Skip to content

Commit 17a7639

Browse files
committed
Bringing even with master.
2 parents 957d91f + 6810b2d commit 17a7639

File tree

189 files changed

+2287
-789
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

189 files changed

+2287
-789
lines changed

.openpublishing.redirection.json

Lines changed: 55 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -30580,7 +30580,61 @@
3058030580
"source_path": "articles/backup/backup-mabs-upgrade-to-v2.md",
3058130581
"redirect_url": "/azure/backup/backup-mabs-whats-new-mabs",
3058230582
"redirect_document_id" : false
30583+
},
30584+
{
30585+
"source_path": "articles/monitoring/monitoring-solution-agenthealth.md",
30586+
"redirect_url": "/azure/azure-monitor/insights/solution-agenthealth",
30587+
"redirect_document_id": "false"
30588+
},
30589+
{
30590+
"source_path": "articles/monitoring/monitoring-solution-office-365.md",
30591+
"redirect_url": "/azure/azure-monitor/insights/solution-office-365",
30592+
"redirect_document_id": "false"
30593+
},
30594+
{
30595+
"source_path": "articles/monitoring/monitoring-solutions.md",
30596+
"redirect_url": "/azure/azure-monitor/insights/solutions",
30597+
"redirect_document_id": "false"
30598+
},
30599+
{
30600+
"source_path": "articles/monitoring/monitoring-solutions-best-practices.md",
30601+
"redirect_url": "/azure/azure-monitor/insights/solutions-best-practices",
30602+
"redirect_document_id": "false"
30603+
},
30604+
{
30605+
"source_path": "articles/monitoring/monitoring-solutions-creating.md",
30606+
"redirect_url": "/azure/azure-monitor/insights/solutions-creating",
30607+
"redirect_document_id": "false"
30608+
},
30609+
{
30610+
"source_path": "articles/monitoring/monitoring-solutions-inventory.md",
30611+
"redirect_url": "/azure/azure-monitor/insights/solutions-inventory",
30612+
"redirect_document_id": "false"
30613+
},
30614+
{
30615+
"source_path": "articles/monitoring/monitoring-solutions-resources-automation.md",
30616+
"redirect_url": "/azure/azure-monitor/insights/solutions-resources-automation",
30617+
"redirect_document_id": "false"
30618+
},
30619+
{
30620+
"source_path": "articles/monitoring/monitoring-solutions-resources-searches-alerts.md",
30621+
"redirect_url": "/azure/azure-monitor/insights/solutions-resources-searches-alerts",
30622+
"redirect_document_id": "false"
30623+
},
30624+
{
30625+
"source_path": "articles/monitoring/monitoring-solutions-resources-views.md",
30626+
"redirect_url": "/azure/azure-monitor/insights/solutions-resources-views",
30627+
"redirect_document_id": "false"
30628+
},
30629+
{
30630+
"source_path": "articles/monitoring/monitoring-solutions-solution-file.md",
30631+
"redirect_url": "/azure/azure-monitor/insights/solutions-solution-file",
30632+
"redirect_document_id": "false"
30633+
},
30634+
{
30635+
"source_path": "articles/monitoring/monitoring-solution-targeting.md",
30636+
"redirect_url": "/azure/azure-monitor/insights/solution-targeting",
30637+
"redirect_document_id": "false"
3058330638
}
30584-
3058530639
]
3058630640
}

articles/active-directory/conditional-access/app-sign-in-risk.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -209,7 +209,7 @@ When no longer needed, delete the test user, the Tor Browser and the conditional
209209

210210
![Multi-factor authentication](./media/app-sign-in-risk/33.png)
211211

212-
- For instructions to remove the Tor Browser, see [Uninstalling](https://tb-manual.torproject.org/en-US/uninstalling.html).
212+
- For instructions to remove the Tor Browser, see [Uninstalling](https://tb-manual.torproject.org/uninstalling/).
213213

214214
## Next steps
215215

articles/active-directory/develop/quickstart-v2-windows-desktop.md

Lines changed: 8 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.devlang: na
1414
ms.topic: quickstart
1515
ms.tgt_pltfrm: na
1616
ms.workload: identity
17-
ms.date: 11/01/2018
17+
ms.date: 11/15/2018
1818
ms.author: jmprieur
1919
ms.custom: aaddev
2020
#Customer intent: As an application developer, I want to learn how my Windows desktop .NET application can get an access token and call an API that's protected by an Azure AD v2.0 endpoint.
@@ -30,21 +30,22 @@ In this quickstart, you'll learn how to write a Windows desktop .NET (WPF) appli
3030

