Skip to content

Commit 08dd3df

Browse files
authored
Merge pull request #233533 from MicrosoftDocs/repo_sync_working_branch
Confirm merge from repo_sync_working_branch to main to sync with https://github.com/MicrosoftDocs/azure-docs (branch main)
2 parents eccb9c1 + c3c39d3 commit 08dd3df

File tree

5 files changed

+37
-32
lines changed

5 files changed

+37
-32
lines changed

articles/active-directory/devices/azuread-joined-devices-frx.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Join a new Windows 10 device with Azure AD during the out of box experience
2+
title: Join a new Windows 11 device with Azure AD during the out of box experience
33
description: How users can set up Azure AD Join during OOBE.
44

55
services: active-directory
@@ -17,7 +17,7 @@ ms.collection: M365-identity-device-management
1717
---
1818
# Azure AD join a new Windows device during the out of box experience
1919

20-
Starting in Windows 10 users can join new Windows devices to Azure AD during the first-run out-of-box experience (OOBE). This functionality enables you to distribute shrink-wrapped devices to your employees or students.
20+
Windows 11 users can join new Windows devices to Azure AD during the first-run out-of-box experience (OOBE). This functionality enables you to distribute shrink-wrapped devices to your employees or students.
2121

2222
This functionality pairs well with mobile device management platforms like [Microsoft Intune](/mem/intune/fundamentals/what-is-intune) and tools like [Windows Autopilot](/mem/autopilot/windows-autopilot) to ensure devices are configured according to your standards.
2323

articles/azure-vmware/concepts-identity.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -20,9 +20,9 @@ Azure VMware Solution private clouds are provisioned with a vCenter Server and N
2020
2121
### View the vCenter Server privileges
2222

23-
You can view the privileges granted to the Azure VMware Solution CloudAdmin role on your Azure VMware Solution private cloud vCenter Server.
23+
Use the steps to view the privileges granted to the Azure VMware Solution CloudAdmin role on your Azure VMware Solution private cloud vCenter.
2424

25-
1. Sign into the vSphere Client and go to **Menu** > **Administration**.
25+
1. Sign in to the vSphere Client and go to **Menu** > **Administration**.
2626
1. Under **Access Control**, select **Roles**.
2727
1. From the list of roles, select **CloudAdmin** and then select **Privileges**.
2828

articles/azure-vmware/configure-identity-source-vcenter.md

Lines changed: 13 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -260,17 +260,22 @@ You'll run the `Remove-ExternalIdentitySources` cmdlet to remove all existing ex
260260

261261
## Rotate an existing external identity source account's username and/or password
262262

263-
1. Use the [Get-ExternalIdentitySources](configure-identity-source-vcenter.md#list-external-identity) run command to pull current populated values.
263+
1. Rotate the password of account used for authentication with the AD source in the domain controller.
264264

265-
1. Run [Remove-ExternalIdentitySource](configure-identity-source-vcenter.md#remove-existing-external-identity-sources) and provide DomainName of External Identity source you'd like to rotate.
266-
> [!IMPORTANT]
267-
> If you do not provide a DomainName, all external identity sources will be removed.
265+
1. Select **Run command** > **Packages** > **Update-IdentitySourceCredential**.
268266

269-
1. Run [New-LDAPSIdentitySource](configure-identity-source-vcenter.md#add-active-directory-over-ldap-with-ssl) or [New-LDAPIdentitySource](configure-identity-source-vcenter.md#add-active-directory-over-ldap) depending on your configuration.
267+
1. Provide the required values and the updated password, and then select **Run**.
268+
269+
| **Field** | **Value** |
270+
| --- | --- |
271+
| **Credential** | The domain username and password used for authentication with the AD source (not cloudadmin). The user must be in the **[email protected]** format. |
272+
| **DomainName** | The FQDN of the domain, for example **avslab.local**. |
273+
274+
1. Check **Notifications** or the **Run Execution Status** pane to see the progress.
275+
276+
> [!IMPORTANT]
277+
> If you do not provide a DomainName, all external identity sources will be removed. The command **Update-IdentitySourceCredential** should be run only after the password is rotated in the domain controller.
270278
271-
>[!NOTE]
272-
>There is work to make this an easier process than it is today with a new run command.
273-
>[PR with VMware](https://github.com/vmware/PowerCLI-Example-Scripts/pull/604)
274279

275280
## Next steps
276281

articles/security/fundamentals/data-encryption-best-practices.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -74,7 +74,7 @@ Because the vast majority of attacks target the end user, the endpoint becomes o
7474
[Data encryption at rest](encryption-atrest.md) is a mandatory step toward data privacy, compliance, and data sovereignty.
7575

