Skip to content

Commit 003e73f

Browse files
authored
Merge pull request #100007 from MicrosoftDocs/master
1/2 AM Publish
2 parents 5925df3 + 7359e49 commit 003e73f

File tree

220 files changed

+1107
-1405
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

220 files changed

+1107
-1405
lines changed

.openpublishing.redirection.json

Lines changed: 25 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -110,6 +110,31 @@
110110
"redirect_url": "/azure/machine-learning/data-science-virtual-machine/tools-included",
111111
"redirect_document_id": false
112112
},
113+
{
114+
"source_path": "articles/machine-learning/data-science-virtual-machine/dsvm-data-platforms.md",
115+
"redirect_url": "/azure/machine-learning/data-science-virtual-machine/dsvm-tools-data-platforms",
116+
"redirect_document_id": true
117+
},
118+
{
119+
"source_path": "articles/machine-learning/data-science-virtual-machine/dsvm-ml-data-science-tools.md",
120+
"redirect_url": "/azure/machine-learning/data-science-virtual-machine/dsvm-tools-data-science",
121+
"redirect_document_id": true
122+
},
123+
{
124+
"source_path": "articles/machine-learning/data-science-virtual-machine/dsvm-deep-learning-ai-frameworks.md",
125+
"redirect_url": "/azure/machine-learning/data-science-virtual-machine/dsvm-tools-deep-learning-frameworks",
126+
"redirect_document_id": true
127+
},
128+
{
129+
"source_path": "articles/machine-learning/data-science-virtual-machine/dsvm-tools-explore-and-visualize.md",
130+
"redirect_url": "/azure/machine-learning/data-science-virtual-machine/dsvm-tools-productivity",
131+
"redirect_document_id": true
132+
},
133+
{
134+
"source_path": "articles/machine-learning/data-science-virtual-machine/dsvm-languages.md",
135+
"redirect_url": "/azure/machine-learning/data-science-virtual-machine/dsvm-tools-languages",
136+
"redirect_document_id": true
137+
},
113138
{
114139
"source_path": "articles/machine-learning/service/how-to-understand-accuracy-metrics.md",
115140
"redirect_url": "/azure/machine-learning/service/how-to-understand-automated-ml",

articles/active-directory/authentication/howto-mfaserver-deploy.md

Lines changed: 0 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -28,9 +28,6 @@ This page covers a new installation of the server and setting it up with on-prem
2828
2929
## Plan your deployment
3030

31-
> [!WARNING]
32-
> Starting in March of 2019 MFA Server downloads will only be available to paid tenants. Free/trial tenants will no longer be able to download or generate and use activation credentials.
33-
3431
Before you download the Azure Multi-Factor Authentication Server, think about what your load and high availability requirements are. Use this information to decide how and where to deploy.
3532

3633
A good guideline for the amount of memory you need is the number of users you expect to authenticate on a regular basis.
@@ -93,9 +90,6 @@ If you aren't using the Event Confirmation feature, and your users aren't using
9390

9491
## Download the MFA Server
9592

96-
> [!WARNING]
97-
> Starting in March of 2019 MFA Server downloads will only be available to paid tenants. Free/trial tenants will no longer be able to download or generate and use activation credentials.
98-
9993
Follow these steps to download the Azure Multi-Factor Authentication Server from the Azure portal:
10094

10195
1. Sign in to the [Azure portal](https://portal.azure.com) as an administrator.

articles/active-directory/b2b/faq.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -45,7 +45,7 @@ This feature is currently not supported. If access to your organization's resour
4545
An organization might want to add B2B collaboration users, provision them to applications as needed, and then send invitations. You can use the B2B collaboration invitation API to customize the onboarding workflow.
4646

4747
### Can I make guest users visible in the Exchange Global Address List?
48-
Yes. Guest objects aren't visible in your organization's global address list (GAL) by default, but you can use Azure Active Directory PowerShell to make them visible. See [Can I make guest objects visible in the global address list?](https://docs.microsoft.com/office365/admin/create-groups/manage-guest-access-in-groups#can-i-make-guest-objects-visible-in-the-global-address-list)
48+
Yes. Guest objects aren't visible in your organization's global address list (GAL) by default, but you can use Azure Active Directory PowerShell to make them visible. See [Can I make guest objects visible in the global address list?](https://docs.microsoft.com/office365/admin/create-groups/manage-guest-access-in-groups#add-guests-to-the-global-address-list)
4949

5050
### Can I make a guest user a limited administrator?
5151
Absolutely. For more information, see [Adding guest users to a role](add-guest-to-role.md).

