Skip to content

Commit 1e70928

Browse files
2 parents 5f879d5 + d750f48 commit 1e70928

31 files changed

+468
-286
lines changed

articles/active-directory/enterprise-users/groups-restore-deleted.md

Lines changed: 17 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -16,17 +16,17 @@ ms.collection: M365-identity-device-management
1616
---
1717
# Restore a deleted Microsoft 365 group in Azure Active Directory
1818

19-
When you delete a Microsoft 365 group in Azure Active Directory (Azure AD), part of Microsoft Entra, the deleted group is retained but not visible for 30 days from the deletion date. This behavior is so that the group and its contents can be restored if needed. This functionality is restricted exclusively to Microsoft 365 groups in Azure AD. It is not available for security groups and distribution groups. Please note that the 30-day group restoration period is not customizable.
19+
When you delete a Microsoft 365 group in Azure Active Directory (Azure AD), part of Microsoft Entra, the deleted group is retained but not visible for 30 days from the deletion date. This behavior is so that the group and its contents can be restored if needed. This functionality is restricted exclusively to Microsoft 365 groups in Azure AD. It isn't available for security groups and distribution groups. Please note that the 30-day group restoration period isn't customizable.
2020

2121
> [!NOTE]
22-
> Don't use `Remove-MsolGroup` because it purges the group permanently. Always use `Remove-AzureADMSGroup` to delete a Microsoft 365 group.
22+
> Don't use `Remove-MsolGroup` because it purges the group permanently. Always use `Remove-MgBetaGroup` to delete a Microsoft 365 group.
2323
2424
The permissions required to restore a group can be any of the following:
2525

2626
Role | Permissions
2727
--------- | ---------
28-
Global administrator, Group administrator, Partner Tier2 support, and Intune administrator | Can restore any deleted Microsoft 365 group
29-
User administrator and Partner Tier1 support | Can restore any deleted Microsoft 365 group except those groups assigned to the Global Administrator role
28+
Global administrator, Group administrator, Partner Tier 2 support, and Intune administrator | Can restore any deleted Microsoft 365 group
29+
User administrator and Partner Tier 1 support | Can restore any deleted Microsoft 365 group except those groups assigned to the Global Administrator role
3030
User | Can restore any deleted Microsoft 365 group that they own
3131

3232
## View and manage the deleted Microsoft 365 groups that are available to restore
@@ -46,19 +46,21 @@ User | Can restore any deleted Microsoft 365 group that they own
4646

4747
## View the deleted Microsoft 365 groups that are available to restore using PowerShell
4848

49-
The following cmdlets can be used to view the deleted groups to verify that the one or ones you're interested in have not yet been permanently purged. These cmdlets are part of the [Azure AD PowerShell module](https://www.powershellgallery.com/packages/AzureAD/). More information about this module can be found in the [Azure Active Directory PowerShell Version 2](/powershell/azure/active-directory/install-adv2) article.
49+
The following cmdlets can be used to view the deleted groups to verify that the one or ones you're interested in haven't yet been permanently purged. These cmdlets are part of the [Microsoft Graph PowerShell module](/powershell/microsoftgraph/installation?view=graph-powershell-1.0&preserve-view=true). More information about this module can be found in the [Microsoft Graph PowerShell overview](/powershell/microsoftgraph/overview?view=graph-powershell-1.0&preserve-view=true) article.
5050

51-
1. Run the following cmdlet to display all deleted Microsoft 365 groups in your Azure AD organization that are still available to restore.
51+
1. Run the following cmdlet to display all deleted Microsoft 365 groups in your Azure AD organization that are still available to restore. Please install the [Graph](/powershell/microsoftgraph/installation?view=graph-powershell-1.0&preserve-view=true) beta version if it isn't already installed on the machine.
5252