7676
**Best practice**: Apply disk encryption to help safeguard your data.
77-
**Detail**: Use [Azure Disk Encryption for Linux VMs](../../virtual-machines/linux/disk-encryption-overview.md) or [Azure Disk Encryption for Windows VMs](../../virtual-machines/linux/disk-encryption-overview.md). Disk Encryption combines the industry-standard Linux dm-crypt or Windows BitLocker feature to provide volume encryption for the OS and the data disks.
77+
**Detail**: Use [Azure Disk Encryption for Linux VMs](../../virtual-machines/linux/disk-encryption-overview.md) or [Azure Disk Encryption for Windows VMs](../../virtual-machines/windows/disk-encryption-overview.md). Disk Encryption combines the industry-standard Linux dm-crypt or Windows BitLocker feature to provide volume encryption for the OS and the data disks.
7878

7979
Azure Storage and Azure SQL Database encrypt data at rest by default, and many services offer encryption as an option. You can use Azure Key Vault to maintain control of keys that access and encrypt your data. See [Azure resource providers encryption model support to learn more](encryption-atrest.md#azure-resource-providers-encryption-model-support).
8080

articles/virtual-wan/nat-rules-vpn-gateway.md

Lines changed: 19 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ This configuration uses a flow table to route traffic from an external (host) IP
1919

2020
:::image type="content" source="./media/nat-rules-vpn-gateway/diagram.png" alt-text="Diagram showing architecture." lightbox="./media/nat-rules-vpn-gateway/diagram.png":::
2121

22-
In order to use NAT, VPN devices need to use any-to-any (wildcard) traffic selectors. Policy Based (narrow) traffic selectors aren't supported in conjunction with NAT configuration.
22+
To use NAT, VPN devices need to use any-to-any (wildcard) traffic selectors. Policy Based (narrow) traffic selectors aren't supported in conjunction with NAT configuration.
2323

2424
## <a name="rules"></a>Configure NAT rules
2525

@@ -31,12 +31,12 @@ NAT on a gateway device translates the source and/or destination IP addresses, b
3131

3232
* **Static NAT**: Static rules define a fixed address mapping relationship. For a given IP address, it will be mapped to the same address from the target pool. The mappings for static rules are stateless because the mapping is fixed. For example, a NAT rule created to map 10.0.0.0/24 to 192.168.0.0/24 will have a fixed 1-1 mapping. 10.0.0.0 is translated to 192.168.0.0, 10.0.0.1 is translated to 192.168.0.1, and so on.
3333

34-
* **Dynamic NAT**: For dynamic NAT, an IP address can be translated to different target IP addresses and TCP/UDP port based on availability, or with a different combination of IP address and TCP/UDP port. The latter is also called NAPT, Network Address and Port Translation. Dynamic rules will result in stateful translation mappings depending on the traffic flows at any given time. Due to the nature of Dynamic NAT and the ever changing IP/Port combinations, flows that make use of Dynamic NAT rules have to be initiated from the **Internal Mapping** (Pre-NAT) IP Range. The dynamic mapping is released once the flow is disconnected or gracefully terminated.
34+
* **Dynamic NAT**: For dynamic NAT, an IP address can be translated to different target IP addresses and TCP/UDP port based on availability, or with a different combination of IP address and TCP/UDP port. The latter is also called NAPT, Network Address and Port Translation. Dynamic rules will result in stateful translation mappings depending on the traffic flows at any given time. Due to the nature of Dynamic NAT and the ever-changing IP/Port combinations, flows that make use of Dynamic NAT rules have to be initiated from the **Internal Mapping** (Pre-NAT) IP Range. The dynamic mapping is released once the flow is disconnected or gracefully terminated.
3535

3636
Another consideration is the address pool size for translation. If the target address pool size is the same as the original address pool, use static NAT rule to define a 1:1 mapping in a sequential order. If the target address pool is smaller than the original address pool, use dynamic NAT rule to accommodate the differences.
3737

3838
> [!NOTE]
39-
> Site-to-site NAT is not supported with site-to-site VPN connections where policy based traffic selectors are used.
39+
> Site-to-site NAT is not supported with site-to-site VPN connections where policy-based traffic selectors are used.
4040
4141
:::image type="content" source="./media/nat-rules-vpn-gateway/edit-rules.png" alt-text="Screenshot showing how to edit rules."lightbox="./media/nat-rules-vpn-gateway/edit-rules.png":::
4242

