Skip to content

Commit 0415f4d

Browse files
authored
Merge pull request #180228 from MicrosoftDocs/master
11/17 AM Publish
2 parents 5e54164 + b171b62 commit 0415f4d

File tree

140 files changed

+10894
-531
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

140 files changed

+10894
-531
lines changed

.openpublishing.redirection.json

Lines changed: 26 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9843,7 +9843,7 @@
98439843
},
98449844
{
98459845
"source_path_from_root": "/articles/azure-supportability/low-priority-quota.md",
9846-
"redirect_url": "/azure/azure-portal/supportability/low-priority-quota",
9846+
"redirect_url": "/azure/azure-portal/supportability/spot-quota",
98479847
"redirect_document_id": true
98489848
},
98499849
{
@@ -9876,6 +9876,11 @@
98769876
"redirect_url": "/azure/azure-portal/supportability/sku-series-unavailable",
98779877
"redirect_document_id": true
98789878
},
9879+
{
9880+
"source_path_from_root": "/articles/azure-portal/supportability/low-priority-quota.md",
9881+
"redirect_url": "/azure/azure-portal/supportability/spot-quota",
9882+
"redirect_document_id": false
9883+
},
98799884
{
98809885
"source_path_from_root": "/articles/managed-applications/concepts-custom-providers-built-in-policy.md",
98819886
"redirect_url": "/azure/azure-resource-manager/custom-providers/concepts-built-in-policy",
@@ -46326,6 +46331,26 @@
4632646331
"redirect_url": "/azure/sentinel/monitor-your-data",
4632746332
"redirect_document_id": false
4632846333
},
46334+
{
46335+
"source_path": "articles/sentinel/connect-azure-security-center.md",
46336+
"redirect_url": "/azure/sentinel/connect-defender-for-cloud",
46337+
"redirect_document_id": false
46338+
},
46339+
{
46340+
"source_path": "articles/sentinel/entities-in-azure-sentinel.md",
46341+
"redirect_url": "/azure/sentinel/entities",
46342+
"redirect_document_id": false
46343+
},
46344+
{
46345+
"source_path": "articles/sentinel/azure-sentinel-billing.md",
46346+
"redirect_url": "/azure/sentinel/billing",
46347+
"redirect_document_id": false
46348+
},
46349+
{
46350+
"source_path": "articles/sentinel/automation-in-azure-sentinel.md",
46351+
"redirect_url": "/azure/sentinel/automation",
46352+
"redirect_document_id": false
46353+
},
4632946354
{
4633046355
"source_path": "articles/virtual-desktop/connect-android.md",
4633146356
"redirect_url": "/azure/virtual-desktop/user-documentation/connect-android",

articles/active-directory/app-provisioning/use-scim-to-provision-users-and-groups.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -206,7 +206,7 @@ Use the general guidelines when implementing a SCIM endpoint to ensure compatibi
206206

207207
##### /Users:
208208
* The entitlements attribute is not supported.
209-
* Any attributes that are considered for user uniqueness must be usable as part of a filtered query. (e.g. if user uniqueness is evaluated for both userName and emails[type eq "work"], a GET to /Users with a filter must allow for both _userName eq "[email protected]"_ and _emails[type eq "work"] eq "[email protected]"_ queries.
209+
* Any attributes that are considered for user uniqueness must be usable as part of a filtered query. (e.g. if user uniqueness is evaluated for both userName and emails[type eq "work"], a GET to /Users with a filter must allow for both _userName eq "[email protected]"_ and _emails[type eq "work"].value eq "[email protected]"_ queries.
210210

211211
##### /Groups:
212212
* Groups are optional, but only supported if the SCIM implementation supports **PATCH** requests.

articles/active-directory/authentication/how-to-mfa-number-match.md

Lines changed: 6 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 11/12/2021
9+
ms.date: 11/17/2021
1010

