Skip to content

Commit 1cc17ba

Browse files
committed
status
1 parent 3a70b5d commit 1cc17ba

31 files changed

+42
-46
lines changed

articles/synapse-analytics/sql-data-warehouse/sql-data-warehouse-develop-ctas.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ This article explains the CREATE TABLE AS SELECT (CTAS) T-SQL statement in dedic
1818

1919
## CREATE TABLE AS SELECT
2020

21-
The [CREATE TABLE AS SELECT](/sql/t-sql/statements/create-table-as-select-azure-sql-data-warehouse?toc=/azure/synapse-analytics/sql-data-warehouse/toc.json&bc=/azure/synapse-analytics/sql-data-warehouse/breadcrumb/toc.json&view=azure-sqldw-latest&preserve-view=true) (CTAS) statement is one of the most important T-SQL features available. CTAS is a parallel operation that creates a new table based on the output of a SELECT statement. CTAS is the simplest and fastest way to create and insert data into a table with a single command.
21+
The [CREATE TABLE AS SELECT (CTAS)](/sql/t-sql/statements/create-table-as-select-azure-sql-data-warehouse?toc=/azure/synapse-analytics/sql-data-warehouse/toc.json&bc=/azure/synapse-analytics/sql-data-warehouse/breadcrumb/toc.json&view=azure-sqldw-latest&preserve-view=true) statement is one of the most important T-SQL features available. CTAS is a parallel operation that creates a new table based on the output of a SELECT statement. CTAS is the simplest and fastest way to create and insert data into a table with a single command.
2222

2323
## SELECT...INTO vs. CTAS
2424

articles/synapse-analytics/sql-data-warehouse/sql-data-warehouse-load-from-azure-data-lake-store.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ If you don't have an Azure subscription, [create a free Azure account](https://a
2727

2828
## Before you begin
2929

30-
Before you begin this tutorial, download and install the newest version of [SQL Server Management Studio](/sql/ssms/download-sql-server-management-studio-ssms?toc=/azure/synapse-analytics/sql-data-warehouse/toc.json&bc=/azure/synapse-analytics/sql-data-warehouse/breadcrumb/toc.json&view=azure-sqldw-latest&preserve-view=true) (SSMS).
30+
Before you begin this tutorial, download and install the newest version of [SQL Server Management Studio (SSMS)](/sql/ssms/download-sql-server-management-studio-ssms?toc=/azure/synapse-analytics/sql-data-warehouse/toc.json&bc=/azure/synapse-analytics/sql-data-warehouse/breadcrumb/toc.json&view=azure-sqldw-latest&preserve-view=true).
3131

3232
To run this tutorial, you need:
3333

articles/synapse-analytics/sql/develop-views.md

Lines changed: 1 addition & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ Views can be used in a number of different ways to improve the quality of your s
2525
2626
## Architectural abstraction
2727

28-
A common application pattern is to re-create tables using [CREATE TABLE AS SELECT](/sql/t-sql/statements/create-table-as-select-azure-sql-data-warehouse?view=azure-sqldw-latest&preserve-view=true) (CTAS), which is followed by an object renaming pattern while loading data.
28+
A common application pattern is to re-create tables using [CREATE TABLE AS SELECT (CTAS)](/sql/t-sql/statements/create-table-as-select-azure-sql-data-warehouse?view=azure-sqldw-latest&preserve-view=true), which is followed by an object renaming pattern while loading data.
2929

3030
The following example adds new date records to a date dimension. Note how a new table, DimDate_New, is first created and then renamed to replace the original version of the table.
3131

@@ -69,6 +69,3 @@ Views in Synapse SQL are only stored as metadata. Consequently, the following op
6969
## Next steps
7070

7171
For more development tips, see [Synapse SQL development overview](develop-overview.md).
72-
73-
74-

articles/synapse-analytics/sql/query-cosmos-db-analytical-store.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.custom: cosmos-db
1515

1616
A serverless SQL pool allows you to analyze data in your Azure Cosmos DB containers that are enabled with [Azure Synapse Link](../../cosmos-db/synapse-link.md) in near real time without affecting the performance of your transactional workloads. It offers a familiar T-SQL syntax to query data from the [analytical store](../../cosmos-db/analytical-store-introduction.md) and integrated connectivity to a wide range of business intelligence (BI) and ad-hoc querying tools via the T-SQL interface.
1717

18-
For querying Azure Cosmos DB, the full [SELECT](/sql/t-sql/queries/select-transact-sql?view=azure-sqldw-latest&preserve-view=true) surface area is supported through the [OPENROWSET](develop-openrowset.md) function, which includes the majority of [SQL functions and operators](overview-features.md). You can also store results of the query that reads data from Azure Cosmos DB along with data in Azure Blob Storage or Azure Data Lake Storage by using [create external table as select](develop-tables-cetas.md#cetas-in-serverless-sql-pool) (CETAS). You can't currently store serverless SQL pool query results to Azure Cosmos DB by using CETAS.
18+
For querying Azure Cosmos DB, the full [SELECT](/sql/t-sql/queries/select-transact-sql?view=azure-sqldw-latest&preserve-view=true) surface area is supported through the [OPENROWSET](develop-openrowset.md) function, which includes the majority of [SQL functions and operators](overview-features.md). You can also store results of the query that reads data from Azure Cosmos DB along with data in Azure Blob Storage or Azure Data Lake Storage by using [create external table as select (CETAS)](develop-tables-cetas.md#cetas-in-serverless-sql-pool). You can't currently store serverless SQL pool query results to Azure Cosmos DB by using CETAS.
1919

