Skip to content

Commit 0e5c217

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into catchpoint-tutorial
2 parents 8e9ed19 + abefefc commit 0e5c217

File tree

560 files changed

+6079
-4790
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

560 files changed

+6079
-4790
lines changed

.openpublishing.redirection.json

Lines changed: 61 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1995,6 +1995,26 @@
19951995
"redirect_url": "/azure/cognitive-services/bing-video-search/quickstarts/client-libraries?pivots=programming-language-python",
19961996
"redirect_document_id": false
19971997
},
1998+
{
1999+
"source_path": "articles/cognitive-services/bing-visual-search/visual-search-sdk-c-sharp.md",
2000+
"redirect_url": "/azure/cognitive-services/bing-visual-search/quickstarts/client-libraries?pivots=programming-language-csharp",
2001+
"redirect_document_id": false
2002+
},
2003+
{
2004+
"source_path": "articles/cognitive-services/bing-visual-search/visual-search-sdk-java.md",
2005+
"redirect_url": "/azure/cognitive-services/bing-visual-search/quickstarts/client-libraries?pivots=programming-language-java",
2006+
"redirect_document_id": false
2007+
},
2008+
{
2009+
"source_path": "articles/cognitive-services/bing-visual-search/visual-search-sdk-node.md",
2010+
"redirect_url": "/azure/cognitive-services/bing-visual-search/quickstarts/client-libraries?pivots=programming-language-javascript",
2011+
"redirect_document_id": false
2012+
},
2013+
{
2014+
"source_path": "articles/cognitive-services/bing-visual-search/visual-search-sdk-python.md",
2015+
"redirect_url": "/azure/cognitive-services/bing-visual-search/quickstarts/client-libraries?pivots=programming-language-python",
2016+
"redirect_document_id": false
2017+
},
19982018
{
19992019
"source_path": "articles/virtual-machines/linux/classic/rdma-cluster.md",
20002020
"redirect_url": "/azure/virtual-machines/linux/sizes-hpc#rdma-capable-instances",
@@ -2902,7 +2922,7 @@
29022922
},
29032923
{
29042924
"source_path": "articles/machine-learning/service/overview-more-machine-learning.md",
2905-
"redirect_url": "/azure/architecture/data-guide/technology-choices/data-science-and-machine-learning",
2925+
"redirect_url": "https://docs.microsoft.com/azure/architecture/data-guide/technology-choices/data-science-and-machine-learning",
29062926
"redirect_document_id": false
29072927
},
29082928
{
@@ -2982,7 +3002,7 @@
29823002
},
29833003
{
29843004
"source_path": "articles/machine-learning/service/support-for-aml-services.md",
2985-
"redirect_url": "https://aka.ms/aml-forum-service",
3005+
"redirect_url": "https://social.msdn.microsoft.com/Forums/home?forum=AzureMachineLearningService",
29863006
"redirect_document_id": false
29873007
},
29883008
{
@@ -3072,17 +3092,17 @@
30723092
},
30733093
{
30743094
"source_path": "articles/machine-learning/studio/live-chat.md",
3075-
"redirect_url": "https://social.msdn.microsoft.com/Forums/en-US/home?forum=MachineLearning",
3095+
"redirect_url": "https://social.msdn.microsoft.com/Forums/home?forum=MachineLearning",
30763096
"redirect_document_id": false
30773097
},
30783098
{
30793099
"source_path": "articles/machine-learning/studio/datamarket-deprecation.md",
3080-
"redirect_url": "https://microsoft.com/cognitive",
3100+
"redirect_url": "https://azure.microsoft.com/services/cognitive-services/",