5353

5454
```powershell
55-
Get-AzureADMSDeletedGroup
55+
Install-Module Microsoft.Graph.Beta
56+
Connect-MgGraph -Scopes "Group.ReadWrite.All"
57+
Get-MgBetaDirectoryDeletedGroup
5658
```
5759
58-
2. Alternately, if you know the objectID of a specific group (and you can get it from the cmdlet in step 1), run the following cmdlet to verify that the specific deleted group has not yet been permanently purged.
60+
2. Alternately, if you know the objectID of a specific group (and you can get it from the cmdlet in step 1), run the following cmdlet to verify that the specific deleted group hasn't yet been permanently purged.
5961
60-
```
61-
Get-AzureADMSDeletedGroup –Id <objectId>
62+
```powershell
63+
Get-MgBetaDirectoryDeletedGroup -DirectoryObjectId <objectId>
6264
```
6365
6466
## How to restore your deleted Microsoft 365 group using
@@ -68,20 +70,20 @@ Once you have verified that the group is still available to restore, restore the
6870
1. Run the following cmdlet to restore the group and its contents.
6971
7072
71-
```
72-
Restore-AzureADMSDeletedDirectoryObject –Id <objectId>
73+
```powershell
74+
Restore-MgBetaDirectoryDeletedItem -DirectoryObjectId <objectId>
7375
```
7476
7577
2. Alternatively, the following cmdlet can be run to permanently remove the deleted group.
7678
7779
78-
```
79-
Remove-AzureADMSDeletedDirectoryObject –Id <objectId>
80+
```powershell
81+
Remove-MgBetaDirectoryDeletedItem -DirectoryObjectId <objectId>
8082
```
8183
8284
## How do you know this worked?
8385
84-
To verify that you’ve successfully restored a Microsoft 365 group, run the `Get-AzureADGroup –ObjectId <objectId>` cmdlet to display information about the group. After the restore request is completed:
86+
To verify that you’ve successfully restored a Microsoft 365 group, run the `Get-MgBetaGroup –GroupId <objectId>` cmdlet to display information about the group. After the restore request is completed:
8587
8688
- The group appears in the Left navigation bar on Exchange
8789
- The plan for the group will appear in Planner

articles/active-directory/enterprise-users/groups-troubleshooting.md

Lines changed: 22 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -21,19 +21,32 @@ This article contains troubleshooting information for groups in Azure Active Dir
2121
## Troubleshooting group creation issues
2222

2323
**I disabled security group creation in the Azure portal but groups can still be created via PowerShell**
24-
The **User can create security groups in Azure portals** setting in the Azure portal controls whether or not non-admin users can create security groups in the Access panel or the Azure portal. It does not control security group creation via PowerShell.
24+
The **User can create security groups in Azure portals** setting in the Azure portal controls whether or not nonadmin users can create security groups in the Access panel or the Azure portal. It does not control security group creation via PowerShell.
2525

26-
To disable group creation for non-admin users in PowerShell:
27-
1. Verify that non-admin users are allowed to create groups:
26+
To disable group creation for nonadmin users in PowerShell:
27+
1. Verify that nonadmin users are allowed to create groups:
2828

2929
```powershell
30-
Get-MsolCompanyInformation | Format-List UsersPermissionToCreateGroupsEnabled
30+
Get-MgBetaDirectorySetting | select -ExpandProperty values
3131
```
3232

33-
2. If it returns `UsersPermissionToCreateGroupsEnabled : True`, then non-admin users can create groups. To disable this feature:
33+
2. If it returns `EnableGroupCreation : True`, then nonadmin users can create groups. To disable this feature:
3434

3535
```powershell
36-
Set-MsolCompanySettings -UsersPermissionToCreateGroupsEnabled $False
36+
Install-Module Microsoft.Graph.Beta.Identity.DirectoryManagement
37+
Import-Module Microsoft.Graph.Beta.Identity.DirectoryManagement
38+
$params = @{
39+
TemplateId = "62375ab9-6b52-47ed-826b-58e47e0e304b"
40+
Values = @(
41+
@{
42+
Name = "EnableGroupCreation"
43+
Value = "false"
44+
}
45+
)
46+
}
47+
Connect-MgGraph -Scopes "Directory.ReadWrite.All"
48+
New-MgBetaDirectorySetting -BodyParameter $params
49+
3750
```
3851

3952
**I received a max groups allowed error when trying to create a Dynamic Group in PowerShell**
@@ -46,7 +59,7 @@ To create any new Dynamic groups, you'll first need to delete some existing Dyna
4659
