Skip to content

Commit 103f862

Browse files
authored
Merge pull request #238292 from MicrosoftDocs/main
5/15 OOB Publish
2 parents b9b9e4a + 35844f8 commit 103f862

File tree

54 files changed

+1487
-328
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

54 files changed

+1487
-328
lines changed

articles/active-directory/governance/TOC.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@
2828
href: identity-governance-applications-existing-users.md
2929
- name: Governing a nonprovisionable application's users - PowerShell
3030
href: identity-governance-applications-not-provisioned-users.md
31-
- name: Provisioning accounts into SAP applications
31+
- name: Manage access to SAP applications
3232
href: sap.md
3333
- name: Entitlement Management
3434
items:

articles/active-directory/governance/sap.md

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -55,10 +55,9 @@ Customers who have yet to transition from applications such as SAP ECC to SAP S/
5555

5656
## SSO, workflows, and separation of duties
5757
In addition to the native provisioning integrations that allow you to manage access to your SAP applications, Azure AD supports a rich set of integrations with SAP.
58-
* SSO: Once you’ve setup provisioning for your SAP application, you’ll want to enable single sign-on for those applications. Azure AD can serve as the identity provider and server as the authentication authority for your SAP applications. Learn more about how you can [configure Azure AD as the corporate identity provider for your SAP applications](https://help.sap.com/docs/IDENTITY_AUTHENTICATION/6d6d63354d1242d185ab4830fc04feb1/058c7b14209f4f2d8de039da4330a1c1.html).
59-
Custom workflows: When a new employee is hired in your organization, you may need to trigger a workflow within your SAP server.
60-
* Using the [Entra Identity Governance Lifecycle Workflows](lifecycle-workflow-extensibility.md) in conjunction with the [SAP connector in Azure Logic apps](https://learn.microsoft.com/azure/logic-apps/logic-apps-using-sap-connector), you can trigger custom actions in SAP upon hiring a new employee.
61-
* Separation of duties: With separation of duties checks now available in preview in Azure AD [entitlement management](https://techcommunity.microsoft.com/t5/azure-active-directory-identity/ensure-compliance-using-separation-of-duties-checks-in-access/ba-p/2466939), customers can now ensure that users don't take on excessive access rights. Admins and access managers can prevent users from requesting additional access packages if they’re already assigned to other access packages or are a member of other groups that are incompatible with the requested access. Enterprises with critical regulatory requirements for SAP apps will have a single consistent view of access controls and enforce separation of duties checks across their financial and other business critical applications and Azure AD-integrated applications. With our [Pathlock](https://pathlock.com/), integration customers can leverage fine-grained separation of duties checks with access packages in Azure AD, and over time will help customers to address Sarbanes Oxley and other compliance requirements.
58+
* **SSO:** Once you’ve setup provisioning for your SAP application, you’ll want to enable single sign-on for those applications. Azure AD can serve as the identity provider and server as the authentication authority for your SAP applications. Learn more about how you can [configure Azure AD as the corporate identity provider for your SAP applications](https://help.sap.com/docs/IDENTITY_AUTHENTICATION/6d6d63354d1242d185ab4830fc04feb1/058c7b14209f4f2d8de039da4330a1c1.html).
59+
* **Custom workflows:** When a new employee is hired in your organization, you may need to trigger a workflow within your SAP server. Using the [Entra Identity Governance Lifecycle Workflows](lifecycle-workflow-extensibility.md) in conjunction with the [SAP connector in Azure Logic apps](https://learn.microsoft.com/azure/logic-apps/logic-apps-using-sap-connector), you can trigger custom actions in SAP upon hiring a new employee.
60+
* **Separation of duties:** With separation of duties checks now available in preview in Azure AD [entitlement management](https://techcommunity.microsoft.com/t5/azure-active-directory-identity/ensure-compliance-using-separation-of-duties-checks-in-access/ba-p/2466939), customers can now ensure that users don't take on excessive access rights. Admins and access managers can prevent users from requesting additional access packages if they’re already assigned to other access packages or are a member of other groups that are incompatible with the requested access. Enterprises with critical regulatory requirements for SAP apps will have a single consistent view of access controls and enforce separation of duties checks across their financial and other business critical applications and Azure AD-integrated applications. With our [Pathlock](https://pathlock.com/), integration customers can leverage fine-grained separation of duties checks with access packages in Azure AD, and over time will help customers to address Sarbanes Oxley and other compliance requirements.
6261

