microsoft Entra smart lockout policy in the Microsoft Entra admin center."lightbox="media/howto-password-smart-lockout/custom-smart-lockout-policy.png":::
 
![]()
 
## Testing Smart lockout
 
+1 / -1 lines changed
Commit: PR reviewer edits
Changes:
Before
After
### 10. Investigation and troubleshooting
 
- Use **Event Viewer** from **Application and Service Logs** > **Microsoft** > **Windows** > **Private Access Sensor** to review Private Access Sensor logs.
[![Screenshot Event Viewer page.](media/how-to-configure-domain-controllers/event-viewer.png)](media/how-to-configure-domain-controllers/event-viewer.png#lightbox)
- To collect Private Access Sensor logs, run `PrivateAccessSensorLogsCollector` from the sensor installation path and share the generated zip file with Microsoft support.
- For Global Secure Access client logs:
1. Right-click the Global Secure Access tray icon.
### 10. Investigation and troubleshooting
 
- Use **Event Viewer** from **Application and Service Logs** > **Microsoft** > **Windows** > **Private Access Sensor** to review Private Access Sensor logs.
[![Screenshot of Event Viewer page.](media/how-to-configure-domain-controllers/event-viewer.png)](media/how-to-configure-domain-controllers/event-viewer.png#lightbox)
- To collect Private Access Sensor logs, run `PrivateAccessSensorLogsCollector` from the sensor installation path and share the generated zip file with Microsoft support.
- For Global Secure Access client logs:
1. Right-click the Global Secure Access tray icon.
+1 / -1 lines changed
Commit: Learn Editor: Update reference-sla-performance.md
Changes:
Before
After
| September | 99.999% | 99.998% | 99.999% | 99.999% | 99.999% |
| October | 99.999% | 99.999% | 99.999% | 99.998% | 99.999% |
| November | 99.998% | 99.999% | 99.999% | 99.998% | 99.999% |
| December | 99.978% | 99.999% | 99.999% | 99.998% | |
 
<a name='how-is-azure-ad-sla-measured-'></a>
 
| September | 99.999% | 99.998% | 99.999% | 99.999% | 99.999% |
| October | 99.999% | 99.999% | 99.999% | 99.998% | 99.999% |
| November | 99.998% | 99.999% | 99.999% | 99.998% | 99.999% |
| December | 99.978% | 99.999% | 99.999% | 99.998% | 99.999% |
 
<a name='how-is-azure-ad-sla-measured-'></a>