**I configured a rule on a group but no memberships get updated in the group**
4760
1. Verify the values for user or device attributes in the rule. Ensure there are users that satisfy the rule.
4861
For devices, check the device properties to ensure any synced attributes contain the expected values.
49-
2. Check the membership processing status to confirm if it is complete. You can check the [membership processing status](groups-create-rule.md#check-processing-status-for-a-rule) and the last updated date on the **Overview** page for the group.
62+
2. Check the membership processing status to confirm if it's complete. You can check the [membership processing status](groups-create-rule.md#check-processing-status-for-a-rule) and the last updated date on the **Overview** page for the group.
5063

5164
If everything looks good, please allow some time for the group to populate. Depending on the size of your Azure AD organization, the group may take up to 24 hours for populating for the first time or after a rule change.
5265

@@ -57,15 +70,15 @@ This is expected behavior. Existing members of the group are removed when a rule
5770
Dedicated membership evaluation is done periodically in an asynchronous background process. How long the process takes is determined by the number of users in your directory and the size of the group created as a result of the rule. Typically, directories with small numbers of users will see the group membership changes in less than a few minutes. Directories with a large number of users can take 30 minutes or longer to populate.
5871

5972
**How can I force the group to be processed now?**
60-
Currently, there is no way to automatically trigger the group to be processed on demand. However, you can manually trigger the reprocessing by updating the membership rule to add a whitespace at the end.
73+
Currently, there's no way to automatically trigger the group to be processed on demand. However, you can manually trigger the reprocessing by updating the membership rule to add a whitespace at the end.
6174

6275
**I encountered a rule processing error**
6376
The following table lists common dynamic membership rule errors and how to correct them.
6477

6578
| Rule parser error | Error usage | Corrected usage |
6679
| --- | --- | --- |
6780
| Error: Attribute not supported. |(user.invalidProperty -eq "Value") |(user.department -eq "value")<br/><br/>Make sure the attribute is on the [supported properties list](groups-dynamic-membership.md#supported-properties). |
68-
| Error: Operator is not supported on attribute. |(user.accountEnabled -contains true) |(user.accountEnabled -eq true)<br/><br/>The operator used is not supported for the property type (in this example, -contains cannot be used on type boolean). Use the correct operators for the property type. |
81+
| Error: Operator isn't supported on attribute. |(user.accountEnabled -contains true) |(user.accountEnabled -eq true)<br/><br/>The operator used isn't supported for the property type (in this example, -contains can't be used on type boolean). Use the correct operators for the property type. |
6982
| Error: Query compilation error. | 1. (user.department -eq "Sales") (user.department -eq "Marketing")<br>2. (user.userPrincipalName -match "\*@domain.ext") | 1. Missing operator. Use -and or -or to join predicates<br>(user.department -eq "Sales") -or (user.department -eq "Marketing")<br>2. Error in regular expression used with -match<br>(user.userPrincipalName -match ".\*@domain.ext")<br>or alternatively: (user.userPrincipalName -match "@domain.ext$") |
7083

7184
## Next steps

articles/active-directory/enterprise-users/users-bulk-add.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -91,7 +91,7 @@ Next, you can check to see that the users you created exist in the Azure AD orga
9191
Run the following command:
9292

9393
``` PowerShell
94-
Get-AzureADUser -Filter "UserType eq 'Member'"
94+
Get-MgUser -Filter "UserType eq 'Member'"
9595
```
9696

9797
You should see that the users that you created are listed.

articles/active-directory/enterprise-users/users-bulk-delete.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -71,7 +71,7 @@ Next, you can check to see that the users you deleted exist in the Azure AD orga
7171
Run the following command:
7272

7373
``` PowerShell
74-
Get-AzureADUser -Filter "UserType eq 'Member'"
74+
