Skip to content

Commit e23fbc0

Browse files
authored
Merge pull request #21285 from MicrosoftDocs/main
Publish main to live on 7/5 @ 3:30 PM
2 parents cf36142 + 3ecdce1 commit e23fbc0

12 files changed

Lines changed: 406 additions & 88 deletions

microsoft-365/lighthouse/TOC.yml

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -48,6 +48,12 @@
4848
href: m365-lighthouse-reinstate-task.md
4949
- name: Manage tenants using deployment insights
5050
href: m365-lighthouse-manage-tenants-using-deployment-insights.md
51+
- name: Manage alerts
52+
items:
53+
- name: Overview of the Alerts page
54+
href: m365-lighthouse-alerts-overview.md
55+
- name: Create and manage alert rules
56+
href: m365-lighthouse-create-manage-alert-rules.md
5157
- name: Manage tenants
5258
items:
5359
- name: Overview of the Tenants page
@@ -62,6 +68,8 @@
6268
items:
6369
- name: Overview of the Users page
6470
href: m365-lighthouse-users-page-overview.md
71+
- name: Overview of the Multifactor authentication page
72+
href: m365-lighthouse-mfa-overview.md
6573
- name: Block user sign-in
6674
href: m365-lighthouse-block-user-signin.md
6775
- name: Block sign-in for shared mailbox accounts
Lines changed: 88 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,88 @@
1+
---
2+
title: "Overview of the Alerts page in Microsoft 365 Lighthouse"
3+
f1.keywords: NOCSH
4+
ms.author: sharik
5+
author: SKjerland
6+
manager: scotv
7+
ms.reviewer: algreer
8+
ms.date: 06/30/2023
9+
audience: Admin
10+
ms.topic: article
11+
ms.service: microsoft-365-lighthouse
12+
ms.localizationpriority: medium
13+
ms.collection:
14+
- Tier1
15+
- scotvorg
16+
- M365-subscription-management
17+
- Adm_O365
18+
ms.custom:
19+
- AdminSurgePortfolib
20+
- M365-Lighthouse
21+
search.appverid: MET150
22+
description: "For Managed Service Providers (MSPs) using Microsoft 365 Lighthouse, learn how to view alerts in Lighthouse."
23+
---
24+
25+
# Overview of the Alerts page in Microsoft 365 Lighthouse
26+
27+
As an MSP provider, you need to monitor and respond to the security issues of your customers efficiently and effectively. Microsoft 365 Lighthouse introduces alerts, a powerful tool that gives you a consolidated view of all the high priority detections and alerts across your customers. You can see a prioritized list of the most urgent issues that require your attention and take immediate action to resolve them. You can also enable push alerts to your existing support systems and flows, so you never miss a critical alert that needs your intervention.
28+
29+
To help you get started, Lighthouse provides a default set of alerting rules based on best practices and recommendations. You can use these rules as they are or modify them according to your preferences and needs. You can also create rules from scratch for more control and flexibility.
30+
31+
## Alerts tab
32+
33+
The **Alerts** tab provides a consolidated view of potential security issues across all your customers. The tab contains two sections:
34+
35+
- **Alert resolution rate** – a graph that displays historical information about alerts and their status over time.
36+
37+
- **Alert report** – a table of current alerts that can be filtered by alert type, severity, status, and assigned to.
38+
39+
From the table, you can select any alert to see more detailed information, including:
40+
41+
- Alert description
42+
- Affected tenant(s)
43+
- Rule that triggered the alert
44+
- Alert type
45+
- Time stamp (First detected, last updated)
46+
- Impacted entity
47+
48+
You can update the severity and status of the alert and assign the alert to a specific user to resolve. From the **Comments and history** tab, you have a complete history of the alert. You can also add additional comments to the alert as needed.
49+
50+
### Alert Types
51+
52+
Lighthouse defines six alert types.
53+
54+
- Non-compliant
55+
- Device without antivirus protection
56+
- Variance detection
57+
- Risky user
58+
- Security incident
59+
- Active threat on device
60+
61+
The **Alerts** tab also includes the following options:
62+
63+
- **Export:** Select to export alert data to an Excel comma-separated values (.csv) file.
64+
- **Refresh:** Select to retrieve the most current alert data.
65+
- **Search:** Enter keywords to locate a specific alert in the list.
66+
67+
:::image type="content" source="../media/m365-lighthouse-alerts-overview/m365-lighthouse-alerts-tab.png" alt-text="Screenshot of the Alerts tab in Lighthouse." lightbox="../media/m365-lighthouse-alerts-overview/m365-lighthouse-alerts-tab.png":::
68+
69+
## Alert rules tab
70+
71+