30813101
"redirect_document_id": false
30823102
},
30833103
{
30843104
"source_path": "articles/machine-learning/r-developers-guide.md",
3085-
"redirect_url": "/azure/architecture/data-guide/technology-choices/r-developers-guide",
3105+
"redirect_url": "https://docs.microsoft.com/azure/architecture/data-guide/technology-choices/r-developers-guide",
30863106
"redirect_document_id": false
30873107
},
30883108
{
@@ -15161,7 +15181,7 @@
1516115181
},
1516215182
{
1516315183
"source_path": "articles/machine-learning/service/how-to-create-portal-experiments.md",
15164-
"redirect_url": "/azure/machine-learning/how-to-create-portal-experiments",
15184+
"redirect_url": "/azure/machine-learning/tutorial-first-experiment-automated-ml",
1516515185
"redirect_document_id": false
1516615186
},
1516715187
{
@@ -29744,6 +29764,26 @@
2974429764
"redirect_url": "/azure/sentinel/fusion",
2974529765
"redirect_document_id": false
2974629766
},
29767+
{
29768+
"source_path": "articles/security-center/security-center-apply-system-updates.md",
29769+
"redirect_url": "/azure/security-center/security-center-virtual-machine-protection",
29770+
"redirect_document_id": false
29771+
},
29772+
{
29773+
"source_path": "articles/security-center/security-center-investigation.md",
29774+
"redirect_url": "/azure/security-center/security-center-features-retirement-july2019#security-alerts-investigation",
29775+
"redirect_document_id": false
29776+
},
29777+
{
29778+
"source_path": "articles/security-center/security-center-threat-intel.md",
29779+
"redirect_url": "/azure/security-center/security-center-features-retirement-july2019#menu_securityeventsmap",
29780+
"redirect_document_id": false
29781+
},
29782+
{
29783+
"source_path": "articles/security-center/security-center-apply-disk-encryption.md",
29784+
"redirect_url": "/azure/security-center/security-center-virtual-machine-protection",
29785+
"redirect_document_id": false
29786+
},
2974729787
{
2974829788
"source_path": "articles/security-center/security-center-confidence-score.md",
2974929789
"redirect_url": "/azure/security-center/security-center-intro",
@@ -47329,6 +47369,11 @@
4732947369
"redirect_url": "https://feedback.azure.com/forums/169401-azure-active-directory?category_id=160593",
4733047370
"redirect_document_id": false
4733147371
},
47372+
{
47373+
"source_path": "articles/active-directory-domain-services/compatible-software.md",
47374+
"redirect_url": "/azure/active-directory-domain-services/overview",
47375+
"redirect_document_id": false
47376+
},
4733247377
{
4733347378
"source_path": "articles/active-directory-domain-services/active-directory-ds-troubleshooting.md",
4733447379
"redirect_url": "/azure/active-directory-domain-services/troubleshoot",
@@ -50503,6 +50548,16 @@
5050350548
{
5050450549
"source_path": "articles/sql-database/sql-database-managed-instance-index.yml",
5050550550
"redirect_url": "/azure/sql-database/sql-database-managed-instance"
50551+
},
50552+
{
50553+
"source_path": "articles/aks/integrate-azure.md",
50554+
"redirect_url": "/azure/aks/",
50555+
"redirect_document_id": false
50556+
},
50557+
{
50558+
"source_path": "articles/aks/use-cosmosdb-osba-mongo-app.md",
50559+
"redirect_url": "/azure/aks/",
50560+
"redirect_document_id": false
5050650561
}
5050750562
]
5050850563
}