1111
ms.author: justinha
1212
author: mjsantani
@@ -21,11 +21,12 @@ ms.collection: M365-identity-device-management
2121
This topic covers how to enable number matching in Microsoft Authenticator push notifications to improve user sign-in security.
2222

2323
>[!NOTE]
24-
>Number matching is a key security upgrade to traditional second factor notifications in the Microsoft Authenticator app that will be enabled by default for all tenants at some point after general availability (GA). We highly recommend enabling number matching in the near-term for improved sign-in security.
24+
>Number matching is a key security upgrade to traditional second factor notifications in the Microsoft Authenticator app that will be enabled by default for all tenants a few months after general availability (GA).<br>
25+
>We highly recommend enabling number matching in the near-term for improved sign-in security.
2526
2627
## Prerequisites
2728

28-
Your organization will need to enable Microsoft Authenticator (traditional second factor) push notifications for some users or groups using the new Authentication Methods Policy API. For a consistent experience, upgrade to the latest versions of the AD FS adapter and NPS extension.
29+
Your organization will need to enable Microsoft Authenticator (traditional second factor) push notifications for some users or groups using the new Authentication Methods Policy API. If your organization is using ADFS adapter or NPS extensions, please upgrade to the latest versions for a consistent experience.
2930

3031
## Number matching
3132

@@ -52,7 +53,7 @@ When a user responds to an MFA push notification using Microsoft Authenticator,
5253
During self-service password reset, Microsoft Authenticator notification will show a number that the user will need to type in their Authenticator app notification. This number will only be seen to users who have been enabled for number matching.
5354

5455
>[!NOTE]
55-
>Number matching for admin roles during SSPR is initially pending and unavailable for a couple days.
56+
>Number matching for admin roles during SSPR is pending and unavailable for a couple days.
5657
5758
### Combined registration
5859

@@ -246,7 +247,7 @@ To enable number matching in the Azure AD portal, complete the following steps:
246247

247248
## Known issues
248249

249-
- Number matching for admin roles during SSPR is initially pending and unavailable for a couple days.
250+
- Number matching for admin roles during SSPR is pending and unavailable for a couple days.
250251

251252
## Next steps
252253

19.6 KB
Loading

articles/active-directory/fundamentals/users-default-permissions.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -49,7 +49,7 @@ Users can register application | Setting this option to No prevents users from c
4949
Allow users to connect work or school account with LinkedIn | Setting this option to No prevents users from connecting their work or school account with their LinkedIn account. For more information, see [LinkedIn account connections data sharing and consent](../enterprise-users/linkedin-user-consent.md).
5050
Ability to create security groups | Setting this option to No prevents users from creating security groups. Global administrators and User administrators can still create security groups. See [Azure Active Directory cmdlets for configuring group settings](../enterprise-users/groups-settings-cmdlets.md) to learn how.
5151
Ability to create Microsoft 365 groups | Setting this option to No prevents users from creating Microsoft 365 groups. Setting this option to Some allows a select set of users to create Microsoft 365 groups. Global administrators and User administrators will still be able to create Microsoft 365 groups. See [Azure Active Directory cmdlets for configuring group settings](../enterprise-users/groups-settings-cmdlets.md) to learn how.
52-
Restrict access to Azure AD administration portal | <p>Setting this option to No lets non-administrators use the Azure AD administration portal to read and manage Azure AD resources. Yes restricts all non-administrators from accessing any Azure AD data in the administration portal.</p><p>**Note**: this setting does not restrict access to Azure AD data using PowerShell or other clients such as Visual Studio.When set to Yes, to grant a specific non-admin user the ability to use the Azure AD administration portal assign any administrative role such as the Directory Readers role.</p><p>**Note**: this settings will block non-admin users who are owners of groups or applications from using the Azure portal to manage their owned resources.</p><p>This role allows reading basic directory information, which member users have by default (guests and service principals do not).</p>
52+
Restrict access to Azure AD administration portal | <p>Setting this option to No lets non-administrators use the Azure AD administration portal to read and manage Azure AD resources. Yes restricts all non-administrators from accessing any Azure AD data in the administration portal.</p><p>**Note**: this setting does not restrict access to Azure AD data using PowerShell or other clients such as Visual Studio.When set to Yes, to grant a specific non-admin user the ability to use the Azure AD administration portal assign any administrative role such as the Directory Readers role.</p><p>**Note**: this settings will block non-admin users who are owners of groups or applications from using the Azure portal to manage their owned resources.</p><p>This role allows reading basic directory information, which member users have by default (guests and service principals do not).</p><p>**Note**: this setting does not restrict access as long as a user is assigned a custom role or any role for that matter and is not just a user.</p>
5353
Ability to read other users | This setting is available in PowerShell only. Setting this flag to $false prevents all non-admins from reading user information from the directory. This flag does not prevent reading user information in other Microsoft services like Exchange Online. This setting is meant for special circumstances, and setting this flag to $false is not recommended.
5454

