📋 Microsoft Entra Documentation Changes

Daily summary for changes since March 8th 2026, 9:16 PM PDT

Report generated on March 9th 2026, 9:16 PM PDT

📊 Summary

30
Total Commits
0
New Files
7
Modified Files
0
Deleted Files
8
Contributors

📝 Modified Documentation Files

+1 / -7 lines changed
Commit: Address review feedback: simplify per rolyon's comments
Changes:
Before
After
 
### Create a new group in an administrative unit
 
To create a new group directly in an administrative unit, use the following request. To add an existing group instead, see [Add groups to an administrative unit](#add-groups-to-an-administrative-unit) earlier in this article.
 
> [!TIP]
> As an alternative, you can first create the group using `POST https://graph.microsoft.com/v1.0/groups` and then add it to the administrative unit using the `$ref` endpoint shown in the [Add groups to an administrative unit](#add-groups-to-an-administrative-unit) section.
 
> [!NOTE]
> If the administrative unit is a restricted management administrative unit (`isMemberManagementRestricted=true`), only nonunified groups that are security-enabled, not mail-enabled, and not on-premises sync-enabled are supported.
 
Request
 
 
### Create a new group in an administrative unit
 
To create a new group directly in an administrative unit, use the following request. To add an existing group instead, see **Add groups to an administrative unit** earlier in this article.
 
Request
 
 
 
 
 
 
 
+3 / -2 lines changed
Commit: Reorganize unsupported scenarios and add device sign-in section
Changes:
Before
After
- S/MIME using a security key.
- *Run as* using a security key.
- Signing in to a server using a security key.
- When signing in or unlocking a Windows device using a security keythat contains multiple Microsoft Entra accounts, the device defaults to the last account added to the key. However, WebAuthn allows users to select the specific account they wish to use for authentication.
- Unlocking a device running Windows 10 version 1809. For the best experience, use Windows 10 version 1903 or higher.
 
### Device sign-in and unlock
 
## Prepare devices
 
Microsoft Entra joined devices must run Windows 10 version 1909 or higher.
 
- S/MIME using a security key.
- *Run as* using a security key.
- Signing in to a server using a security key.
### Device sign-in and unlock
 
- OOBE sign-in with a passkey is supported. You can use Web sign-in to unlock a Windows device. For more information, see [Use Web Sign-In To Enable Passwordless Sign-In In Windows](/windows/security/identity-protection/web-sign-in).
- When signing in or unlocking a Windows device using a security keythat contains multiple Microsoft Entra accounts, the device defaults to the last account added to the key. However, WebAuthn allows users to select the specific account they wish to use for authentication.
- Unlocking a device running Windows 10 version 1809. For the best experience, use Windows 10 version 1903 or higher.
 
## Prepare devices
 
Microsoft Entra joined devices must run Windows 10 version 1909 or higher.
Modified by shlipsey3 on Mar 9, 2026 3:36 PM
📖 View on learn.microsoft.com
+2 / -2 lines changed
Commit: refresh
Changes:
Before
After
ms.service: entra
ms.topic: troubleshooting
ms.subservice: fundamentals
ms.date: 01/20/2026
ms.author: sarahlipsey
ms.reviewer: jeffsta
---
 
# Find help and get support for Microsoft Entra
ms.service: entra
ms.topic: troubleshooting
ms.subservice: fundamentals
ms.date: 03/09/2026
ms.author: sarahlipsey
ms.reviewer: tychusnyanga
---
 
# Find help and get support for Microsoft Entra
+2 / -2 lines changed
Commit: refresh
Changes:
Before
After
author: shlipsey3
ms.author: sarahlipsey
ms.reviewer: tychusnyanga
ms.date: 02/02/2026
ms.topic: how-to
ms.service: entra
# customer intent: As an IT admin, I want to troubleshoot identity and access issues using the Support Assistant so that I can resolve problems quickly.
 
Self-Service Support is available to users with permissions to create and manage support tickets, such as [Helpdesk Administrator](../identity/role-based-access-control/permissions-reference.md#helpdesk-administrator) and [Reports Reader](../identity/role-based-access-control/permissions-reference.md#reports-reader).
 
For a full list of roles, see [Lease privileged role by task](../identity/role-based-access-control/delegate-by-task.md).
 
## How to work with the Microsoft Entra Support Assistant
 
author: shlipsey3
ms.author: sarahlipsey
ms.reviewer: tychusnyanga
ms.date: 03/09/2026
ms.topic: how-to
ms.service: entra
# customer intent: As an IT admin, I want to troubleshoot identity and access issues using the Support Assistant so that I can resolve problems quickly.
 
Self-Service Support is available to users with permissions to create and manage support tickets, such as [Helpdesk Administrator](../identity/role-based-access-control/permissions-reference.md#helpdesk-administrator) and [Reports Reader](../identity/role-based-access-control/permissions-reference.md#reports-reader).
 
For a full list of roles, see [Least privileged role by task](../identity/role-based-access-control/delegate-by-task.md).
 
## How to work with the Microsoft Entra Support Assistant
 
Modified by Ken Withee on Mar 9, 2026 2:47 PM
📖 View on learn.microsoft.com
+3 / -0 lines changed
Commit: Add delegation disambiguation note to access review article
Changes:
Before
After
 
Microsoft Entra ID simplifies how enterprises manage access to groups and applications in Microsoft Entra ID and other Microsoft web services with a feature called access reviews. This article covers how a designated reviewer performs an access review for members of a group or users with access to an application. If you want to review access to an access package, read [Review access of an access package in entitlement management](entitlement-management-access-reviews-review-access.md).
 