@@ -56,7 +56,7 @@ Another consideration is the address pool size for translation. If the target ad
5656
* **Link Connection:** Connection resource that virtually connects a VPN site to the Azure Virtual WAN hub's site-to-site VPN gateway.
5757

5858
> [!NOTE]
59-
> If you want the site-to-site VPN gateway to advertise translated (**External Mapping**) address prefixes via BGP, click the **Enable BGP Translation** button, due to which on-premises will automatically learn the post-NAT range of Egress Rules and Azure (Virtual WAN hub, connected virtual networks, VPN and ExpressRoute branches) will automatically learn the post-NAT range of Ingress rules. The new POST NAT ranges will be shown in the Effective Routes table in a virtual hub. The **Enable Bgp Translation** setting is applied to all NAT rules on the Virtual WAN hub site-to-site VPN gateway.
59+
> If you want the site-to-site VPN gateway to advertise translated (**External Mapping**) address prefixes via BGP, click the **Enable BGP Translation** button, due to which on-premises will automatically learn the post-NAT range of Egress Rules and Azure (Virtual WAN hub, connected virtual networks, VPN and ExpressRoute branches) will automatically learn the post-NAT range of Ingress rules. The new POST NAT ranges will be shown on the Effective Routes table in a virtual hub. The **Enable Bgp Translation** setting is applied to all NAT rules on the Virtual WAN hub site-to-site VPN gateway.
6060
6161
## <a name="examples"></a>Example configurations
6262

@@ -66,15 +66,15 @@ Another consideration is the address pool size for translation. If the target ad
6666

6767
In this example, we'll NAT site1 to 172.30.0.0.0/24. The Virtual WAN spoke virtual networks and branches other will automatically learn this post-NAT address space.
6868

69-
The following diagram shows the projected end result:
69+
The following diagram shows the projected result:
7070

7171
:::image type="content" source="./media/nat-rules-vpn-gateway/diagram-bgp.png" alt-text="Diagram showing Ingress mode NAT for Sites that are BGP-enabled." lightbox="./media/nat-rules-vpn-gateway/diagram-bgp.png":::
7272

7373
1. Specify a NAT rule.
7474

75-
Specify a NAT rule to ensure the site-to-site VPN gateway is able to distinguish between the two branches with overlapping address spaces (such as 10.30.0.0/24). In this example, we focus on Link A for VPN Site 1.
75+
Specify a NAT rule to ensure the site-to-site VPN gateway can distinguish between the two branches with overlapping address spaces (such as 10.30.0.0/24). In this example, we focus on Link A for VPN Site 1.
7676

77-
The following NAT rule can be set up and associated to Link A. Because this is a static NAT rule, the address spaces of the **Internal Mapping** and **External Mapping** contain the same number of IP addresses.
77+
The following NAT rule can be set up and associated with Link A. Because this is a static NAT rule, the address spaces of the **Internal Mapping** and **External Mapping** contain the same number of IP addresses.
7878

7979
* **Name:** ingressRule01
8080
* **Type:** Static
@@ -87,9 +87,9 @@ The following diagram shows the projected end result:
8787

8888
:::image type="content" source="./media/nat-rules-vpn-gateway/enable-bgp.png" alt-text="Screenshot showing how to enable BGP translation.":::
8989

90-
1. Ensure the site-to-site VPN gateway is able to peer with the on-premises BGP peer.
90+
1. Ensure the site-to-site VPN gateway can peer with the on-premises BGP peer.
9191

92-
In this example, the **Ingress NAT Rule** will need to translate 10.30.0.132 to 172.30.0.132. In order to do that, click 'Edit VPN site' to configure VPN site Link A BGP address to reflect this translated BGP peer address (172.30.0.132).
92+
In this example, the **Ingress NAT Rule** will need to translate 10.30.0.132 to 172.30.0.132. To do that, click 'Edit VPN site' to configure VPN site Link A BGP address to reflect this translated BGP peer address (172.30.0.132).
9393

9494
:::image type="content" source="./media/nat-rules-vpn-gateway/edit-site-bgp.png" alt-text="Screenshot showing how to change the BGP peering IP."lightbox="./media/nat-rules-vpn-gateway/edit-site-bgp.png":::
9595

@@ -114,9 +114,9 @@ In this example, we'll NAT VPN site 1 to 172.30.0.0.0/24. However, because the V
114114