Get-MgUser -Filter "UserType eq 'Member'"
7575
```
7676

7777
Verify that the users that you deleted are no longer listed.

articles/azure-monitor/app/codeless-overview.md

Lines changed: 6 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -46,16 +46,14 @@ Links are provided to more information for each supported scenario.
4646
4747
## JavaScript (Web) SDK Loader Script injection by configuration
4848

49-
If you’re using the following supported SDKs, you can configure the JavaScript (Web) SDK Loader Script to inject from the server-side SDK onto each page.
49+
When using supported SDKs, you can enable SDK injection in configuration to automatically inject JavaScript (Web) SDK Loader Script onto each page.
5050

51-
> [!NOTE]
52-
> See the linked article for instructions on how to install the server-side SDK.
5351

54-
| SDK | More information
55-
| :--- | :--- |
56-
| ASP.NET Core | [Enable client-side telemetry for web applications](./asp-net-core.md?tabs=netcorenew%2Cnetcore6#enable-client-side-telemetry-for-web-applications) |
57-
| Node.js | [Automatic web Instrumentation](./nodejs.md#automatic-web-instrumentationpreview) |
58-
| Java | [Browser SDK Loader](./java-standalone-config.md#browser-sdk-loader-preview) |
52+
| Language
53+
| :--- |
54+
| [ASP.NET Core](./asp-net-core.md?tabs=netcorenew%2Cnetcore6#enable-client-side-telemetry-for-web-applications) |
55+
| [Node.js](./nodejs.md#automatic-web-instrumentationpreview) |
56+
| [Java](./java-standalone-config.md#browser-sdk-loader-preview) |
5957

6058
For other methods to instrument your application with the Application Insights JavaScript SDK, see [Get started with the JavaScript SDK](./javascript-sdk.md).
6159

articles/data-factory/connector-mongodb.md

Lines changed: 15 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: data-factory
88
ms.subservice: data-movement
99
ms.topic: conceptual
1010
ms.custom: synapse, ignite-2022
11-
ms.date: 10/25/2022
11+
ms.date: 07/24/2023
1212
---
1313

1414
# Copy data from or to MongoDB using Azure Data Factory or Synapse Analytics
@@ -251,6 +251,20 @@ To achieve such schema-agnostic copy, skip the "structure" (also called *schema*
251251

252252
To copy data from MongoDB to tabular sink or reversed, refer to [schema mapping](copy-activity-schema-and-type-mapping.md#schema-mapping).
253253

254+
## Upgrade the MongoDB linked service
255+
256+
Here are steps that help you upgrade your linked service and related queries:
257+
258+
1. Create a new MongoDB linked service and configure it by referring to [Linked service properties](#linked-service-properties).
259+
1. If you use SQL queries in your pipelines that refer to the old MongoDB linked service, replace them with the equivalent MongoDB queries. See the following table for the replacement examples:
260+
261+
| SQL query | Equivalent MongoDB query |
262+
|:--- |:--- |
263+
| `SELECT * FROM users` | `db.users.find({})` |
264+
| `SELECT username, age FROM users` |`db.users.find({}, {username: 1, age: 1})` |
265+
| `SELECT username AS User, age AS Age, statusNumber AS Status, CASE WHEN Status = 0 THEN "Pending" CASE WHEN Status = 1 THEN "Finished" ELSE "Unknown" END AS statusEnum LastUpdatedTime + interval '2' hour AS NewLastUpdatedTime FROM users` | `db.users.aggregate([{ $project: { _id: 0, User: "$username", Age: "$age", Status: "$statusNumber", statusEnum: { $switch: { branches: [ { case: { $eq: ["$Status", 0] }, then: "Pending" }, { case: { $eq: ["$Status", 1] }, then: "Finished" } ], default: "Unknown" } }, NewLastUpdatedTime: { $add: ["$LastUpdatedTime", 2 * 60 * 60 * 1000] } } }])`|
266+
| `SELECT employees.name, departments.name AS department_name FROM employees LEFT JOIN departments ON employees.department_id = departments.id;`|`db.employees.aggregate([ { $lookup: { from: "departments", localField: "department_id", foreignField: "_id", as: "department" } }, { $unwind: "$department" }, { $project: { _id: 0, name: 1, department_name: "$department.name" } } ])` |
267+
254268

255269
## Next steps
256270
For a list of data stores supported as sources and sinks by the copy activity, see [supported data stores](copy-activity-overview.md#supported-data-stores-and-formats).

articles/data-factory/connector-troubleshoot-mongodb.md

Lines changed: 15 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,12 @@
11
---
2-
title: Troubleshoot the mongodb connector
2+