The **Alert rules** tab lets you create and edit alert rules. Lighthouse provides six default alert rules that are automatically applied to all customers. You can edit existing rules or create your own custom rules. Select **Create alert rule**, and Lighthouse will guide you step by step in creating your first alert rule.
72+
73+
The Alert rules tab also includes the following options:
74+
75+
- **Create alert rule:** Select to create a new alert.
76+
- **Edit alert rule:** Select to edit an existing alert rule.
77+
- **Delete:** Select to delete an alert rule from the list.
78+
- **Search:** Enter keywords to locate a specific alert rule in the list.
79+
80+
:::image type="content" source="../media/m365-lighthouse-alerts-overview/m365-lighthouse-alerts-rules-tab.png" alt-text="Screenshot of alerts rules tab." lightbox="../media/m365-lighthouse-alerts-overview/m365-lighthouse-alerts-rules-tab.png":::
81+
82+
## Related content
83+
84+
[Create and manage alert rules](m365-lighthouse-alerts-overview.md) (article)\
85+
[Overview of the Threat management page in Microsoft 365 Lighthouse](m365-lighthouse-threat-management-page-overview.md) (article)\
86+
[Mitigate threats in Microsoft 365 Lighthouse with Microsoft Defender Antivirus](m365-lighthouse-mitigate-threats.md) (article)\
87+
[Overview of the Device security page in Microsoft 365 Lighthouse](m365-lighthouse-device-security-overview.md) (article)\
88+
[Overview of the Vulnerability management page in Microsoft 365 Lighthouse](m365-lighthouse-vulnerability-management-page-overview.md) (article)
Lines changed: 75 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,75 @@
1+
---
2+
title: "Create and manage alert rules in Microsoft 365 Lighthouse"
3+
f1.keywords: NOCSH
4+
ms.author: sharik
5+
author: SKjerland
6+
manager: scotv
7+
ms.reviewer: algreer
8+
ms.date: 06/30/2023
9+
audience: Admin
10+
ms.topic: article
11+
ms.service: microsoft-365-lighthouse
12+
ms.localizationpriority: medium
13+
ms.collection:
14+
- Tier1
15+
- scotvorg
16+
- M365-subscription-management
17+
- Adm_O365
18+
ms.custom:
19+
- AdminSurgePortfolib
20+
- M365-Lighthouse
21+
search.appverid: MET150
22+
description: "For Managed Service Providers (MSPs) using Microsoft 365 Lighthouse, learn how to create alert rules."
23+
---
24+
25+
# Create and manage alert rules in Microsoft 365 Lighthouse
26+
27+
Alert rules allow you to configure high priority alerts from various data sources, such as Risky Users, Microsoft Defender for Business, Microsoft Defender Antivirus, Device Compliance, and more. Lighthouse supports the creation of six alert types:
28+
29+
- Non-compliant
30+
- Device without antivirus protection
31+
- Variance detection
32+
- Risky user
33+
- Security incident
34+
- Active threat on device
35+
36+
## Before you begin
37+
38+
You must be a Global Administrator to create and manage alert rules.
39+
40+
## Create a new alert rule
41+
42+
1. In the left navigation pane in Lighthouse, select **Alerts**.
43+
2. On the **Alerts** page, select **Alerts rules** tab.
44+
3. Select **Create alert rule**. The alert rules wizard opens.
45+
4. From the **Set up the basics** page, configure the following basic information:
46+
1. Name of the alert
47+
2. Alert type
48+
3. Description of the alert
49+
5. Select **Next**.
50+
6. From the **Settings** page, configure alert settings. The number of settings vary based on the alert type you choose.
51+
7. Select **Next**.
52+
8. From the **Tenants** page, select which tenants to monitor.
53+
9. From the **Recipients** page, select who should receive email notification when this alert is triggered. You can send notifications to users, security groups, or ticketing system.
54+
10. Review the information and then select **Create alert rule**.
55+
56+
## Edit an existing alert rule
57+
58+
1. In the left navigation pane in Lighthouse, select **Alerts**.
59+
2. On the **Alerts** page, select **Alerts rules** tab.
60+
3. From the list, select an alert rule you want to edit.
61+
4. Select **Edit alert rule**. The alert rules wizard opens.
62+
5. Step through each page and edit any settings as needed.
63+
6. Review your changes and then select **Edit alert rule**.
64+
65+
## Delete an alert rule
66+
67+
1. In the left navigation pane in Lighthouse, select **Alerts**.
68+
2. On the **Alerts** page, select **Alerts rules** tab.
69+
3. From the list, select an alert rule you want to delete.
70+
4. Select **Delete**.
71+
5. In the confirmation window, select **Delete**.
72+
73+
## Related content
74+
75+
[Overview of the Alerts page in Microsoft 365 Lighthouse](m365-lighthouse-alerts-overview.md) (article)