articles/active-directory-b2c/custom-policy-localization.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ ms.subservice: B2C
1717

1818
[!INCLUDE [active-directory-b2c-advanced-audience-warning](../../includes/active-directory-b2c-advanced-audience-warning.md)]
1919

20-
Language customization in Azure Active Directory B2C (Azure AD B2C) allows you to accommodate different languages to suit your customer' needs. Microsoft provides the translations for 36 languages, but you can also provide your own translations for any language. Even if your experience is provided for only a single language, you can customize any text on the pages.
20+
Language customization in Azure Active Directory B2C (Azure AD B2C) allows you to accommodate different languages to suit your customer' needs. Microsoft provides the translations for [36 languages](https://docs.microsoft.com/azure/active-directory-b2c/user-flow-language-customization#supported-languages), but you can also provide your own translations for any language. Even if your experience is provided for only a single language, you can customize any text on the pages.
2121

2222
This article shows you how to support multiple locales or languages in the policy for user journeys. Localization requires three steps: set-up the explicit list of supported languages, provide language-specific strings and collections, and edit the [content definition](contentdefinitions.md) for the page.
2323

articles/active-directory-domain-services/TOC.yml

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -145,8 +145,6 @@
145145
href: faqs.md
146146
- name: Service updates
147147
href: https://azure.microsoft.com/updates/?product=active-directory-ds
148-
- name: Compatible third-party software
149-
href: compatible-software.md
150148
- name: Pricing
151149
href: https://azure.microsoft.com/pricing/details/active-directory-ds/
152150
- name: Azure AD feedback forum

articles/active-directory-domain-services/compatible-software.md

Lines changed: 0 additions & 41 deletions
This file was deleted.

articles/active-directory/authentication/howto-authentication-passwordless-deployment.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -56,7 +56,7 @@ Microsoft's passwordless authentication methods enable different scenarios. Cons
5656
| **Web app sign-in**: <br> from a mobile or non-windows device | **Yes** | **No** | **No** |
5757
| **Computer sign in**: <br> Non-Windows computer | **No** | **No** | **No** |
5858

59-
For information on selecting the best method for your organization, see [Deciding a passwordless method](https://docs.microsoft.com/azure/security/fundamentals/ad-passwordless#deciding-a-passwordless-method).
59+
For information on selecting the best method for your organization, see [Deciding a passwordless method](https://docs.microsoft.com/azure/active-directory/authentication/concept-authentication-passwordless#choose-a-passwordless-method).
6060

6161
## Prerequisites
6262

@@ -130,7 +130,7 @@ See [Best practices for a pilot](https://aka.ms/deploymentplans) on the deployme
130130

131131
The Microsoft Authenticator app is a free download from Google Play or the Apple App Store. [Learn more about downloading the Microsoft Authenticator app](https://www.microsoft.com/p/microsoft-authenticator/9nblgggzmcj6). Have users download the Microsoft Authenticator app. and follow the directions to enable phone sign in.
132132

133-
It turns any iOS or Android phone into a strong, passwordless credential. Users sign in to any platform or browser by getting a notification to their phone, matching a number displayed on the screen to the one on their phone, and then using biometrics or a PIN to confirm. [See details on how the Microsoft Authenticator app works](https://docs.microsoft.com/azure/security/fundamentals/ad-passwordless#user-using-microsoft-authenticator-for-passwordless-sign-in).
133+
It turns any iOS or Android phone into a strong, passwordless credential. Users sign in to any platform or browser by getting a notification to their phone, matching a number displayed on the screen to the one on their phone, and then using biometrics or a PIN to confirm. [See details on how the Microsoft Authenticator app works](https://docs.microsoft.com/azure/active-directory/authentication/concept-authentication-passwordless#microsoft-authenticator-app).
134134

135135
![sign in with the Authenticator app](./media/howto-authentication-passwordless-deployment/passwordless-dp-sign-in.png)
136136

articles/active-directory/conditional-access/app-protection-based-conditional-access.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: conditional-access
88
ms.topic: article
9-
ms.date: 03/04/2020
9+
ms.date: 04/02/2020
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -56,7 +56,7 @@ Organizations must complete the following steps in order to require the use of a
5656
1. Under **Access controls** > **Grant**, select the following options:
5757
- **Require approved client app**
5858
- **Require app protection policy (preview)**
59-
- **Require one of the selected controls**
59+
- **Require all the selected controls**
6060
1. Confirm your settings and set **Enable policy** to **On**.
6161
1. Select **Create** to create and enable your policy.
6262

articles/active-directory/conditional-access/concept-conditional-access-users-groups.md

Lines changed: 12 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: conditional-access
88
ms.topic: conceptual
9-
ms.date: 02/11/2020
9+
ms.date: 04/02/2020
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -41,7 +41,7 @@ The following options are available to include when creating a Conditional Acces
4141

4242
## Exclude users
4343

44-
Exclusions are commonly used for emergency access or break-glass accounts. More information about emergency access accounts and why they are important can be found in the following articles:
44+
When organizations both include and exclude a user or group the user or group is excluded from the policy, as an exclude action overrides an include in policy. Exclusions are commonly used for emergency access or break-glass accounts. More information about emergency access accounts and why they are important can be found in the following articles:
4545