6362
## Next steps
6463

articles/azure-monitor/app/javascript-framework-extensions.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ Install the npm package:
3030

3131
```bash
3232

33-
npm install @microsoft/applicationinsights-react-js @microsoft/applicationinsights-web --save
33+
npm install @microsoft/applicationinsights-angularplugin-js @microsoft/applicationinsights-web --save
3434

3535
```
3636

articles/azure-netapp-files/azacsnap-introduction.md

Lines changed: 9 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -42,16 +42,20 @@ Azure Application Consistent Snapshot tool (AzAcSnap) is a command-line tool tha
4242

4343
AzAcSnap leverages the volume snapshot and replication functionalities in Azure NetApp Files and Azure Large Instance. It provides the following benefits:
4444

45+
- **Rapid backup snapshots independent of database size**
46+
- AzAcSnap takes snapshot backups regardless of the size of the volumes or database by leveraging the snapshot technology of storage.
47+
- It takes snapshots in parallel across all the volumes thereby allowing multiple volumes to be part of the database storage.
48+
- Tests have shown a 100+TiB database stored across 16 volumes was able to be snapshot backup in less than 2 minutes.
4549
- **Application-consistent data protection**
46-
AzAcSnap is a centralized solution for backing up critical database files. It ensures database consistency before performing a storage volume snapshot. As a result, it ensures that the storage volume snapshot can be used for database recovery.
50+
- AzAcSnap can be deployed as a centralized or distributed solution for backing up critical database files. It ensures database consistency before performing a storage volume snapshot. As a result, it ensures that the storage volume snapshot can be used for database recovery.
4751
- **Database catalog management**
48-
When you use AzAcSnap with SAP HANA, the records within the backup catalog are kept current with storage snapshots. This capability allows a database administrator to see the backup activity.
52+
- When you use AzAcSnap with SAP HANA, the records within the backup catalog are kept current with storage snapshots. This capability allows a database administrator to see the backup activity.
4953
- **Ad hoc volume protection**
50-
This capability is helpful for non-database volumes that don't need application quiescing before taking a storage snapshot. Examples include SAP HANA log-backup volumes or SAPTRANS volumes.
54+
- This capability is helpful for non-database volumes that don't need application quiescing before taking a storage snapshot. Examples include SAP HANA log-backup volumes or SAPTRANS volumes.
5155
- **Cloning of storage volumes**
52-
This capability provides space-efficient storage volume clones for development and test purposes.
56+
- This capability provides space-efficient storage volume clones for development and test purposes.
5357
- **Support for disaster recovery**
54-
AzAcSnap leverages storage volume replication to provide options for recovering replicated application-consistent snapshots at a remote site.
58+
- AzAcSnap leverages storage volume replication to provide options for recovering replicated application-consistent snapshots at a remote site.
5559

5660
AzAcSnap is a single binary. It does not need additional agents or plug-ins to interact with the database or the storage (Azure NetApp Files via Azure Resource Manager, and Azure Large Instance via SSH). AzAcSnap must be installed on a system that has connectivity to the database and the storage. However, the flexibility of installation and configuration allows for either a single centralized installation (Azure NetApp Files only) or a fully distributed installation (Azure NetApp Files and Azure Large Instance) with copies installed on each database installation.
5761

articles/cognitive-services/Speech-Service/how-to-custom-voice-create-voice.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -86,7 +86,7 @@ To create a custom neural voice in Speech Studio, follow these steps for one of
8686
1. Select **Next**.
8787
1. Optionally, you can add up to 10 custom speaking styles:
8888
1. Select **Add a custom style** and thoughtfully enter a custom style name of your choice. This name will be used by your application within the `style` element of [Speech Synthesis Markup Language (SSML)](speech-synthesis-markup-voice.md#speaking-styles-and-roles). You can also use the custom style name as SSML via the [Audio Content Creation](how-to-audio-content-creation.md) tool in [Speech Studio](https://speech.microsoft.com/portal/audiocontentcreation).
89-
1. Select style samples as training data. It's recommended that the style samples are all from the same voice talent profile.
89+
1. Select style samples as training data. The style samples should be all from the same voice talent profile.
9090
1. Select **Next**.
9191
1. Select a speaker file with the voice talent statement that corresponds to the speaker in your training data.
9292
1. Select **Next**.

