Skip to content

Commit 20fad63

Browse files
committed
Merging changes synced from https://github.com/MicrosoftDocs/azure-docs-pr (branch live)
2 parents f838183 + d6dc8ce commit 20fad63

File tree

172 files changed

+6284
-3743
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

172 files changed

+6284
-3743
lines changed

.openpublishing.publish.config.json

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -381,6 +381,12 @@
381381
"branch": "main",
382382
"branch_mapping": {}
383383
},
384+
{
385+
"path_to_root": "media-services-v3-python",
386+
"url": "https://github.com/Azure-Samples/media-services-v3-python",
387+
"branch": "main",
388+
"branch_mapping": {}
389+
},
384390
{
385391
"path_to_root": "samples-javascript",
386392
"url": "https://github.com/Microsoft/tsiclient",
@@ -411,12 +417,6 @@
411417
"branch": "main",
412418
"branch_mapping": {}
413419
},
414-
{
415-
"path_to_root": "media-services-v3-python",
416-
"url": "https://github.com/Azure-Samples/media-services-v3-python",
417-
"branch": "main",
418-
"branch_mapping": {}
419-
},
420420
{
421421
"path_to_root": "remote-monitoring-webui",
422422
"url": "https://github.com/Azure/pcs-remote-monitoring-webui.git",

.openpublishing.redirection.json

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -693,6 +693,11 @@
693693
"redirect_url": "/azure/frontdoor/front-door-rules-engine-actions",
694694
"redirect_document_id": false
695695
},
696+
{
697+
"source_path_from_root": "/articles/frontdoor/concept-rules-set.md",
698+
"redirect_url": "/azure/frontdoor/front-door-rules-engine",
699+
"redirect_document_id": false
700+
},
696701
{
697702
"source_path_from_root": "/articles/app-service-web/web-sites-dotnet-deploy-aspnet-mvc-app-membership-oauth-sql-database.md",
698703
"redirect_url": "/aspnet/core/security/authorization/secure-data",
@@ -6853,6 +6858,11 @@
68536858
"redirect_url": "/azure/azure-functions/functions-kubernetes-keda",
68546859
"redirect_document_id": false
68556860
},
6861+
{
6862+
"source_path_from_root": "/articles/azure-functions/functions-bindings-event-iot-output.md",
6863+
"redirect_url": "/azure/azure-functions/functions-bindings-event-hubs-output",
6864+
"redirect_document_id": false
6865+
},
68566866
{
68576867
"source_path_from_root": "/articles/azure-government/documentation-government-k8.md",
68586868
"redirect_url": "/azure/azure-government",

articles/active-directory-domain-services/tutorial-configure-networking.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ To complete this tutorial, you need the following resources and privileges:
4040
* An Azure Active Directory tenant associated with your subscription, either synchronized with an on-premises directory or a cloud-only directory.
4141
* If needed, [create an Azure Active Directory tenant][create-azure-ad-tenant] or [associate an Azure subscription with your account][associate-azure-ad-tenant].
4242
* You need [Application Administrator](/azure/active-directory/roles/permissions-reference#application-administrator) and [Groups Administrator](/azure/active-directory/roles/permissions-reference#groups-administrator) Azure AD roles in your tenant to enable Azure AD DS.
43-
* You need [Domain Services Contributor](/azure/role-based-access-control/built-in-roles#contributor) Azure role to create the required Azure AD DS resources.
43+
* You need Domain Services Contributor Azure role to create the required Azure AD DS resources.
4444
* An Azure Active Directory Domain Services managed domain enabled and configured in your Azure AD tenant.
4545
* If needed, the first tutorial [creates and configures an Azure Active Directory Domain Services managed domain][create-azure-ad-ds-instance].
4646

articles/active-directory-domain-services/tutorial-create-instance.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: domain-services
99
ms.workload: identity
1010
ms.topic: tutorial
11-
ms.date: 12/15/2021
11+
ms.date: 03/08/2022
1212
ms.author: justinha
1313