4646
* [Manage emergency access accounts in Azure AD](../users-groups-roles/directory-emergency-access.md)
4747
* [Create a resilient access control management strategy with Azure Active Directory](../authentication/concept-resilient-controls.md)
@@ -55,6 +55,16 @@ The following options are available to exclude when creating a Conditional Acces
5555
- Users and groups
5656
- Allows targeting of specific sets of users. For example, organizations can select a group that contains all members of the HR department when an HR app is selected as the cloud app. A group can be any type of group in Azure AD, including dynamic or assigned security and distribution groups.
5757

58+
### Preventing administrator lockout
59+
60+
To prevent an administrator from locking themselves out of their directory when creating a policy applied to **All users** and **All apps**, they will see the following warning.
61+
62+
> Don't lock yourself out! We recommend applying a policy to a small set of users first to verify it behaves as expected. We also recommend excluding at least one administrator from this policy. This ensures that you still have access and can update a policy if a change is required. Please review the affected users and apps.
63+
64+
By default the policy will provide an option to exclude the current user from the policy, but this default can be overridden by the administrator as shown in the following image.
65+
66+
![Warning, don't lock yourself out!](./media/concept-conditional-access-users-groups/conditional-access-users-and-groups-lockout-warning.png)
67+
5868
## Next steps
5969

6070
- [Conditional Access: Cloud apps or actions](concept-conditional-access-cloud-apps.md)

articles/active-directory/conditional-access/howto-conditional-access-policy-admin-mfa.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: conditional-access
88
ms.topic: conceptual
9-
ms.date: 03/25/2020
9+
ms.date: 04/02/2020
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -39,7 +39,7 @@ Conditional Access policies are powerful tools, we recommend excluding the follo
3939

4040
* **Emergency access** or **break-glass** accounts to prevent tenant-wide account lockout. In the unlikely scenario all administrators are locked out of your tenant, your emergency-access administrative account can be used to log into the tenant take steps to recover access.
4141
* More information can be found in the article, [Manage emergency access accounts in Azure AD](../users-groups-roles/directory-emergency-access.md).
42-
* **Service accounts** and **service principals**, such as the Azure AD Connect Sync Account. Service accounts are non-interactive accounts that are not tied to any particular user. They are normally used by back-end services and allow programmatic access to applications. Service accounts should be excluded since MFA can't be completed programmatically.
42+
* **Service accounts** and **service principals**, such as the Azure AD Connect Sync Account. Service accounts are non-interactive accounts that are not tied to any particular user. They are normally used by back-end services allowing programmatic access to applications, but are also used to sign in to systems for administrative purposes. Service accounts like these should be excluded since MFA can't be completed programmatically.
4343
* If your organization has these accounts in use in scripts or code, consider replacing them with [managed identities](../managed-identities-azure-resources/overview.md). As a temporary workaround, you can exclude these specific accounts from the baseline policy.
4444

4545
## Create a Conditional Access policy

articles/active-directory/conditional-access/howto-conditional-access-policy-all-users-mfa.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: conditional-access
88
ms.topic: conceptual
9-
ms.date: 03/25/2020
9+
ms.date: 04/02/2020
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -29,7 +29,7 @@ Conditional Access policies are powerful tools, we recommend excluding the follo
2929

3030
* **Emergency access** or **break-glass** accounts to prevent tenant-wide account lockout. In the unlikely scenario all administrators are locked out of your tenant, your emergency-access administrative account can be used to log into the tenant take steps to recover access.
3131
* More information can be found in the article, [Manage emergency access accounts in Azure AD](../users-groups-roles/directory-emergency-access.md).
32-
* **Service accounts** and **service principles**, such as the Azure AD Connect Sync Account. Service accounts are non-interactive accounts that are not tied to any particular user. They are normally used by back-end services and allow programmatic access to applications. Service accounts should be excluded since MFA can't be completed programmatically.
32+
* **Service accounts** and **service principals**, such as the Azure AD Connect Sync Account. Service accounts are non-interactive accounts that are not tied to any particular user. They are normally used by back-end services allowing programmatic access to applications, but are also used to sign in to systems for administrative purposes. Service accounts like these should be excluded since MFA can't be completed programmatically.
3333
* If your organization has these accounts in use in scripts or code, consider replacing them with [managed identities](../managed-identities-azure-resources/overview.md). As a temporary workaround, you can exclude these specific accounts from the baseline policy.
3434

3535
## Application exclusions

0 commit comments

Comments
 (0)