microsoft-365/lighthouse/m365-lighthouse-manage-mfa.md

Lines changed: 61 additions & 26 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ ms.author: sharik
55
author: SKjerland
66
manager: scotv
77
ms.reviewer: ragovind
8-
ms.date: 10/20/2021
8+
ms.date: 06/30/2023
99
audience: Admin
1010
ms.topic: article
1111
ms.service: microsoft-365-lighthouse
@@ -24,57 +24,92 @@ description: "For Managed Service Providers (MSPs) using Microsoft 365 Lighthous
2424

2525
# Manage multifactor authentication in Microsoft 365 Lighthouse
2626

27-
Azure Active Directory (Azure AD) Multi-Factor Authentication (MFA) helps safeguard access to data and applications, providing another layer of security by using a second form of authentication. The Multifactor Authentication page provides detailed information on the status of MFA enablement across your tenants. Select any tenant in the list to see more details for that tenant, including which Conditional Access policies requiring MFA are already configured and which users haven't yet registered for MFA.
27+
Microsoft 365 Lighthouse allows you to manage multifactor authentication (MFA) settings across all tenants. The Multifactor Authentication page provides detailed information on the status of MFA enablement and the ability to take action on specific users.
2828

29-
For small- and medium-sized business (SMB) customers, Microsoft recommends enabling [security defaults](/azure/active-directory/fundamentals/concept-fundamentals-security-defaults) at a minimum. For more complex scenarios, you can use [Conditional Access](/azure/active-directory/conditional-access/overview) to configure specific policies.
29+
For small- and medium-sized business (SMB) customers, Microsoft recommends enabling [security defaults](/azure/active-directory/fundamentals/concept-fundamentals-security-defaults) at a minimum. For more complex scenarios, you can use [Conditional Access](/azure/active-directory/conditional-access/overview) to configure specific policies.
3030

3131
## Before you begin
3232

33-
The following conditions must be met before a tenant will appear in the list:
33+
The customer tenant must be active within Microsoft 365 Lighthouse. To determine if a tenant is active, see [Microsoft 365 Lighthouse tenant list overview](m365-lighthouse-tenant-list-overview.md).
3434

35-
- The customer tenant must have an Azure AD Premium license for each user. For more information on which licenses support MFA, see [Features and licenses for Azure AD Multi-Factor Authentication](/azure/active-directory/authentication/concept-mfa-licensing).
35+
## Notify users who aren't registered for MFA
3636

