Skip to content

Commit 06b8f3a

Browse files
Merge pull request #230753 from Justinha/issue-106026
fixed links
2 parents 7e34760 + 94c0bfe commit 06b8f3a

File tree

3 files changed

+17
-10
lines changed

3 files changed

+17
-10
lines changed

articles/active-directory-domain-services/migrate-from-classic-vnet.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -179,9 +179,9 @@ Before you begin the migration process, complete the following initial checks an
179179
| Service tag | AzureActiveDirectoryDomainServices | * | Any | WinRM | 5986 | TCP | Allow | Yes | Management of your domain |
180180
| Service tag | CorpNetSaw | * | Any | RDP | 3389 | TCP | Allow | Optional | Debugging for support |
181181

182-
Make a note of this target resource group, target virtual network, and target virtual network subnet. These resource names are used during the migration process.
182+
Make a note of the target resource group, target virtual network, and target virtual network subnet. These resource names are used during the migration process.
183183

184-
Please note that the **CorpNetSaw** service tag isn't available by using Azure portal, and the network security group rule for **CorpNetSaw** has to be added by using PowerShell (powershell-create-instance.md#create-a-network-security-group).
184+
Note that the **CorpNetSaw** service tag isn't available by using Azure portal, and the network security group rule for **CorpNetSaw** has to be added by using [PowerShell](powershell-create-instance.md#create-a-network-security-group).
185185

186186
1. Check the managed domain health in the Azure portal. If you have any alerts for the managed domain, resolve them before you start the migration process.
187187
1. Optionally, if you plan to move other resources to the Resource Manager deployment model and virtual network, confirm that those resources can be migrated. For more information, see [Platform-supported migration of IaaS resources from Classic to Resource Manager][migrate-iaas].

articles/active-directory-domain-services/network-considerations.md

Lines changed: 9 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -9,8 +9,9 @@ ms.service: active-directory
99
ms.subservice: domain-services
1010
ms.workload: identity
1111
ms.topic: conceptual
12-
ms.date: 01/29/2023
12+
ms.date: 03/14/2023
1313
ms.author: justinha
14+
ms.reviewer: xyuan
1415

1516
---
1617
# Virtual network design considerations and configuration options for Azure Active Directory Domain Services
@@ -110,10 +111,13 @@ The following sections cover network security groups and Inbound and Outbound po
110111

111112
The following network security group Inbound rules are required for the managed domain to provide authentication and management services. Don't edit or delete these network security group rules for the virtual network subnet for your managed domain.
112113

113-
| Inbound port number | Protocol | Source | Destination | Action | Required | Purpose |
114-
|:-----------:|:--------:|:----------------------------------:|:-----------:|:------:|:--------:|:--------|
115-
| 5986 | TCP | AzureActiveDirectoryDomainServices | Any | Allow | Yes | Management of your domain. |
116-
| 3389 | TCP | CorpNetSaw | Any | Allow | Optional | Debugging for support. |
114+
| Source | Source service tag | Source port ranges | Destination | Service | Destination port ranges | Protocol | Action | Required | Purpose |
115+
|:-----------:|:----------------------------------:|:------------------:|:-------------:|:-------:|:-----------------------:|:--------:|:------:|:--------:|:--------|
116+
| Service tag | AzureActiveDirectoryDomainServices | * | Any | WinRM | 5986 | TCP | Allow | Yes | Management of your domain. |
117+
| Service tag | CorpNetSaw | * | Any | RDP | 3389 | TCP | Allow | Optional | Debugging for support |
118+
119+
120+
Note that the **CorpNetSaw** service tag isn't available by using Azure portal, and the network security group rule for **CorpNetSaw** has to be added by using [PowerShell](powershell-create-instance.md#create-a-network-security-group).
117121

118122
Azure AD DS also relies on the Default Security rules AllowVnetInBound and AllowAzureLoadBalancerInBound.
119123

articles/active-directory-domain-services/tutorial-configure-ldaps.md

Lines changed: 6 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -8,8 +8,9 @@ ms.service: active-directory
88
ms.subservice: domain-services
99
ms.workload: identity
1010
ms.topic: tutorial
11-
ms.date: 01/29/2023
11+
ms.date: 03/14/2023
1212
ms.author: justinha
13+
ms.reviewer: xyuan
1314

1415
#Customer intent: As an identity administrator, I want to secure access to an Azure Active Directory Domain Services managed domain using secure lightweight directory access protocol (LDAPS)
1516
---
@@ -236,11 +237,13 @@ Let's create a rule to allow inbound secure LDAP access over TCP port 636 from a
236237

237238
| Setting | Value |
238239
|-----------------------------------|--------------|
239-
| Source | IP Addresses |
240-
| Source IP addresses / CIDR ranges | A valid IP address or range for your environment |
240+
| Source | Service tag |
241+
| Source service tag | AzureActiveDirectoryDomainServices |
242+
| Source IP addresses/CIDR ranges | A valid IP address or range for your environment |
241243
| Source port ranges | * |
242244
| Destination | Any |
243245
| Destination port ranges | 636 |
246+
| Service | WinRM |
244247
| Protocol | TCP |
245248
| Action | Allow |
246249
| Priority | 401 |

0 commit comments

Comments
 (0)