3131
> [!div renderon="docs"]
3232
> ## Register and download your quickstart app
33-
> [!div renderon="docs" class="sxs-lookup"]
3433
> You have two options to start your quickstart application:
3534
> * [Express] [Option 1: Register and auto configure your app and then download your code sample](#option-1-register-and-auto-configure-your-app-and-then-download-your-code-sample)
3635
> * [Manual] [Option 2: Register and manually configure your application and code sample](#option-2-register-and-manually-configure-your-application-and-code-sample)
3736
>
3837
> ### Option 1: Register and auto configure your app and then download your code sample
3938
>
40-
> 1. Go to the [Azure portal - Application Registration](https://portal.azure.com/?Microsoft_AAD_RegisteredApps=true#blade/Microsoft_AAD_RegisteredApps)
39+
> 1. Go to the [Azure portal - Application Registration (Preview)](https://portal.azure.com/?Microsoft_AAD_RegisteredApps=true#blade/Microsoft_AAD_RegisteredApps/applicationsListBlade/quickStartType/WinDesktopQuickstartPage/sourceType/docs).
4140
> 1. Enter a name for your application and select **Register**.
4241
> 1. Follow the instructions to download and automatically configure your new application with just one click.
4342
>
4443
> ### Option 2: Register and manually configure your application and code sample
45-
> [!div renderon="docs"]
44+
>
4645
> #### Step 1: Register your application
47-
> 1. Sign in to the [Azure portal](https://portal.azure.com) using either a work or school account, or a personal Microsoft account.
46+
> To register your application and add the app's registration information to your solution manually, follow these steps:
47+
>
48+
> 1. Sign in to the [Azure portal](https://portal.azure.com) using either a work or school account or a personal Microsoft account.
4849
> 1. If your account gives you access to more than one tenant, select your account in the top right corner, and set your portal session to the desired Azure AD tenant.
4950
> 1. In the left-hand navigation pane, select the **Azure Active Directory** service, and then select **App registrations (Preview)** > **New registration**.
5051
> 1. When the **Register an application** page appears, enter your application's registration information:
@@ -55,8 +56,8 @@ In this quickstart, you'll learn how to write a Windows desktop .NET (WPF) appli
5556
> 1. In the **Redirect URIs** section, locate the **Suggested Redirect URIs for public clients (mobile, desktop)** section, and select **"urn:ietf:wg:oauth:2.0:oob**.
5657
> 1. Select **Save**.
5758
58-
> [!div renderon="portal" class="sxs-lookup"]
59-
> #### Step 1: Configure your application
59+
> [!div class="sxs-lookup" renderon="portal"]
60+
> #### Step 1: Configure your application in Azure portal
6061
> For the code sample for this quickstart to work, you need to add a reply URL as **urn:ietf:wg:oauth:2.0:oob**.
6162
> > [!div renderon="portal" id="makechanges" class="nextstepaction"]
6263
> > [Make this change for me]()

articles/active-directory/fundamentals/active-directory-deployment-checklist-p2.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -16,19 +16,19 @@ ms.reviewer:
1616
---
1717
# Azure Active Directory Premium P2 licensing feature checklist
1818

19-
It can seem daunting to deploy Azure Active Directory (Azure AD) for your organization and keep it secure. This article identifies some common tasks that customers find helpful to complete over the course of 30 days, 90 days, or beyond to enhance their security posture. Even organizations who have already deployed Azure AD can use this checklist to ensure they are getting the most out of their investment.
19+
It can seem overwhelming to deploy Azure Active Directory (Azure AD) for your organization and keep it secure. This article identifies some common tasks that customers find helpful. Customers typically complete these tasks over the course of 30 days, 90 days, or beyond to enhance their security posture. Even organizations who have already deployed Azure AD can use this checklist to make sure they're getting the most out of their investment.
2020

2121
A well-planned and executed identity infrastructure paves the way for more secure access to your productivity workloads and data only by authenticated users and devices.
2222