articles/communication-services/concepts/advisor-overview.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -33,6 +33,7 @@ The following SDKs are supported for this feature, along with all their supporte
3333
* Phone Numbers
3434
* Management
3535
* Network Traversal
36+
* Call Automation
3637

3738
## Next steps
3839

articles/dev-box/how-to-get-help.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn how to choose the appropriate channel to get support for Micr
44
author: RoseHJM
55
ms.author: rosemalcolm
66
ms.service: dev-box
7-
ms.topic: how-to
7+
ms.topic: troubleshooting
88
ms.date: 04/25/2023
99
ms.custom: template-how-to-pattern
1010
---

articles/dev-box/toc.yml

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -55,8 +55,6 @@ items:
5555
href: how-to-create-dev-boxes-developer-portal.md
5656
- name: Configure Azure Diagnostic Logs
5757
href: how-to-configure-dev-box-azure-diagnostic-logs.md
58-
- name: Get support for Microsoft Dev Box
59-
href: how-to-get-help.md
6058
- name: Reference
6159
items:
6260
- name: Azure CLI
@@ -71,8 +69,9 @@ items:
7169
href: https://azure.microsoft.com/roadmap/
7270
- name: Regional availability
7371
href: https://azure.microsoft.com/regions/services/
72+
- name: Get support for Microsoft Dev Box
73+
href: how-to-get-help.md
7474
- name: Report a problem
7575
href: https://aka.ms/devbox/report
7676
- name: Suggest a feature
7777
href: https://aka.ms/devbox/suggest
78-

articles/firewall-manager/overview.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -83,8 +83,8 @@ Azure Firewall Manager has the following known issues:
8383
|---------|---------|---------|
8484
|Traffic splitting|Microsoft 365 and Azure Public PaaS traffic splitting isn't currently supported. As such, selecting a third-party provider for V2I or B2I also sends all Azure Public PaaS and Microsoft 365 traffic via the partner service.|Investigating traffic splitting at the hub.
8585
|Base policies must be in same region as local policy|Create all your local policies in the same region as the base policy. You can still apply a policy that was created in one region on a secured hub from another region.|Investigating|
86-
|Filtering inter-hub traffic in secure virtual hub deployments|Secured Virtual Hub to Secured Virtual Hub communication filtering isn't yet supported. However, hub to hub communication still works if private traffic filtering via Azure Firewall isn't enabled.|Investigating|
87-
|Branch to branch traffic with private traffic filtering enabled|Branch to branch traffic isn't supported when private traffic filtering is enabled. |Investigating.<br><br>Don't secure private traffic if branch to branch connectivity is critical.|
86+
|Filtering inter-hub traffic in secure virtual hub deployments|Secured Virtual Hub to Secured Virtual Hub communication filtering is supported with the Routing Intent feature.|Enable Routing Intent on your Virtual WAN Hub by setting Inter-hub to **Enabled** in Azure Firewall Manager. See [Routing Intent documentation](../virtual-wan/how-to-routing-policies.md) for more information about this feature.|
87+
|Branch to branch traffic with private traffic filtering enabled|Branch to branch traffic can be inspected by Azure Firewall in secured hub scenarios if Routing Intent is enabled. |Enable Routing Intent on your Virtual WAN Hub by setting Inter-hub to **Enabled** in Azure Firewall Manager. See [Routing Intent documentation](../virtual-wan/how-to-routing-policies.md) for more information about this feature.|
8888
|All Secured Virtual Hubs sharing the same virtual WAN must be in the same resource group.|This behavior is aligned with Virtual WAN Hubs today.|Create multiple Virtual WANs to allow Secured Virtual Hubs to be created in different resource groups.|
8989
|Bulk IP address addition fails|The secure hub firewall goes into a failed state if you add multiple public IP addresses.|Add smaller public IP address increments. For example, add 10 at a time.|
9090
|DDoS Protection not supported with secured virtual hubs|DDoS Protection is not integrated with vWANs.|Investigating|

articles/firewall-manager/secure-cloud-network-powershell.md

Lines changed: 42 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -99,13 +99,15 @@ Set-AzDiagnosticSetting -ResourceId $AzFW.Id -Enabled $True -Category AzureFirew
9999

100100
## Deploy Azure Firewall and configure custom routing
101101

102+
> [!NOTE]
103+
> This is the configuration deployed when securing connectivity from the Azure Portal with Azure Firewall Manager when the "Inter-hub" setting is set to **disabled**. For instructions on how to configure routing using powershell when "Inter-hub" is set to **enabled**, see [Enabling routing intent](#routingintent).
104+
102105
Now you have an Azure Firewall in the hub, but you still need to modify routing so the Virtual WAN sends the traffic from the virtual networks and from the branches through the firewall. You do this in two steps:
103106