articles/active-directory/b2b/user-properties.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -98,7 +98,7 @@ It's possible to turn off the default limitations so that a guest user in the co
9898
![Screenshot showing the External users option in the user settings](media/user-properties/remove-guest-limitations.png)
9999

100100
## Can I make guest users visible in the Exchange Global Address List?
101-
Yes. By default, guest objects aren't visible in your organization's global address list, but you can use Azure Active Directory PowerShell to make them visible. For details, see **Can I make guest objects visible in the global address list?** in [Manage guest access in Office 365 Groups](https://docs.microsoft.com/office365/admin/create-groups/manage-guest-access-in-groups?redirectSourcePath=%252fen-us%252farticle%252fmanage-guest-access-in-office-365-groups-9de497a9-2f5c-43d6-ae18-767f2e6fe6e0&view=o365-worldwide#faq).
101+
Yes. By default, guest objects aren't visible in your organization's global address list, but you can use Azure Active Directory PowerShell to make them visible. For details, see **Can I make guest objects visible in the global address list?** in [Manage guest access in Office 365 Groups](https://docs.microsoft.com/office365/admin/create-groups/manage-guest-access-in-groups?redirectSourcePath=%252fen-us%252farticle%252fmanage-guest-access-in-office-365-groups-9de497a9-2f5c-43d6-ae18-767f2e6fe6e0&view=o365-worldwide#add-guests-to-the-global-address-list).
102102

103103
## Next steps
104104

articles/active-directory/governance/entitlement-management-external-users.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -104,7 +104,7 @@ To ensure people outside of your organization can request access packages and ge
104104

105105
### Review your Office 365 group sharing settings
106106

107-
- If you want to include Office 365 groups in your access packages for external users, make sure the **Let users add new guests to the organization** is set to **On** to allow guest access. For more information, see [Manage guest access to Office 365 Groups](https://docs.microsoft.com/office365/admin/create-groups/manage-guest-access-in-groups?view=o365-worldwide#manage-guest-access-to-office-365-groups).
107+
- If you want to include Office 365 groups in your access packages for external users, make sure the **Let users add new guests to the organization** is set to **On** to allow guest access. For more information, see [Manage guest access to Office 365 Groups](https://docs.microsoft.com/office365/admin/create-groups/manage-guest-access-in-groups?view=o365-worldwide#manage-groups-guest-access).
108108

109109
- If you want external users to be able to access the SharePoint Online site and resources associated with an Office 365 group, make sure you turn on SharePoint Online external sharing. For more information, see [Turn external sharing on or off](https://docs.microsoft.com/sharepoint/turn-external-sharing-on-or-off#change-the-organization-level-external-sharing-setting).
110110

articles/active-directory/governance/entitlement-management-organization.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -111,5 +111,5 @@ If you no longer have a relationship with an external Azure AD directory or doma
111111

112112
## Next steps
113113

114-
- [Govern access for external users](entitlement-management-organization.md)
114+
- [Govern access for external users](https://docs.microsoft.com/azure/active-directory/governance/entitlement-management-external-users)
115115
- [For users not in your directory](entitlement-management-access-package-request-policy.md#for-users-not-in-your-directory)

articles/active-directory/hybrid/tshoot-connect-sync-errors.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -234,12 +234,12 @@ Azure AD Connect is not allowed to soft match a user object from on-premises AD
234234

235235

236236
### How to fix
237-
To resolve this issue do one of the following:
237+
To resolve this issue do the following:
238238

239-
- Remove the Azure AD account (owner) from all admin roles.
240-
- **Hard Delete** the Quarantined object in the cloud.
241-
- The next sync cycle will take care of soft-matching the on-premises user to the cloud account (since the cloud user is now no longer a global GA).
242-
- Restore the role memberships for the owner.
239+
1. Remove the Azure AD account (owner) from all admin roles.
240+
2. **Hard Delete** the Quarantined object in the cloud.
241+
3. The next sync cycle will take care of soft-matching the on-premises user to the cloud account (since the cloud user is now no longer a global GA).
242+
4. Restore the role memberships for the owner.
243243

244244
>[!NOTE]
245245
>You can assign the administrative role to the existing user object again after the soft match between the on-premises user object and the Azure AD user object has completed.