2020
In this article, you'll learn how to write a query with a serverless SQL pool that will query data from Azure Cosmos DB containers that are enabled with Azure Synapse Link. You can then learn more about building serverless SQL pool views over Azure Cosmos DB containers and connecting them to Power BI models in [this tutorial](./tutorial-data-analyst.md). This tutorial uses a container with an [Azure Cosmos DB well-defined schema](../../cosmos-db/analytical-store-introduction.md#schema-representation). You can also check out the Learn module on how to [Query Azure Cosmos DB with SQL Serverless for Azure Synapse Analytics](/training/modules/query-azure-cosmos-db-with-sql-serverless-for-azure-synapse-analytics/).
2121

articles/virtual-desktop/administrative-template.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -73,7 +73,7 @@ To configure the administrative template, select a tab for your scenario and fol
7373

7474
1. Copy and paste the **terminalserver-avd.admx** file to the Group Policy Central Store for your domain, for example `\\contoso.com\SYSVOL\contoso.com\Policies\PolicyDefinitions`, where *contoso.com* is your domain name. Then copy the **terminalserver-avd.adml** file to the `en-us` subfolder.
7575

76-
1. Open the **Group Policy Management Console** (GPMC) and create or edit a policy that targets your session hosts.
76+
1. Open the **Group Policy Management Console (GPMC)** and create or edit a policy that targets your session hosts.
7777

7878
1. To verify that the Azure Virtual Desktop administrative template is available, browse to **Computer Configuration** > **Policies** > **Administrative Templates** > **Windows Components** > **Remote Desktop Services** > **Remote Desktop Session Host** > **Azure Virtual Desktop**. You should see policy settings for Azure Virtual Desktop available for you to configure, as shown in the following screenshot:
7979

articles/virtual-desktop/configure-rdp-shortpath-limit-ports-public-networks.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ To enable a limited port range when using RDP Shortpath for public networks, you
3131
**AD Domain**:
3232
1. Copy and paste the **terminalserver-avd.admx** file to the Central Store for your domain, for example `\\contoso.com\SYSVOL\contoso.com\policies\PolicyDefinitions`, where *contoso.com* is your domain name. Then copy the **en-us\terminalserver-avd.adml** file to the `en-us` subfolder.
3333

34-
1. Open the **Group Policy Management Console** (GPMC) and create or edit a policy that targets your session hosts.
34+
1. Open the **Group Policy Management Console (GPMC)** and create or edit a policy that targets your session hosts.
3535

3636
**Locally**:
3737
1. Copy and paste the **terminalserver-avd.admx** file to `%windir%\PolicyDefinitions`. Then copy the **en-us\terminalserver-avd.adml** file to the `en-us` subfolder.

articles/virtual-desktop/configure-rdp-shortpath.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -67,7 +67,7 @@ To enable RDP Shortpath for managed networks, you need to enable the RDP Shortpa
6767
1. Depending on whether you want to configure Group Policy centrally from your AD domain, or locally for each session host:
6868

6969
1. **AD Domain**: Copy and paste the **terminalserver-avd.admx** file to the Central Store for your domain, for example `\\contoso.com\SYSVOL\contoso.com\policies\PolicyDefinitions`, where *contoso.com* is your domain name. Then copy the **en-us\terminalserver-avd.adml** file to the `en-us` subfolder.
70-
1. Open the **Group Policy Management Console** (GPMC) and create or edit a policy that targets your session hosts.
70+
1. Open the **Group Policy Management Console (GPMC)** and create or edit a policy that targets your session hosts.
7171

7272
1. **Locally**: Copy and paste the **terminalserver-avd.admx** file to `%windir%\PolicyDefinitions`. Then copy the **en-us\terminalserver-avd.adml** file to the `en-us` subfolder.
7373
1. Open the **Local Group Policy Editor** on the session host.
@@ -107,7 +107,7 @@ If you need to configure session hosts and clients to enable RDP Shortpath for p
107107
108108
1. Depending on whether you want to configure Group Policy centrally from your AD domain, or locally for each session host:
109109
110-
1. **AD Domain**: Open the **Group Policy Management Console** (GPMC) and create or edit a policy that targets your session hosts.
110+
1. **AD Domain**: Open the **Group Policy Management Console (GPMC)** and create or edit a policy that targets your session hosts.
111111
112112
1. **Locally**: Open the **Local Group Policy Editor** on the session host.
113113
@@ -132,7 +132,7 @@ To configure managed and unmanaged Windows clients using Group Policy:
132132
133133
1. Depending on whether you want to configure managed or unmanaged clients:
134134
135-
1. For managed clients, open the **Group Policy Management Console** (GPMC) and create or edit a policy that targets your clients.
135+
1. For managed clients, open the **Group Policy Management Console (GPMC)** and create or edit a policy that targets your clients.
136136
137137
1. For unmanaged clients, open the **Local Group Policy Editor** on the client.
138138
@@ -269,7 +269,7 @@ Alternatively, you can block port **3390** (default) to your session hosts on a
269269

