You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
> Until the extension is no longer in preview, the JSON schema for `host.json` isn't updated, and specific properties and behaviors might change. During the preview period, you might see warnings in your editor that say the `mcp` section isn't recognized. You can safely ignore these warnings.
69
+
67
70
You can use `host.json` to define MCP server information.
Fast-arriving logs with basic call metadata (IDs, timestamps, endpoints, SDK info). These log data arrive in Azure Monitor faster than the call summary logs. This log contains basic information about the call, including all the relevant IDs, time stamps, endpoints, and SDK information.
42
-
- Data available within 60 minutes of the call ending.
42
+
- Data generally available within 60 minutes after the call ending.
43
43
- May contain multiple rows per call participant.
44
44
- Contains the most recent updates for each participant.
45
45
- Useful for near-real-time monitoring and analysis of call activities.
This log is a subset of the Call summary updates log schema. It contains basic information about the call, including all the relevant IDs, time stamps, endpoints, and SDK information. For faster log latency, use the call summary updates logs instead.
51
-
- Data available within 3-5 hours of the call ending.
51
+
- Data generally available within 3 to 5 hours after the call ending.
52
52
- Contains a single row per call participant.
53
53
- Represents a snapshot of the call state at the time of finalization.
@@ -89,126 +89,16 @@ Access to the root has to be given from a user with "microsoft.authorization/rol
89
89
There are three built-in roles definitions to support Service Groups in the preview.
90
90
91
91
> [!NOTE]
92
-
> Custom Role Based Access Controls aren't supported within the Preview.
93
-
94
-
#### Service Group Administrator
95
-
This role manages all aspects of Service Groups and Relationships and is the default role given to users when they create a Service Group. The role restricts the role assignment capabilities to "Service Group Administrator', "Service Group Contributor", and "Service Group Reader" to other users.
"condition": "((!(ActionMatches{'Microsoft.Authorization/roleAssignments/write'})) OR (@Request[Microsoft.Authorization/roleAssignments:RoleDefinitionId] ForAnyOfAnyValues:GuidEquals{4e50c84cc78e4e37b47ee60ffea0a775,32e6a4ec60954e37b54b12aa350ba81f,de754d53652d4c75a67f1e48d8b49c97})) AND ((!(ActionMatches{'Microsoft.Authorization/roleAssignments/delete'})) OR (@Resource[Microsoft.Authorization/roleAssignments:RoleDefinitionId] ForAnyOfAnyValues:GuidEquals{4e50c84cc78e4e37b47ee60ffea0a775,32e6a4ec60954e37b54b12aa350ba81f,de754d53652d4c75a67f1e48d8b49c97}))",
The Service Group Contributor role given to users when they need to create or manage the lifecycle of a Service Group. This role allows for all actions except for Role Assignment capabilities.
144
-
```json
145
-
{
146
-
"assignableScopes": [
147
-
"/providers/Microsoft.Management/serviceGroups"
148
-
],
149
-
"createdBy": null,
150
-
"createdOn": "2024-10-15T18:15:20.488676+00:00",
151
-
"description": "Role Definition for contributor of a Service Group",
> Custom Role Based Access Controls aren't supported during the Preview.
93
+
94
+
-[Service Group Administrator](../../role-based-access-control/built-in-roles/management-and-governance.md#service-group-administrator): This built-in role manages all aspects of Service Groups and Relationships and is the *default role* given to users when they create a Service Group.
95
+
96
+
97
+
-[Service Group Contributor](../../role-based-access-control/built-in-roles/management-and-governance.md#service-group-contributor): This built-in role should be given to users when they need to create or manage the lifecycle of a Service Group. This role allows for all actions except for Role Assignment capabilities.
98
+
99
+
100
+
-[Service Group Reader](../../role-based-access-control/built-in-roles/management-and-governance.md#service-group-reader): This built-in role provides read-only access to service group information and can be assigned to other resources in order to view the connected relationships.
Copy file name to clipboardExpand all lines: articles/lab-services/connect-virtual-machine-mac-remote-desktop.md
+10-16Lines changed: 10 additions & 16 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,7 +7,7 @@ ms.service: azure-lab-services
7
7
author: RoseHJM
8
8
ms.author: rosemalcolm
9
9
ms.topic: how-to
10
-
ms.date: 03/04/2024
10
+
ms.date: 07/08/2025
11
11
#customer intent: As a student or trainee, I want to connect to an Azure Lab Services VM from my Mac over RDP in order to use the lab resources.
12
12
---
13
13
@@ -17,17 +17,15 @@ ms.date: 03/04/2024
17
17
18
18
In this article, you learn how to connect to a lab virtual machine (VM) in Azure Lab Services from a Mac by using Remote Desktop Protocol (RDP).
19
19
20
-
## Install Microsoft Remote Desktop on a Mac
20
+
## Install Windows App on a Mac
21
21
22
-
To connect to the lab VM by using RDP, use the Microsoft Remote Desktop app.
22
+
To connect to the lab VM by using RDP, use the Windows App app.