104107
1. Configure all virtual network connections (and branch connections if there were any) to propagate to the `None` Route Table. The effect of this configuration is that other virtual networks and branches won't learn their prefixes, and so has no routing to reach them.
105108
1. Now you can insert static routes in the `Default` Route Table (where all virtual networks and branches are associated by default), so that all traffic is sent to the Azure Firewall.
106109

107-
> [!NOTE]
108-
> This is the configuration deployed when securing connectivity from the Azure Portal with Azure Firewall Manager
110+
109111

110112
Start with the first step, to configure your virtual network connections to propagate to the `None` Route Table:
111113

@@ -134,6 +136,44 @@ $DefaultRT = Update-AzVHubRouteTable -Name "defaultRouteTable" -ResourceGroupNam
134136
> [!NOTE]
135137
> String "***all_traffic***" as value for parameter "-Name" in the New-AzVHubRoute command above has a special meaning: if you use this exact string, the configuration applied in this article will be properly reflected in the Azure Portal (Firewall Manager --> Virtual hubs --> [Your Hub] --> Security Configuration). If a different name will be used, the desired configuration will be applied, but will not be reflected in the Azure Portal.
136138
139+
## <a name="routingintent"></a> Enabling routing intent
140+
141+
If you want to send inter-hub and inter-region traffic via Azure Firewall deployed in the Virtual WAN hub, you can instead enable the routing intent feature. For more information on routing intent, see [Routing Intent documentation](../virtual-wan/how-to-routing-policies.md).
142+
143+
> [!NOTE]
144+
> This is the configuration deployed when securing connectivity from the Azure Portal with Azure Firewall Manager when the "Interhub" setting is set to **enabled**.
145+
146+
```azurepowershell
147+
# Get the Azure Firewall resource ID
148+
$AzFWId = $(Get-AzVirtualHub -ResourceGroupName <thname> -name $HubName).AzureFirewall.Id
149+
150+
# Create routing policy and routing intent
151+
$policy1 = New-AzRoutingPolicy -Name "PrivateTraffic" -Destination @("PrivateTraffic") -NextHop $firewall.Id
152+
$policy2 = New-AzRoutingPolicy -Name "PublicTraffic" -Destination @("Internet") -NextHop $firewall.Id
153+
New-AzRoutingIntent -ResourceGroupName "<rgname>" -VirtualHubName "<hubname>" -Name "hubRoutingIntent" -RoutingPolicy @($policy1, $policy2)
154+
```
155+
156+
If you are using non-RFC1918 prefixes in your Virtual WAN such as 40.0.0.0/24 in your Virtual Network or on-premises, add an additional route in the defaultRouteTable after routing intent configuration completes. Make sure you name this route as **private_traffic**. If the route is named otherwise, the desired configuration will apply but it will not be reflected in Azure Portal.
157+
158+
```azurepowershell
159+
# Get the defaultRouteTable
160+
$defaultRouteTable = Get-AzVHubRouteTable -ResourceGroupName routingIntent-Demo -HubName wus_hub1 -Name defaultRouteTable
161+
162+
# Get the routes automatically created by routing intent. If private routing policy is enabled, this is the route named _policy_PrivateTraffic. If internet routing policy is enabled, this is the route named _policy_InternetTraffic.
163+
$privatepolicyroute = $defaultRouteTable.Routes[1]
164+
165+
166+
# Create new route named private_traffic for non-RFC1918 prefixes
167+
$private_traffic = New-AzVHubRoute -Name "private-traffic" -Destination @("30.0.0.0/24") -DestinationType "CIDR" -NextHop $AzFWId -NextHopType ResourceId
168+
169+
# Create new routes for route table
170+
$newroutes = @($privatepolicyroute, $private_traffic)
171+
172+
# Update route table
173+
Update-AzVHubRouteTable -ResourceGroupName <rgname> -ParentResourceName <hubname> -Name defaultRouteTable -Route $newroutes
174+
175+
````
176+
137177
## Test connectivity
138178
139179
Now you have a fully operational secure hub. To test connectivity, you need one virtual machine in each spoke virtual network connected to the hub:

0 commit comments

Comments
 (0)