title: Troubleshoot the MongoDB connector
33
titleSuffix: Azure Data Factory & Azure Synapse
4-
description: Learn how to troubleshoot issues with the mongodb connector in Azure Data Factory and Azure Synapse Analytics.
4+
description: Learn how to troubleshoot issues with the MongoDB connector in Azure Data Factory and Azure Synapse Analytics.
55
author: jianleishen
66
ms.service: data-factory
77
ms.subservice: data-movement
88
ms.topic: troubleshooting
9-
ms.date: 12/02/2022
9+
ms.date: 07/24/2023
1010
ms.author: jianleishen
1111
ms.custom: has-adal-ref, synapse
1212
---
@@ -28,6 +28,18 @@ This article provides suggestions to troubleshoot common problems with the Mongo
2828

2929
- **Resolution**: In the MongoDB connection string, add the *uuidRepresentation=standard* option. For more information, see [MongoDB connection string](connector-mongodb.md#linked-service-properties).
3030

31+
## Migrate to the new version of MongoDB connector
32+
33+
- **Symptoms**: You meet the following error code and error message:
34+
- **Error code**: `DeprecatedMongoDbOdbcConnector`
35+
- **Error message**: `The legacy MongoDB connector has been deprecated. To ensure your pipeline works, please create a new MongoDB linked service. Detailed instructions can be found in this documentation: https://learn.microsoft.com/azure/data-factory/connector-mongodb#upgrade-the-mongodb-linked-service`
36+
37+
- **Cause**:
38+
Your pipeline is still running on a legacy MongoDB connector that causes the error.
39+
40+
- **Resolution**:
41+
Upgrade your MongoDB linked service to the latest version. Refer to this [article](connector-mongodb.md#upgrade-the-mongodb-linked-service).
42+
3143
## Next steps
3244

3345
For more troubleshooting help, try these resources:

articles/ddos-protection/ddos-protection-overview.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -35,9 +35,9 @@ Azure DDoS Protection applies three auto-tuned mitigation policies (TCP SYN, TCP
3535
### Azure DDoS Rapid Response
3636
During an active attack, Azure DDoS Protection customers have access to the DDoS Rapid Response (DRR) team, who can help with attack investigation during an attack and post-attack analysis. For more information, see [Azure DDoS Rapid Response](ddos-rapid-response.md).
3737

38-
## SKU
38+
## Tier
3939

40-
Azure DDoS Protection is offered in two available SKUs, DDoS IP Protection and DDoS Network Protection. For more information about the SKUs, see [SKU comparison](ddos-protection-sku-comparison.md).
40+
Azure DDoS Protection is offered in two available tiers, DDoS IP Protection and DDoS Network Protection. For more information about the tiers, see [Tier comparison](ddos-protection-sku-comparison.md).
4141

4242

4343
### Native platform integration

articles/ddos-protection/index.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ landingContent:
2323
links:
2424
- text: What is Azure DDoS Protection?
2525
url: ddos-protection-overview.md
26-
- text: Azure DDoS Protection SKU comparison
26+
- text: Azure DDoS Protection tier comparison
2727
url: ddos-protection-sku-comparison.md
2828
- text: Pricing
2929
url: https://azure.microsoft.com/en-us/pricing/details/ddos-protection/

articles/defender-for-cloud/TOC.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -79,6 +79,9 @@
7979
href: tutorial-enable-container-aws.md
8080
- name: Protect your Google Cloud Platform (GCP) project containers
8181
href: tutorial-enable-container-gcp.md
82+
- name: How to enable Defender for Containers components
83+
displayName: kubernetes, aks, acr, registries, k8s, arc, hybrid, on-premises, azure arc, multicloud
84+
href: defender-for-containers-enable.md
8285
- name: Protect your key vaults with Defender for Key Vault
8386
displayName: enable, key, vault, key vault
8487
href: tutorial-enable-key-vault-plan.md
@@ -544,9 +547,6 @@
544547
- name: How does Defender for Containers work?
545548
displayName: containers
546549
href: defender-for-containers-architecture.md
547-
- name: Enable Defender for Containers
548-
displayName: kubernetes, aks, acr, registries, k8s, arc, hybrid, on-premises, azure arc, multicloud
549-
href: defender-for-containers-enable.md
550550
- name: Vulnerability assessment for Azure powered by Qualys
551551
displayName: ACR, registry, images, qualys
552552
href: defender-for-containers-vulnerability-assessment-azure.md

0 commit comments

Comments
 (0)