1414
#Customer intent: As an identity administrator, I want to create an Azure Active Directory Domain Services managed domain so that I can synchronize identity information with my Azure Active Directory tenant and provide Domain Services connectivity to virtual machines and applications in Azure.
@@ -38,7 +38,7 @@ To complete this tutorial, you need the following resources and privileges:
3838
* An Azure Active Directory tenant associated with your subscription, either synchronized with an on-premises directory or a cloud-only directory.
3939
* If needed, [create an Azure Active Directory tenant][create-azure-ad-tenant] or [associate an Azure subscription with your account][associate-azure-ad-tenant].
4040
* You need [Application Administrator](/azure/active-directory/roles/permissions-reference#application-administrator) and [Groups Administrator](/azure/active-directory/roles/permissions-reference#groups-administrator) Azure AD roles in your tenant to enable Azure AD DS.
41-
* You need [Domain Services Contributor](/azure/role-based-access-control/built-in-roles#contributor) Azure role to create the required Azure AD DS resources.
41+
* You need Domain Services Contributor Azure role to create the required Azure AD DS resources.
4242
* A virtual network with DNS servers that can query necessary infrastructure such as storage. DNS servers that can't perform general internet queries might block the ability to create a managed domain.
4343

4444
Although not required for Azure AD DS, it's recommended to [configure self-service password reset (SSPR)][configure-sspr] for the Azure AD tenant. Users can change their password without SSPR, but SSPR helps if they forget their password and need to reset it.

articles/active-directory/identity-protection/concept-identity-protection-risks.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -60,7 +60,7 @@ These risks can be calculated in real-time or calculated offline using Microsoft
6060
| Token Issuer Anomaly | Offline |This risk detection indicates the SAML token issuer for the associated SAML token is potentially compromised. The claims included in the token are unusual or match known attacker patterns. |
6161
| Malware linked IP address | Offline | This risk detection type indicates sign-ins from IP addresses infected with malware that is known to actively communicate with a bot server. This detection is determined by correlating IP addresses of the user's device against IP addresses that were in contact with a bot server while the bot server was active. <br><br> **[This detection has been deprecated](../fundamentals/whats-new-archive.md#planned-deprecation---malware-linked-ip-address-detection-in-identity-protection)**. Identity Protection will no longer generate new "Malware linked IP address" detections. Customers who currently have "Malware linked IP address" detections in their tenant will still be able to view, remediate, or dismiss them until the 90-day detection retention time is reached.|
6262
| Suspicious browser | Offline | Suspicious browser detection indicates anomalous behavior based on suspicious sign-in activity across multiple tenants from different countries in the same browser. |
63-
| Unfamiliar sign-in properties | Real-time | This risk detection type considers past sign-in history (IP, Latitude / Longitude and ASN) to look for anomalous sign-ins. The system stores information about previous locations used by a user, and considers these "familiar" locations. The risk detection is triggered when the sign-in occurs from a location that is not already in the list of familiar locations. Newly created users will be in "learning mode" for a while where unfamiliar sign-in properties risk detections will be turned off while our algorithms learn the user's behavior. The learning mode duration is dynamic and depends on how much time it takes the algorithm to gather enough information about the user's sign-in patterns. The minimum duration is five days. A user can go back into learning mode after a long period of inactivity. The system also ignores sign-ins from familiar devices, and locations that are geographically close to a familiar location. <br><br> We also run this detection for basic authentication (or legacy protocols). Because these protocols do not have modern properties such as client ID, there is limited telemetry to reduce false positives. We recommend our customers to move to modern authentication. <br><br> Unfamiliar sign-in properties can be detected on both interactive and non-interactive sign-ins. When this detection is detected on non-interactive sign-ins, it deserves increased scrutiny due to the risk of token replay attacks. |
63+
| Unfamiliar sign-in properties | Real-time | This risk detection type considers past sign-in history (IP, Latitude / Longitude and ASN) to look for anomalous sign-ins. The system stores information about previous locations used by a user, and considers these "familiar" locations. The risk detection is triggered when the sign-in occurs from a location that is not already in the list of familiar locations. Newly created users will be in "learning mode" for a while where unfamiliar sign-in properties risk detections will be turned off while our algorithms learn the user's behavior. The learning mode duration is dynamic and depends on how much time it takes the algorithm to gather enough information about the user's sign-in patterns. The minimum duration is five days. A user can go back into learning mode after a long period of inactivity and after a secure password reset. The system also ignores sign-ins from familiar devices, and locations that are geographically close to a familiar location. <br><br> We also run this detection for basic authentication (or legacy protocols). Because these protocols do not have modern properties such as client ID, there is limited telemetry to reduce false positives. We recommend our customers to move to modern authentication. <br><br> Unfamiliar sign-in properties can be detected on both interactive and non-interactive sign-ins. When this detection is detected on non-interactive sign-ins, it deserves increased scrutiny due to the risk of token replay attacks. |
6464
| Admin confirmed user compromised | Offline | This detection indicates an admin has selected 'Confirm user compromised' in the Risky users UI or using riskyUsers API. To see which admin has confirmed this user compromised, check the user's risk history (via UI or API). |
6565
| Malicious IP address | Offline | This detection indicates sign-in from a malicious IP address. An IP address is considered malicious based on high failure rates because of invalid credentials received from the IP address or other IP reputation sources. |
6666
| Suspicious inbox manipulation rules | Offline | This detection is discovered by [Microsoft Defender for Cloud Apps](/cloud-app-security/anomaly-detection-policy#suspicious-inbox-manipulation-rules). This detection profiles your environment and triggers alerts when suspicious rules that delete or move messages or folders are set on a user's inbox. This detection may indicate that the user's account is compromised, that messages are being intentionally hidden, and that the mailbox is being used to distribute spam or malware in your organization. |