5555
>[!NOTE]

articles/active-directory/hybrid/how-to-connect-staged-rollout.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -64,6 +64,8 @@ The following scenarios are supported for staged rollout. The feature works only
6464

6565
- Windows 10 Hybrid Join or Azure AD Join primary refresh token acquisition without line-of-sight to the federation server for Windows 10 version 1903 and newer, when user’s UPN is routable and domain suffix is verified in Azure AD.
6666

67+
- Autopilot enrollment is supported in Staged rollout with Windows 10 version 1909 or later.
68+
6769
## Unsupported scenarios
6870

6971
The following scenarios are not supported for staged rollout:
@@ -93,8 +95,6 @@ The following scenarios are not supported for staged rollout:
9395

9496
- If you have a Windows Hello for Business hybrid certificate trust with certs that are issued via your federation server acting as Registration Authority or smartcard users, the scenario isn't supported on a staged rollout.
9597

96-
- Autopilot enrollment is not supported in Staged rollout. Users enabled for Staged rollout will continue using federated authentication at autopilot enrollment time. If your device has Windows 10 version 1903 or later, after autopilot enrollment, all auth requests will go through Staged rollout.
97-
9898
>[!NOTE]
9999
>You still need to make the final cutover from federated to cloud authentication by using Azure AD Connect or PowerShell. Staged rollout doesn't switch domains from federated to managed. For more information about domain cutover, see [Migrate from federation to password hash synchronization](./migrate-from-federation-to-cloud-authentication.md) and [Migrate from federation to pass-through authentication](./migrate-from-federation-to-cloud-authentication.md).
100100

articles/active-directory/hybrid/whatis-azure-ad-connect-v2.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -98,14 +98,14 @@ We expect TLS 1.0/1.1 to be deprecated in January 2022, and you need to make sur
9898
In June 2022, ADAL will go out of support. When ADAL goes out of support authentication may stop working unexpectedly and this will block the Azure AD Connect server from working properly. We strongly advise you to upgrade to Azure AD Connect V2.0 before June 2022. You cannot upgrade to a supported authentication library with your current Azure AD Connect version.
9999

100100
**After upgrading to 2.0 the ADSync PowerShell cmdlets do not work?** </br>
101-
This is a known issue. To resolve this, restart your PowerShell session after installing or upgrading to version 2.0 and then re-import the module. Use the following instructions to import the module.
101+
This is a known issue. To resolve this, restart your PowerShell session after installing or upgrading to version 2.0 and then re-import the module. Use the following instructions to import the module.
102102

103-
1. Open Windows PowerShell with administrative privileges
104-
2. Type or copy and paste the following:
105-
``` powershell
106-
Import-module -Name "C:\Program Files\Microsoft Azure AD Sync\Bin\ADSync"
107-
```
103+
1. Open Windows PowerShell with administrative privileges.
104+
1. Type or copy and paste the following code:
108105