115115
1. Specify a NAT rule.
116116

117-
Specify a NAT rule to ensure the site-to-site VPN gateway is able to distinguish between the two branches with the same address space 10.30.0.0/24. In this example, we focus on Link A for VPN Site 1.
117+
Specify a NAT rule to ensure the site-to-site VPN gateway can distinguish between the two branches with the same address space 10.30.0.0/24. In this example, we focus on Link A for VPN Site 1.
118118

119-
The following NAT rule can be set up and associated to Link A of one of VPN site 1. Because this is a static NAT rule, the address spaces of the **Internal Mapping** and **External Mapping** contain the same number of IP addresses.
119+
The following NAT rule can be set up and associated with Link A of one of VPN site 1. Because this is a static NAT rule, the address spaces of the **Internal Mapping** and **External Mapping** contain the same number of IP addresses.
120120

121121
* **Name**: IngressRule01
122122
* **Type**: Static
@@ -155,7 +155,7 @@ In the preceding examples, an on-premises device wants to reach a resource in a
155155
* Source IP Address: 10.200.0.4
156156
* Destination IP Address: **172.30.0.4**
157157

158-
1. Traffic enters the site-to-site VPN gateway and the translation is reversed and sent to on-premises.
158+
1. Traffic enters the site-to-site VPN gateway, and the translation is reversed and sent to on-premises.
159159
* Source IP Address: 10.200.0.4
160160
* Destination IP Address: **10.30.0.4**
161161

@@ -187,25 +187,25 @@ From the previous example:
187187

188188
#### Validate address prefixes
189189

190-
This example applies to resources in virtual networks that are associated to the DefaultRouteTable.
190+
This example applies to resources in virtual networks that are associated with the DefaultRouteTable.
191191

192-
The **Effective Routes** on the Network Interface Cards (NIC) of any virtual machine that is sitting in a spoke virtual network connected to the virtual WAN hub should also contain the address prefixes of the **External Mapping** specified in the **Ingress NAT rule**.
192+
The **Effective Routes** on Network Interface Cards (NIC) of any virtual machine that is sitting in a spoke virtual network connected to the virtual WAN hub should also contain the address prefixes of the **External Mapping** specified in the **Ingress NAT rule**.
193193

194194
The on-premises device should also contain routes for prefixes contained within the **External Mapping** of **Egress NAT rules**.
195195

196196
#### Common configuration patterns
197197

198198
> [!NOTE]
199-
> Site-to-site NAT is not supported with site-to-site VPN connections where policy based traffic selectors are used.
199+
> Site-to-site NAT is not supported with site-to-site VPN connections where policy-based traffic selectors are used.
200200
201201
The following table shows common configuration patterns that arise when configuring different types of NAT rules on the site-to-site VPN gateway.
202202

203203
| Type of VPN site | Ingress NAT rules | Egress NAT rules
204204
|--- |--- | ---|
205-
|VPN site with statically configured routes |Edit 'Private Address Space' in the VPN Site to contain the **External Mapping** of the NAT rule.| Apply routes for the **External Mapping** of the NAT rule on the on-premises device.|
206-
|VPN site (BGP translation enabled)|Put the **External Mapping** address of the BGP peer in the VPN site Link Connection's BGP address. | No special considerations. |
207-
| VPN site (BGP translation disabled) | Ensure the on-premises BGP Speaker advertises the prefixes in the **External Mapping** of the NAT rule. Also put the External Mapping address of the BGP peer in the VPN site Link Connection's BGP address.| Apply routes for the **External Mapping** of the NAT rule on the on-premises device.|
205+
|VPN site with statically configured routes |Edit 'Private Address Space' in the VPN Site to contain the **External Mapping** of the NAT rule. | Apply routes for the **External Mapping** of the NAT rule on the on-premises device. |
206+
|VPN site (BGP translation enabled) |Put the **External Mapping** address of the BGP peer in the VPN site Link Connection's BGP address. | No special considerations. |
207+
| VPN site (BGP translation disabled) | Ensure the on-premises BGP Speaker advertises the prefixes in the **External Mapping** of the NAT rule. Also put the External Mapping address of the BGP peer in the VPN site Link Connection's BGP address. | Apply routes for the **External Mapping** of the NAT rule on the on-premises device.|
208208

209209
## Next steps
210210

211-
For more information about site-to-site configurations, see [Configure a Virtual WAN site-to-site connection](virtual-wan-site-to-site-portal.md).
211+
For more information about site-to-site configurations, see [Configure a Virtual WAN site-to-site connection] (virtual-wan-site-to-site-portal.md).

0 commit comments

Comments
 (0)