Skip to content

Commit 02d7b07

Browse files
authored
Merge pull request #200599 from MicrosoftDocs/repo_sync_working_branch
Confirm merge from repo_sync_working_branch to main to sync with https://github.com/MicrosoftDocs/azure-docs (branch main)
2 parents c104f73 + d353b6c commit 02d7b07

File tree

13 files changed

+31
-30
lines changed

13 files changed

+31
-30
lines changed

articles/active-directory/enterprise-users/groups-dynamic-rule-more-efficient.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -31,8 +31,8 @@ Minimize the usage of the 'match' operator in rules as much as possible. Instead
3131

3232
It's better to use rules like:
3333

34-
- `user.city -contains "ago,"`
35-
- `user.city -startswith "Lag,"`
34+
- `user.city -contains "ago"`
35+
- `user.city -startswith "Lag"`
3636

3737
Or, best of all:
3838

articles/active-directory/fundamentals/active-directory-access-create-new-tenant.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -41,10 +41,10 @@ After you sign in to the Azure portal, you can create a new tenant for your orga
4141

4242
1. Select **Next: Configuration** to move on to the Configuration tab.
4343

44+
1. On the Configuration tab, enter the following information:
45+
4446
![Azure Active Directory - Create a tenant page - configuration tab ](media/active-directory-access-create-new-tenant/azure-ad-create-new-tenant.png)
4547

46-
1. On the Configuration tab, enter the following information:
47-
4848
- Type _Contoso Organization_ into the **Organization name** box.
4949

5050
- Type _Contosoorg_ into the **Initial domain name** box.

articles/active-directory/fundamentals/security-operations-devices.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -87,11 +87,11 @@ You can create an alert that notifies appropriate administrators when a device i
8787
```
8888
Sign-in logs
8989
90-
| where ResourceDisplayName == Device Registration Service
90+
| where ResourceDisplayName == "Device Registration Service"
9191
92-
| where conditionalAccessStatus ==success
92+
| where conditionalAccessStatus == "success"
9393
94-
| where AuthenticationRequirement <> multiFactorAuthentication
94+
| where AuthenticationRequirement <> "multiFactorAuthentication"
9595
```
9696

9797
You can also use [Microsoft Intune to set and monitor device compliance policies](/mem/intune/protect/device-compliance-get-started).
@@ -104,7 +104,7 @@ It might not be possible to block access to all cloud and software-as-a-service
104104

105105
| What to monitor| Risk Level| Where| Filter/sub-filter| Notes |
106106
| - |- |- |- |- |
107-
| Sign-ins by non-compliant devices| High| Sign-in logs| DeviceDetail.isCompliant ==false| If requiring sign-in from compliant devices, alert when:<br><li> any sign in by non-compliant devices.<li> any access without MFA or a trusted location.<p>If working toward requiring devices, monitor for suspicious sign-ins.<br>[Azure Sentinel template](https://github.com/Azure/Azure-Sentinel/blob/master/Hunting%20Queries/SigninLogs/SuspiciousSignintoPrivilegedAccount.yaml) |
107+
| Sign-ins by non-compliant devices| High| Sign-in logs| DeviceDetail.isCompliant == false| If requiring sign-in from compliant devices, alert when:<br><li> any sign in by non-compliant devices.<li> any access without MFA or a trusted location.<p>If working toward requiring devices, monitor for suspicious sign-ins.<br>[Azure Sentinel template](https://github.com/Azure/Azure-Sentinel/blob/master/Hunting%20Queries/SigninLogs/SuspiciousSignintoPrivilegedAccount.yaml) |
108108
| Sign-ins by unknown devices| Low| Sign-in logs| <li>DeviceDetail is empty<li>Single factor authentication<li>From a non-trusted location| Look for: <br><li>any access from out of compliance devices.<li>any access without MFA or trusted location |
109109

110110

@@ -115,9 +115,9 @@ It might not be possible to block access to all cloud and software-as-a-service
115115
```
116116
SigninLogs
117117
118-
| where DeviceDetail.isCompliant ==false
118+
| where DeviceDetail.isCompliant == false
119119
120-
| where conditionalAccessStatus == success
120+
| where conditionalAccessStatus == "success"
121121
```
122122

123123

@@ -149,15 +149,15 @@ Attackers who have compromised a user’s device may retrieve the [BitLocker](/w
149149

150150
| What to monitor| Risk Level| Where| Filter/sub-filter| Notes |
151151
| - |- |- |- |- |
152-
| Key retrieval| Medium| Audit logs| OperationName == "Read BitLocker key| Look for <br><li>key retrieval`<li> other anomalous behavior by users retrieving keys. |
152+
| Key retrieval| Medium| Audit logs| OperationName == "Read BitLocker key"| Look for <br><li>key retrieval`<li> other anomalous behavior by users retrieving keys. |
153153

154154

155155
In LogAnalytics create a query such as
156156

157157
```
158158
AuditLogs
159159
160-
| where OperationName == "Read BitLocker key
160+
| where OperationName == "Read BitLocker key"
161161
```
162162