106+
```powershell
107+
Import-module -Name "C:\Program Files\Microsoft Azure AD Sync\Bin\ADSync"
108+
```
109109
110110
## License requirements for using Azure AD Connect V2.0
111111

articles/active-directory/saas-apps/bic-cloud-design-provisioning-tutorial.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ ms.author: Thwimmer
2020

2121
# Tutorial: Configure BIC Cloud Design for automatic user provisioning
2222

23-
This tutorial describes the steps you need to perform in both BIC Cloud Design and Azure Active Directory (Azure AD) to configure automatic user provisioning. When configured, Azure AD automatically provisions and de-provisions users and groups to [BIC Cloud Design](https://www.gbtec.de/) using the Azure AD Provisioning service. For important details on what this service does, how it works, and frequently asked questions, see [Automate user provisioning and deprovisioning to SaaS applications with Azure Active Directory](../app-provisioning/user-provisioning.md).
23+
This tutorial describes the steps you need to perform in both BIC Cloud Design and Azure Active Directory (Azure AD) to configure automatic user provisioning. When configured, Azure AD automatically provisions and de-provisions users and groups to [BIC Cloud Design](https://www.gbtec.com/) using the Azure AD Provisioning service. For important details on what this service does, how it works, and frequently asked questions, see [Automate user provisioning and deprovisioning to SaaS applications with Azure Active Directory](../app-provisioning/user-provisioning.md).
2424

2525

2626
## Capabilities supported
@@ -37,7 +37,7 @@ The scenario outlined in this tutorial assumes that you already have the followi
3737

3838
* [An Azure AD tenant](../develop/quickstart-create-new-tenant.md).
3939
* A user account in Azure AD with [permission](../roles/permissions-reference.md) to configure provisioning (for example, Application Administrator, Cloud Application administrator, Application Owner, or Global Administrator).
40-
40+
* BIC Cloud Design User Management API enabled subscription.
4141

4242
## Step 1. Plan your provisioning deployment
4343
1. Learn about [how the provisioning service works](../app-provisioning/user-provisioning.md).
@@ -73,7 +73,7 @@ This section guides you through the steps to configure the Azure AD provisioning
7373

7474
1. In the applications list, select **BIC Cloud Design**.
7575

76-
![The Contoso link in the Applications list](common/all-applications.png)
76+
![The BIC Cloud Design link in the Applications list](common/all-applications.png)
7777

7878
1. Select the **Provisioning** tab.
7979

@@ -97,7 +97,7 @@ This section guides you through the steps to configure the Azure AD provisioning
9797

9898
1. Review the user attributes that are synchronized from Azure AD to BIC Cloud Design in the **Attribute-Mapping** section. The attributes selected as **Matching** properties are used to match the user accounts in BIC Cloud Design for update operations. If you choose to change the [matching target attribute](../app-provisioning/customize-application-attributes.md), you will need to ensure that the BIC Cloud Design API supports filtering users based on that attribute. Select the **Save** button to commit any changes.
9999

100-
|Attribute|Type|Supported for filtering|Required by Real Links|
100+
|Attribute|Type|Supported for filtering|Required by BIC Cloud Design|
101101
|---|---|---|---|
102102
|userName|String|&check;|&check;
103103
|emails[type eq "work"].value|String|&check;|&check;
@@ -110,7 +110,7 @@ This section guides you through the steps to configure the Azure AD provisioning
110110

111111
1. Review the group attributes that are synchronized from Azure AD to BIC Cloud Design in the **Attribute-Mapping** section. The attributes selected as **Matching** properties are used to match the groups in BIC Cloud Design for update operations. Select the **Save** button to commit any changes.
112112

113-
|Attribute|Type|Supported for filtering|Required by Real Links|
113+
|Attribute|Type|Supported for filtering|Required by BIC Cloud Design|
114114
|---|---|---|---|
115115
|displayName|String|&check;|&check;
116116
|externalId|String||&check;
13.1 KB
Loading

0 commit comments

Comments
 (0)