2323
## Prerequisites
2424

25-
This guide assumes you have Azure AD Premium P2 licenses, Enterprise Mobility + Security E5, Microsoft 365 E5, or an equivalent license bundle.
25+
This guide assumes you have Azure AD Premium P2 licenses, Enterprise Mobility + Security E5, Microsoft 365 E5, or a similar license bundle.
2626

2727
[Azure AD licensing](https://azure.microsoft.com/pricing/details/active-directory/)
2828

29-
[Microsoft 365 Enterprise](https://www.microsoft.com/licensing/product-licensing/microsoft-365-enterprise.aspx)
29+
[Microsoft 365 Enterprise](https://www.microsoft.com/en-us/licensing/product-licensing/microsoft-365-enterprise)
3030

31-
[Enterprise Mobility + Security](https://www.microsoft.com/licensing/product-licensing/enterprise-mobility-security.aspx)
31+
[Enterprise Mobility + Security](https://www.microsoft.com/en-us/licensing/product-licensing/enterprise-mobility-security)
3232

3333
## Plan and deploy: Day 1-30
3434

@@ -68,7 +68,7 @@ This guide assumes you have Azure AD Premium P2 licenses, Enterprise Mobility +
6868
- [Allow or block invitations to B2B users from specific organizations](../b2b/allow-deny-list.md)
6969
- [Grant B2B users in Azure AD access to your on-premises applications](../b2b/hybrid-cloud-to-on-premises.md)
7070
- Make decisions about user lifecycle management strategy
71-
- [Decide on device managment strategy](../devices/overview.md)
71+
- [Decide on device management strategy](../devices/overview.md)
7272
- [Usage scenarios and deployment considerations for Azure AD Join](../devices/azureadjoin-plan.md)
7373
- [Manage Windows Hello for Business in your organization](/windows/security/identity-protection/hello-for-business/hello-manage-in-organization)
7474

articles/active-directory/hybrid/how-to-connect-pta-quick-start.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ ms.author: billmath
2424
Azure Active Directory (Azure AD) Pass-through Authentication allows your users to sign in to both on-premises and cloud-based applications by using the same passwords. Pass-through Authentication signs users in by validating their passwords directly against on-premises Active Directory.
2525

2626
>[!IMPORTANT]
27-
>If you are migrating from AD FS (or other federation technologies) to Pass-through Authentication, we highly recommend that you follow our detailed deployment guide published [here](https://github.com/Identity-Deployment-Guides/Identity-Deployment-Guides/blob/master/Authentication/Migrating%20from%20Federated%20Authentication%20to%20Pass-through%20Authentication.docx).
27+
>If you are migrating from AD FS (or other federation technologies) to Pass-through Authentication, we highly recommend that you follow our detailed deployment guide published [here](https://aka.ms/adfstoPTADPDownload).
2828
2929
Follow these instructions to deploy Pass-through Authentication on your tenant:
3030

articles/active-directory/hybrid/reference-connect-germany.md

Lines changed: 6 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -22,8 +22,9 @@ ms.author: billmath
2222
# Azure AD Connect in Microsoft Cloud Germany - Public Preview
2323
## Introduction
2424
Azure AD Connect provides synchronization between your on-premises Active Directory and Azure Active Directory.
25-
Currently, many of the scenarios in [Microsoft Cloud Germany](https://www.microsoft.com/de-de/cloud/deutschland/default.aspx) must be done by the operator.
26-
When using Microsoft Cloud Germany, you must be aware of the following:
25+
Currently, many of the scenarios in [Microsoft Cloud Germany](https://azure.microsoft.com/global-infrastructure/germany/
26+
) must be done by the operator.
27+
When using Microsoft Cloud Germany, you must be aware of the following information:
2728

2829
* The following URLs must be opened on a proxy server for synchronization to occur successfully:
2930

@@ -37,13 +38,13 @@ When using Microsoft Cloud Germany, you must be aware of the following:
3738
You can download Azure AD Connect from the Azure AD Connect blade within the portal. Use the instructions below to locate the Azure AD Connect blade.
3839

3940
### The Azure AD Connect Blade
40-
Once you have signed in to the Azure portal, do the following:
41+
Once you've signed in to the Azure portal:
4142

4243
1. Go to Browse
4344
2. Select Azure Active Directory
4445
3. Then select Azure AD Connect
4546