23
23
24
-
To install the Microsoft Remote Desktop app:
24
+
To install the Windows App app:
25
25
26
-
1. Open the App Store on your Mac, and search for **Microsoft Remote Desktop**.
26
+
1. Open the App Store on your Mac, and search for **Windows App**.
27
27
28
-
:::image type="content" source="./media/connect-virtual-machine-mac-remote-desktop\install-remote-desktop.png" alt-text="Screenshot of Microsoft Remote Desktop app in the App Store." lightbox="./media/connect-virtual-machine-mac-remote-desktop\install-remote-desktop.png" :::
29
-
30
-
1. Select **Install** to install the latest version of Microsoft Remote Desktop.
28
+
1. Select **Install** to install the latest version of Windows App.
31
29
32
30
## Access the VM from your Mac using RDP
33
31
@@ -43,18 +41,14 @@ Connect to the lab VM by using the remote desktop application. You can retrieve
43
41
44
42
:::image type="content" source="./media/connect-virtual-machine-mac-remote-desktop/student-vm-connect-options.png" alt-text="Screenshot that shows VM tile for student with the RDP and SSH connection options highlighted." lightbox="./media/connect-virtual-machine-mac-remote-desktop/student-vm-connect-options.png":::
45
43
46
-
1. Open the *RDP* file on your computer with **Microsoft Remote Desktop** installed. Your computer should start to connect to the VM.
47
-
48
-
:::image type="content" source="./media/how-to-use-classroom-lab/connect-linux-vm.png" alt-text="Screenshot of Microsoft Remote Desktop app connecting to a remote VM." lightbox="./media/how-to-use-classroom-lab/connect-linux-vm.png":::
49
-
50
-
1. When prompted, enter your user name and password.
44
+
1. Open the *RDP* file on your computer with **Windows App** installed. Your computer should start to connect to the VM.
51
45
52
-
1. If you receive a certificate warning, you can select **Continue**.
53
-
54
-
:::image type="content" source="./media/how-to-use-classroom-lab/certificate-error.png" alt-text="Screenshot of certificate error for Microsoft Remote Desktop app." lightbox="./media/how-to-use-classroom-lab/certificate-error.png":::
46
+
1. When prompted, log in.
55
47
56
48
1. After the connection is established, you see the desktop of your lab VM.
57
49
50
+
For more information about using Windows App, see [Get started with Windows App to connect to devices and apps](/windows-app/get-started-connect-devices-desktops-apps?tabs=macos-avd%2Cwindows-w365%2Cwindows-devbox%2Cmacos-rds%2Cmacos-pc&pivots=azure-virtual-desktop).
51
+
58
52
## Related content
59
53
60
54
- As a student, learn to [connect to a VM using X2Go](connect-virtual-machine-linux-x2go.md).
Copy file name to clipboardExpand all lines: articles/sentinel/roles.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -100,7 +100,7 @@ Alternatively, you might want to assign the ability to read tables from within a
100
100
101
101
|Tasks |Permissions |
102
102
|---------|---------|
103
-
|**Read permissions on the default workspace**| Use a [custom Microsoft Defender XDR unified RBAC role with *data (read)*](/defender-xdr/custom-permissions-details) permissions over the Microsoft Sentinel data collection. |
103
+
|**Read permissions on the default workspace**| Use a [custom Microsoft Defender XDR unified RBAC role with ](/defender-xdr/custom-permissions-details)*[data (read)](/defender-xdr/custom-permissions-details)* permissions over the Microsoft Sentinel data collection. |
104
104
|**Read permissions on any other workspace enabled for Microsoft Sentinel in the data lake**| Use one of the following built-in roles in Azure RBAC for permissions on that workspace: <br>- [Log Analytics Reader](/azure/role-based-access-control/built-in-roles/monitor#log-analytics-reader) <br>- [Log Analytics Contributor](/azure/role-based-access-control/built-in-roles/monitor#log-analytics-contributor) <br>- [Microsoft Sentinel Contributor](/azure/role-based-access-control/built-in-roles/security#microsoft-sentinel-contributor) <br>- [Microsoft Sentinel Reader](/azure/role-based-access-control/built-in-roles/security#microsoft-sentinel-reader) <br>- [Reader](/azure/role-based-access-control/built-in-roles/general#reader)<br>- [Contributor](/azure/role-based-access-control/built-in-roles/privileged#contributor)<br>- [Owner](/azure/role-based-access-control/built-in-roles/privileged#owner)|
105
105
106
106
@@ -113,7 +113,7 @@ Microsoft Entra ID roles provides broad access across all workspaces in the data
113
113
|**Write to tables in the analytics tier using KQL jobs or notebooks**| Use one of the following Microsoft Entra ID roles: <br><br> - [Security operator](/entra/identity/role-based-access-control/permissions-reference#security-operator)<br>- [Security administrator](/entra/identity/role-based-access-control/permissions-reference#security-administrator) <br>- [Global administrator](/entra/identity/role-based-access-control/permissions-reference#global-administrator)|
114
114
|**Write to tables in the Microsoft Sentinel data lake**| Use one of the following Microsoft Entra ID roles: <br>- [Security operator](/entra/identity/role-based-access-control/permissions-reference#security-operator) <br>- [Security administrator](/entra/identity/role-based-access-control/permissions-reference#security-administrator) <br>- [Global administrator](/entra/identity/role-based-access-control/permissions-reference#global-administrator)|
115
115
116
-
Alternatively, you might want to assign the ability to write output to a specific workspace, including creating, updating, and deleted tables in that workspace. In such cases, use one of the following:
116
+
Alternatively, you might want to assign the ability to write output to a specific workspace. This can include the ability to configure connectors to that workspace, modifying retention settings for tables in the workspace, or creating, updating, and deleting custom tables in that workspace. In such cases, use one of the following:
0 commit comments