163163
## Device administrator roles

articles/azure-arc/data/create-complete-managed-instance-indirectly-connected.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -160,7 +160,7 @@ NAME STATE
160160
<namespace> Ready
161161
```
162162

163-
## Create Azure Arc-enabled SQL Managed Instance
163+
## Create an instance of Azure Arc-enabled SQL Managed Instance
164164

165165
Now, we can create the Azure MI for indirectly connected mode with the following command:
166166

@@ -188,4 +188,4 @@ To connect with Azure Data Studio, see [Connect to Azure Arc-enabled SQL Managed
188188

189189
## Next steps
190190

191-
[Upload usage data, metrics, and logs to Azure](upload-metrics-and-logs-to-azure-monitor.md).
191+
[Upload usage data, metrics, and logs to Azure](upload-metrics-and-logs-to-azure-monitor.md).

articles/cloud-services-extended-support/override-sku.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ Setting the **allowModelOverride** property to `true` here will update the cloud
3333
"packageUrl": "[parameters('packageSasUri')]",
3434
"configurationUrl": "[parameters('configurationSasUri')]",
3535
"upgradeMode": "[parameters('upgradeMode')]",
36-
allowModelOverride: true,
36+
"allowModelOverride": true,
3737
"roleProfile": {
3838
"roles": [
3939
{

articles/postgresql/flexible-server/quickstart-create-connect-server-vnet.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -129,7 +129,7 @@ ssh -i .\Downloads\myKey1.pem [email protected]
129129
You need to install the postgresql-client tool to be able to connect to the server.
130130

131131
```bash
132-
sudo apt-getupdate
132+
sudo apt-get update
133133
sudo apt-get install postgresql-client
134134
```
135135

articles/virtual-machines/co-location.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,8 @@ Proximity placement groups offer colocation in the same data center. However, be
4343

4444
- When you ask for the first virtual machine in the proximity placement group, the data center is automatically selected. In some cases, a second request for a different virtual machine SKU, may fail if it doesn't exist in that data center. In this case, an **OverconstrainedAllocationRequest** error is returned. To avoid this, try changing the order in which you deploy your SKUs or have both resources deployed using a single ARM template.
4545
- In the case of elastic workloads, where you add and remove VM instances, having a proximity placement group constraint on your deployment may result in a failure to satisfy the request resulting in **AllocationFailure** error.
46-
- Stopping (deallocate) and starting your VMs as needed is another way to achieve elasticity. Since the capacity is not kept once you stop (deallocate) a VM, starting it again may result in an **AllocationFailure** error.
46+
- Stopping (deallocate) and starting your VMs as needed is another way to achieve elasticity. Since the capacity is not kept once you stop (deallocate) a VM, starting it again may result in an **AllocationFailure** error.
47+
- VM start and redeploy operations will continue to respect the Proximity Placement Group once sucessfully configured.
4748

4849
## Planned maintenance and Proximity Placement Groups
4950

articles/virtual-machines/extensions/key-vault-windows.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -294,9 +294,9 @@ The Key Vault VM extension logs only exist locally on the VM and are most inform
294294
|Location|Description|
295295
|--|--|
296296
| C:\WindowsAzure\Logs\WaAppAgent.log | Shows when an update to the extension occurred. |
297-
| C:\WindowsAzure\Logs\Plugins\Microsoft.Azure.KeyVault.KeyVaultForWindows\<most recent version\>\ | Shows the status of certificate download. The download location will always be the Windows computer's MY store (certlm.msc). |
298-
| C:\Packages\Plugins\Microsoft.Azure.KeyVault.KeyVaultForWindows\<most recent version\>\RuntimeSettings\ | The Key Vault VM Extension service logs show the status of the akvvm_service service. |
299-
| C:\Packages\Plugins\Microsoft.Azure.KeyVault.KeyVaultForWindows\<most recent version\>\Status\ | The configuration and binaries for Key Vault VM Extension service. |
297+
| C:\WindowsAzure\Logs\Plugins\Microsoft.Azure.KeyVault.KeyVaultForWindows\\\<most recent version\>\ | Shows the status of certificate download. The download location will always be the Windows computer's MY store (certlm.msc). |
298+
| C:\Packages\Plugins\Microsoft.Azure.KeyVault.KeyVaultForWindows\\\<most recent version\>\RuntimeSettings\ | The Key Vault VM Extension service logs show the status of the akvvm_service service. |
299+
| C:\Packages\Plugins\Microsoft.Azure.KeyVault.KeyVaultForWindows\\\<most recent version\>\Status\ | The configuration and binaries for Key Vault VM Extension service. |
300300
|||
301301

302302

articles/virtual-machines/extensions/update-linux-agent.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -379,15 +379,15 @@ Open [the release of Azure Linux Agent in GitHub](https://github.com/Azure/WALin
379379

380380
For version 2.2.x or later, type:
381381
```bash
382-
wget https://github.com/Azure/WALinuxAgent/archive/v2.2.x.zip
382+
wget https://github.com/Azure/WALinuxAgent/archive/refs/tags/v2.2.x.zip
383383
unzip v2.2.x.zip
384384
cd WALinuxAgent-2.2.x
385385
```
386386

387-
The following line uses version 2.2.0 as an example:
387+
The following line uses version 2.2.14 as an example:
388388

389389
```bash
390-
wget https://github.com/Azure/WALinuxAgent/archive/v2.2.14.zip
390+
wget https://github.com/Azure/WALinuxAgent/archive/refs/tags/v2.2.14.zip
391391
unzip v2.2.14.zip
392392
cd WALinuxAgent-2.2.14
393393
```

articles/virtual-machines/linux/ssh-from-windows.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -56,7 +56,7 @@ You can also create key pairs with the [Azure CLI](/cli/azure) with the [az sshk
5656
To create an SSH key pair on your local computer using the `ssh-keygen` command from PowerShell or a command prompt, type the following:
5757

5858
```powershell
59-
ssh-keygen -m PEM -t rsa -b 4096
59+
ssh-keygen -m PEM -t rsa -b 2048
6060
```
6161

6262
Enter a filename, or use the default shown in parenthesis (for example `C:\Users\username/.ssh/id_rsa`). Enter a passphrase for the file, or leave the passphrase blank if you do not want to use a passphrase.

0 commit comments

Comments
 (0)