articles/active-directory/identity-protection/concept-identity-protection-risks.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -52,7 +52,7 @@ These risks can be calculated in real-time or calculated offline using Microsoft
5252
| Unfamiliar sign-in properties | Real-time | This risk detection type considers past sign-in history (IP, Latitude / Longitude and ASN) to look for anomalous sign-ins. The system stores information about previous locations used by a user, and considers these “familiar” locations. The risk detection is triggered when the sign-in occurs from a location that's not already in the list of familiar locations. Newly created users will be in “learning mode” for a period of time in which unfamiliar sign-in properties risk detections will be turned off while our algorithms learn the user’s behavior. The learning mode duration is dynamic and depends on how much time it takes the algorithm to gather enough information about the user’s sign-in patterns. The minimum duration is five days. A user can go back into learning mode after a long period of inactivity. The system also ignores sign-ins from familiar devices, and locations that are geographically close to a familiar location. <br><br> We also run this detection for basic authentication (or legacy protocols). Because these protocols do not have modern properties such as client ID, there is limited telemetry to reduce false positives. We recommend our customers to move to modern authentication. |
5353
| Admin confirmed user compromised | Offline | This detection indicates an admin has selected ‘Confirm user compromised’ in the Risky users UI or using riskyUsers API. To see which admin has confirmed this user compromised, check the user’s risk history (via UI or API). |
5454
| Malicious IP address | Offline | This detection indicates sign-in from a malicious IP address. An IP address is considered malicious based on high failure rates because of invalid credentials received from the IP address or other IP reputation sources. |
55-
| Suspicious inbox manipulation rules | Offline | This detection is discovered by [Microsoft Cloud App Security (MCAS)](https://docs.microsoft.com/cloud-app-security/anomaly-detection-policy#suspicious-inbox-manipulation-rule). This detection profiles your environment and triggers alerts when suspicious rules that delete or move messages or folders are set on a user's inbox. This may indicate that the user’s account is compromised, that messages are being intentionally hidden, and that the mailbox is being used to distribute spam or malware in your organization. |
55+
| Suspicious inbox manipulation rules | Offline | This detection is discovered by [Microsoft Cloud App Security (MCAS)](https://docs.microsoft.com/cloud-app-security/anomaly-detection-policy#suspicious-inbox-manipulation-rules). This detection profiles your environment and triggers alerts when suspicious rules that delete or move messages or folders are set on a user's inbox. This may indicate that the user’s account is compromised, that messages are being intentionally hidden, and that the mailbox is being used to distribute spam or malware in your organization. |
5656
| Impossible travel | Offline | This detection is discovered by [Microsoft Cloud App Security (MCAS)](https://docs.microsoft.com/cloud-app-security/anomaly-detection-policy#impossible-travel). This detection identifies two user activities (is a single or multiple sessions) originating from geographically distant locations within a time period shorter than the time it would have taken the user to travel from the first location to the second, indicating that a different user is using the same credentials. |
5757

5858
### Other risk detections

articles/active-directory/reports-monitoring/howto-integrate-activity-logs-with-arcsight.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ To use this feature, you need:
3333
* An Azure event hub that contains Azure AD activity logs. Learn how to [stream your activity logs to an event hub](quickstart-azure-monitor-stream-logs-to-event-hub.md).
3434
* A configured instance of ArcSight Syslog NG Daemon SmartConnector (SmartConnector) or ArcSight Load Balancer. If the events are sent to ArcSight Load Balancer, they are consequently sent to the SmartConnector by the Load Balancer.
3535

36-
Download and open the [configuration guide for ArcSight SmartConnector for Azure Monitor Event Hub](https://community.microfocus.com/dcvta86296/attachments/dcvta86296/connector-documentation/1232/8/Microsoft%20Azure%20Monitor%20Event%20Hub.pdf). This guide contains the steps you need to install and configure the ArcSight SmartConnector for Azure Monitor.
36+
Download and open the [configuration guide for ArcSight SmartConnector for Azure Monitor Event Hub](https://community.microfocus.com/t5/ArcSight-Connectors/SmartConnector-for-Microsoft-Azure-Monitor-Event-Hub/ta-p/1671292). This guide contains the steps you need to install and configure the ArcSight SmartConnector for Azure Monitor.
3737

3838
## Integrate Azure AD logs with ArcSight
3939

@@ -56,4 +56,4 @@ Download and open the [configuration guide for ArcSight SmartConnector for Azure
5656

5757
## Next steps
5858

59-
[Configuration guide for ArcSight SmartConnector for Azure Monitor Event Hub](https://community.microfocus.com/dcvta86296/attachments/dcvta86296/connector-documentation/1232/8/Microsoft%20Azure%20Monitor%20Event%20Hub.pdf)
59+
[Configuration guide for ArcSight SmartConnector for Azure Monitor Event Hub](https://community.microfocus.com/t5/ArcSight-Connectors/SmartConnector-for-Microsoft-Azure-Monitor-Event-Hub/ta-p/1671292)

0 commit comments

Comments
 (0)