46-
You should see the following:
47+
You'll see these details:
4748

4849
![Azure AD Connect Blade](./media/reference-connect-germany/germany1.png)
4950

@@ -59,5 +60,5 @@ The following table describes the features shown in the blade.
5960
To install Azure AD Connect, you can use the documentation [here](how-to-connect-install-roadmap.md).
6061

6162
## Advanced features and Additional Information
62-
For additional information and guidance on custom settings or advanced configurations, start with [Integrating your on-premises identities with Azure Active Directory](whatis-hybrid-identity.md). This page provides information and links to additional guidance.
63+
For additional information about custom settings or advanced configurations, go to [Integrating your on-premises identities with Azure Active Directory](whatis-hybrid-identity.md). This page provides information and links to additional guidance.
6364

articles/active-directory/managed-identities-azure-resources/tutorial-linux-vm-access-arm.md

Lines changed: 0 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -30,16 +30,8 @@ You learn how to:
3030
3131
## Prerequisites
3232

33-
[!INCLUDE [msi-qs-configure-prereqs](../../../includes/active-directory-msi-qs-configure-prereqs.md)]
34-
3533
[!INCLUDE [msi-tut-prereqs](../../../includes/active-directory-msi-tut-prereqs.md)]
3634

37-
- [Sign in to Azure portal](https://portal.azure.com)
38-
39-
- [Create a Linux virtual machine](/azure/virtual-machines/linux/quick-create-portal)
40-
41-
- [Enable system-assigned managed identity on your virtual machine](/azure/active-directory/managed-service-identity/qs-configure-portal-windows-vm#enable-system-assigned-identity-on-an-existing-vm)
42-
4335
## Grant your VM access to a Resource Group in Azure Resource Manager
4436

4537
Using managed identities for Azure resources, your code can get access tokens to authenticate to resources that support Azure AD authentication. The Azure Resource Manager API supports Azure AD authentication. First, we need to grant this VM's identity access to a resource in Azure Resource Manager, in this case the Resource Group in which the VM is contained.

articles/active-directory/managed-identities-azure-resources/tutorial-windows-vm-access-arm.md

Lines changed: 0 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -29,16 +29,8 @@ This quickstart shows you how to access the Azure Resource Manager API using a W
2929
3030
## Prerequisites
3131

32-
[!INCLUDE [msi-qs-configure-prereqs](../../../includes/active-directory-msi-qs-configure-prereqs.md)]
33-
3432
[!INCLUDE [msi-tut-prereqs](../../../includes/active-directory-msi-tut-prereqs.md)]
3533

36-
- [Sign in to Azure portal](https://portal.azure.com)
37-
38-
- [Create a Windows virtual machine](/azure/virtual-machines/windows/quick-create-portal)
39-
40-
- [Enable system-assigned managed identity on your virtual machine](/azure/active-directory/managed-service-identity/qs-configure-portal-windows-vm#enable-system-assigned-identity-on-an-existing-vm)
41-
4234
## Grant your VM access to a resource group in Resource Manager
4335
Using managed identities for Azure resources, your code can get access tokens to authenticate to resources that support Azure AD authentication. The Azure Resource Manager supports Azure AD authentication. First, we need to grant this VM’s system-assigned managed identity access to a resource in Resource Manager, in this case the Resource Group in which the VM is contained.
4436

articles/application-gateway/toc.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -29,8 +29,6 @@
2929
href: tutorial-url-redirect-cli.md
3030
- name: Autoscaling and zone redundant
3131
href: tutorial-autoscale-ps.md
32-
- name: Troubleshoot an Application Gateway in Aure – ILB ASE
33-
href: create-gateway-internal-load-balancer-app-service-environment.md
3432
- name: Samples
3533
items:
3634
- name: Azure PowerShell
@@ -148,6 +146,8 @@
148146
href: application-gateway-create-probe-ps.md
149147
- name: Troubleshoot
150148
items:
149+
- name: Troubleshoot an Application Gateway in Aure – ILB ASE
150+
href: create-gateway-internal-load-balancer-app-service-environment.md
151151
- name: Troubleshoot Bad Gateway (502) errors
152152
href: application-gateway-troubleshooting-502.md
153153
- name: Diagnostics

0 commit comments

Comments
 (0)