270270
1. Depending on whether you want to configure Group Policy centrally from your domain, or locally for each session host:
271271

272-
1. **AD Domain**: Open the **Group Policy Management Console** (GPMC) and edit the existing policy that targets your session hosts.
272+
1. **AD Domain**: Open the **Group Policy Management Console (GPMC)** and edit the existing policy that targets your session hosts.
273273

274274
1. **Locally**: Open the **Local Group Policy Editor** on the session host.
275275

@@ -290,7 +290,7 @@ Alternatively, if you want to disable RDP Shortpath for public networks only, yo
290290

291291
1. Depending on whether you want to configure Group Policy centrally from your domain, or locally for each session host:
292292

293-
1. **AD Domain**: Open the **Group Policy Management Console** (GPMC) and edit the existing policy that targets your session hosts.
293+
1. **AD Domain**: Open the **Group Policy Management Console (GPMC)** and edit the existing policy that targets your session hosts.
294294

295295
1. **Locally**: Open the **Local Group Policy Editor** on the session host.
296296

@@ -315,7 +315,7 @@ To configure managed and unmanaged Windows clients using Group Policy:
315315

316316
1. Depending on whether you want to configure managed or unmanaged clients:
317317

318-
1. For managed clients, open the **Group Policy Management Console** (GPMC) and create or edit a policy that targets your clients.
318+
1. For managed clients, open the **Group Policy Management Console (GPMC)** and create or edit a policy that targets your clients.
319319

320320
1. For unmanaged clients, open the **Local Group Policy Editor** on the client.
321321

articles/virtual-desktop/includes/include-troubleshoot-client-windows-common.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -73,7 +73,7 @@ To configure the policy to enable users to connect again depending on whether yo
7373

7474
For Group Policy:
7575

76-
1. Open the **Group Policy Management Console** (GPMC) for session hosts managed with Active Directory or the **Local Group Policy Editor console** and edit the policy that targets your session hosts.
76+
1. Open the **Group Policy Management Console (GPMC)** for session hosts managed with Active Directory or the **Local Group Policy Editor console** and edit the policy that targets your session hosts.
7777

7878
1. Browse to **Computer Configuration > Administrative Templates > Windows Components > Remote Desktop Services > Remote Desktop Session Host > Connections**
7979

articles/virtual-desktop/multimedia-redirection.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -96,7 +96,7 @@ You can install the multimedia redirection extension using Group Policy, either
9696

9797
1. Next, decide whether you want to configure Group Policy centrally from your domain or locally for each session host:
9898

99-
- To configure it from an AD Domain, open the **Group Policy Management Console** (GPMC) and create or edit a policy that targets your session hosts.
99+
- To configure it from an AD Domain, open the **Group Policy Management Console (GPMC)** and create or edit a policy that targets your session hosts.
100100

101101
- To configure it locally, open the **Local Group Policy Editor** on the session host.
102102

@@ -128,7 +128,7 @@ You can install the multimedia redirection extension using Group Policy, either
128128

129129
1. Next, decide whether you want to configure Group Policy centrally from your domain or locally for each session host:
130130

131-
- To configure it from an AD Domain, open the **Group Policy Management Console** (GPMC) and create or edit a policy that targets your session hosts.
131+
- To configure it from an AD Domain, open the **Group Policy Management Console (GPMC)** and create or edit a policy that targets your session hosts.
132132

133133
- To configure it locally, open the **Local Group Policy Editor** on the session host.
134134

articles/virtual-desktop/private-link-setup.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -755,7 +755,7 @@ To create a private endpoint for the *global* sub-resource used for the initial
755755

756756
## Closing public routes
757757

758-
Once you've created private endpoints, you can also control if traffic is allowed to come from public routes. You can control this at a granular level using Azure Virtual Desktop, or more broadly using a [network security group](../virtual-network/network-security-groups-overview.md) (NSG) or [Azure Firewall](../firewall/protect-azure-virtual-desktop.md?toc=%2Fazure%2Fvirtual-desktop%2Ftoc.json&bc=%2Fazure%2Fvirtual-desktop%2Fbreadcrumb%2Ftoc.json).
758+
Once you've created private endpoints, you can also control if traffic is allowed to come from public routes. You can control this at a granular level using Azure Virtual Desktop, or more broadly using a [network security group (NSG)](../virtual-network/network-security-groups-overview.md) or [Azure Firewall](../firewall/protect-azure-virtual-desktop.md?toc=%2Fazure%2Fvirtual-desktop%2Ftoc.json&bc=%2Fazure%2Fvirtual-desktop%2Fbreadcrumb%2Ftoc.json).
759759

760760
### Control routes with Azure Virtual Desktop
761761

0 commit comments

Comments
 (0)