37-
- The customer tenant must be active within Microsoft 365 Lighthouse. To learn how to determine if a tenant is active, see [Microsoft 365 Lighthouse tenant list overview](/microsoft-365/lighthouse/m365-lighthouse-tenant-list-overview).
37+
1. In the left navigation pane in Lighthouse, select **Users** \> **Multifactor authentication**.
3838

39-
## Enable MFA for a tenant
39+
2. Select the tenant that contains the user(s) that you want to notify.
4040

41-
1. In the left navigation pane in Lighthouse, select **Users** > **Multifactor authentication**.
41+
3. Select **Users not registered for MFA** tab.
4242

43-
2. On the **Multifactor Authentication** page, look for a tenant currently not using MFA, and then select that tenant to open the tenant details pane.
43+
4. Select the tenant containing the user(s) you want to notify.
4444

45-
3. On the **MFA enablement** tab, under **MFA with Security defaults**, select **Enable Security defaults**.
45+
5. Select **Create email**.
4646

47-
4. Select **Save changes**.
47+
Your default email application creates a sample email addressed to each selected user.
4848

49-
To enable MFA through Conditional Access, see [Tutorial: Secure user sign-in events with Azure AD Multi-Factor Authentication](/azure/active-directory/authentication/tutorial-enable-azure-mfa).
49+
6. Edit the notification email if needed.
5050

51-
## Notify users who aren't registered for MFA
51+
7. Send the email.
5252

53-
1. In the left navigation pane in Lighthouse, select **Users** > **Multifactor authentication**.
53+
> [!TIP]
54+
> Select the **Admin****Guest**, or **Members** counts to filter the list by type. If any user accounts in the list are emergency access or service accounts for which you don't want to require MFA, select those user accounts and then select **Exclude users**. The excluded user accounts will no longer appear in the list of users not registered for MFA.
5455
55-
2. On the **Multifactor Authentication** page, look for tenants with users not registered for MFA, and then select the tenant to open the tenant details pane.
56+
> [!NOTE]
57+
> Lighthouse opens your default email client and prepopulates the email message with instructions to register for MFA. All the selected users will be included on the BCC line. If you prefer to individually email users, you can select the email icon next to the username.
58+
>
59+
> If you want to use a different email account, you can export the list of users to a file. You can also download sample email templates you can customize with your company branding.
60+
61+
## Exclude users from MFA registration
62+
63+
1. In the left navigation pane in Lighthouse, select **Users \> Multifactor authentication**.
64+
65+
2. Select the tenant containing the user(s) you want to exclude.
5666

5767
3. Select **Users not registered for MFA** tab.
5868

59-
4. Select all other users in the list who need to register for MFA, and then select **Create email**.
69+
4. Select the user(s) that you want to exclude.
6070

61-
> [!TIP]
62-
> Select the **Admin**, **Guest**, or **Members** counts to filter the list by type. If any of the user accounts in the list are emergency access accounts or service accounts for which you don't want to require MFA, select those user accounts, and then select **Exclude users**. The excluded user accounts will no longer appear in the list of users not registered for MFA.
71+
5. Select **Exclude users**.
72+
73+
6. In the **Exclude users** pane, select **Save changes** to save the changes in both Lighthouse and the tenant.
6374

6475
> [!NOTE]
65-
> If any shared mailbox accounts or inactive user accounts appear in the list of users not registered for MFA, we recommend that you block signin for those accounts so they'll no longer appear in this list.
76+
> Ensure that the **Microsoft 365 Lighthouse - MFA Exclusions** security group is excluded from the tenant’s Conditional Access policies that require MFA and from the applicable deployment tasks in the tenant’s deployment plan in Lighthouse.
77+
78+
## Block sign-in for users not registered for MFA
6679