You can review access to groups and applications via the [My Access portal](https://myaccess.microsoft.com/) or via chat with the [Access Review Agent (Preview)](https://teams.microsoft.com/l/app/b99caf01-1dd7-43cf-981a-0de444e783f3) in Microsoft Teams. The Access Review Agent is currently in preview and does not yet support all types of group and application reviews, if the agent cannot yet help you with your assigned reviews it will guide you to the My Access portal.
 
## Perform an access review using the Access Review Agent (Preview)
 
 
 
 
Microsoft Entra ID simplifies how enterprises manage access to groups and applications in Microsoft Entra ID and other Microsoft web services with a feature called access reviews. This article covers how a designated reviewer performs an access review for members of a group or users with access to an application. If you want to review access to an access package, read [Review access of an access package in entitlement management](entitlement-management-access-reviews-review-access.md).
 
> [!NOTE]
> Access reviews can't currently be delegated to another reviewer. If you're looking to delegate **access package approval requests** (not access reviews) to someone else, see [Delegate approvals in My Access](delegate-approvals-my-access.md).
 
You can review access to groups and applications via the [My Access portal](https://myaccess.microsoft.com/) or via chat with the [Access Review Agent (Preview)](https://teams.microsoft.com/l/app/b99caf01-1dd7-43cf-981a-0de444e783f3) in Microsoft Teams. The Access Review Agent is currently in preview and does not yet support all types of group and application reviews, if the agent cannot yet help you with your assigned reviews it will guide you to the My Access portal.
 
## Perform an access review using the Access Review Agent (Preview)
+3 / -0 lines changed
Commit: Clarify 'Enabled for external users' scope in catalog settings
Changes:
Before
After
 
1. If you want to allow users in external directories from connected organizations to be able to request access packages in this catalog, set **Enabled for external users** to **Yes**. The access packages must also have a policy allowing users from connected organizations to request. If the access packages in this catalog are intended only for users already in the directory, then set **Enabled for external users** to **No**.
 
![Screenshot that shows the New catalog pane.](./media/entitlement-management-shared/new-catalog.png)
 
1. Select **Create** to create the catalog.
 
 
 
 
1. If you want to allow users in external directories from connected organizations to be able to request access packages in this catalog, set **Enabled for external users** to **Yes**. The access packages must also have a policy allowing users from connected organizations to request. If the access packages in this catalog are intended only for users already in the directory, then set **Enabled for external users** to **No**.
 
> [!NOTE]
> This setting controls whether external users can **request** access packages through self-service. Administrators can [directly assign](entitlement-management-access-package-assignments.md) external users to access packages regardless of this setting.
 
![Screenshot that shows the New catalog pane.](./media/entitlement-management-shared/new-catalog.png)
 
1. Select **Create** to create the catalog.
Modified by Carolyn McSharry on Mar 9, 2026 7:40 AM
📖 View on learn.microsoft.com
+1 / -1 lines changed
Commit: Fix formatting and update eligibility information
Changes:
Before
After
- **Free Microsoft Entra tenant** — [Create a new tenant](~/identity-platform/quickstart-create-new-tenant.md) with an [Azure free account](https://azure.microsoft.com/pricing/purchase-options/azure-account). This gives you Entra ID Free tier. You can then [activate a free trial of Microsoft Entra ID P1 or P2](~/fundamentals/get-started-premium.md) if needed for testing.
 
> [!IMPORTANT]
> The Microsoft 365 Developer Program requires a qualifying subscription or program membership. Eligible members include Visual Studio Enterprise or Professional subscribers, ISV Success Program or Microsoft AI Cloud Partner Program participants, and Premier or Unified Support customers. For more information, see the [M365 Developer Program eligibility update](https://devblogs.microsoft.com/microsoft365dev/stay-ahead-of-the-game-with-the-latest-updates-to-the-microsoft-365-developer-program/) and [Who qualifies for a Microsoft 365 E5 developer subscription?](/office/developer-program/microsoft-365-developer-program-faq#who-qualifies-for-a-microsoft-365-e5-developer-subscription-). If you don't qualify, use the free tenant option instead.
 
### Sign up for the Microsoft 365 Developer Program
 
- **Free Microsoft Entra tenant** — [Create a new tenant](~/identity-platform/quickstart-create-new-tenant.md) with an [Azure free account](https://azure.microsoft.com/pricing/purchase-options/azure-account). This gives you Entra ID Free tier. You can then [activate a free trial of Microsoft Entra ID P1 or P2](~/fundamentals/get-started-premium.md) if needed for testing.
 
> [!IMPORTANT]
> The Microsoft 365 Developer Program requires a qualifying subscription or program membership. Eligible members include Visual Studio Enterprise or Professional subscribers, ISV Success Program or Microsoft AI Cloud Partner Program participants, and Premier or Unified Support customers. For more information, see the [Microsoft 365 Developer Program eligibility update](https://devblogs.microsoft.com/microsoft365dev/stay-ahead-of-the-game-with-the-latest-updates-to-the-microsoft-365-developer-program/) and [Who qualifies for a Microsoft 365 E5 developer subscription?](/office/developer-program/microsoft-365-developer-program-faq#who-qualifies-for-a-microsoft-365-e5-developer-subscription-). If you don't qualify, use the free tenant option instead.
 
### Sign up for the Microsoft 365 Developer Program