67-
Lighthouse opens your default email client and prepopulates the email message with instructions to register for MFA. All the selected users will be included on the BCC line. If you prefer to individually email users, you can select the email icon next to the username.
80+
1. In the left navigation pane in Lighthouse, select **Users \> Multifactor authentication**.
81+
2. Select the tenant that contains the user(s) you want to block.
82+
3. Select **Users not registered for MFA** tab.
83+
4. Select the user(s) that you want to block.
84+
5. Select **Block sign-in**.
85+
6. In the **Manage sign-in status** pane, select **Block users from signing in**.
86+
7. Select **Save**.
87+
88+
> [!NOTE]
89+
> Ensure If any shared mailbox accounts or inactive user accounts appear in the list of users not registered for MFA, we recommend you block sign-in for those accounts to remove them from the list.
6890
69-
If you want to use a different email account, you can export the list of users to a file. You can also download sample email templates that you can customize with your company branding.
91+
Blocking a user prevents anyone from signing in as this user and is a good idea when you think their password or username may be compromised. Blocking a user immediately stops any new sign-ins for that account. The account will be automatically signed out from all Microsoft services within 60 minutes if the account is signed in. This won't stop the account from receiving mail and doesn't delete any account data.
92+
93+
## Remove a user from the Excluded users group
94+
95+
1. In the left navigation pane in Lighthouse, select **Users \> Multifactor authentication**.
96+
2. Select the tenant that contains the user(s) you want to remove.
97+
3. Select **Exclude users** tab.
98+
4. Select the user(s) that you want to remove.
99+
5. Select **Remove**.
100+
6. In the confirmation message, select **Remove**.
101+
102+
> [!NOTE]
103+
> The excluded users listed in Lighthouse will reflect the current membership **Microsoft 365 Lighthouse - MFA exclusions** security group but will not confirm that the group has been excluded from the tenant’s Conditional Access policies that require MFA or from the applicable deployment tasks in the tenant’s deployment plan in Lighthouse.
70104
71105
## Next steps
72106

73-
Once MFA is enabled, you can enable Azure Active Directory (Azure AD) self-service password reset (SSPR). SSPR gives users the ability to change or reset their password with no administrator or help desk involvement. For more information, see [Manage self-service password reset in Microsoft 365 Lighthouse](m365-lighthouse-manage-sspr.md).
107+
Once MFA is enabled, you can enable Azure Active Directory (Azure AD) self-service password reset (SSPR). SSPR allows users to change or reset passwords without administrator or help desk involvement. For more information, see Manage self-service password reset in Microsoft 365 Lighthouse. For more information, see [Manage self-service password reset in Microsoft 365 Lighthouse](m365-lighthouse-manage-sspr.md).
74108

75109
## Related content
76110

77-
[Plan an Azure Active Directory Multi-Factor Authentication deployment](/azure/active-directory/authentication/howto-mfa-getstarted) (article)\
78-
[What are security defaults?](/azure/active-directory/fundamentals/concept-fundamentals-security-defaults) (article)\
79-
[What is Conditional Access?](/azure/active-directory/conditional-access/overview) (article)\
80-
[Learn how to convert users from per-user MFA to Conditional Access](/azure/active-directory/authentication/howto-mfa-getstarted#convert-users-from-per-user-mfa-to-conditional-access-based-mfa) (article)
111+
[Overview of multifactor authentication in Lighthouse](m365-lighthouse-mfa-overview.md) (article)\
112+
[Plan an Azure Active Directory Multi-Factor Authentication deployment](/azure/active-directory/authentication/howto-mfa-getstarted) (article)\
113+
[What are security defaults?](/azure/active-directory/fundamentals/concept-fundamentals-security-defaults) (article)\
114+
[What is Conditional Access?](/azure/active-directory/conditional-access/overview) (article)\
115+
[Learn how to convert users from per-user MFA to Conditional Access](/azure/active-directory/authentication/howto-mfa-getstarted#convert-users-from-per-user-mfa-to-conditional-access-based-mfa) (article)

0 commit comments

Comments
 (0)