articles/app-service/overview-arc-integration.md

Lines changed: 10 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: 'App Service on Azure Arc'
33
description: An introduction to App Service integration with Azure Arc for Azure operators.
44
ms.topic: article
5-
ms.date: 01/31/2022
5+
ms.date: 03/08/2022
66
---
77

88
# App Service, Functions, and Logic Apps on Azure Arc (Preview)
@@ -179,6 +179,15 @@ If your extension was in the stable version and auto-upgrade-minor-version is se
179179
```azurecli-interactive
180180
az k8s-extension update --cluster-type connectedClusters -c <clustername> -g <resource group> -n <extension name> --release-train stable --version 0.12.0
181181
```
182+
### Application services extension v 0.12.1 (March 2022)
183+
184+
- Resolved issue with outbound proxy support to enable logging to Log Analytics Workspace
185+
186+
If your extension was in the stable version and auto-upgrade-minor-version is set to true, the extension upgrades automatically. To manually upgrade the extension to the latest version, you can run the command:
187+
188+
```azurecli-interactive
189+
az k8s-extension update --cluster-type connectedClusters -c <clustername> -g <resource group> -n <extension name> --release-train stable --version 0.12.1
190+
```
182191

183192
## Next steps
184193

articles/app-service/toc.yml

Lines changed: 1 addition & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -448,23 +448,11 @@
448448
href: troubleshoot-performance-degradation.md
449449
- name: Troubleshoot domain and certificate issues
450450
href: troubleshoot-domain-ssl-certificates.md
451-
- name: FAQ
452-
items:
453-
- name: Availability, performance, and application FAQ
454-
href: faq-availability-performance-application-issues.yml
455-
- name: Deployment FAQ
456-
href: faq-deployment.yml
457-
- name: Open-source technologies FAQ
458-
href: faq-open-source-technologies.yml
459-
- name: Configuration and management FAQ
460-
href: faq-configuration-and-management.yml
461-
- name: App Service on Linux
462-
href: faq-app-service-linux.yml
463451
- name: IP address change
464452
items:
465453
- name: Inbound IP address
466454
href: ip-address-change-inbound.md
467455
- name: Outbound IP address
468456
href: ip-address-change-outbound.md
469457
- name: TLS/SSL address
470-
href: ip-address-change-ssl.md
458+
href: ip-address-change-ssl.md

articles/app-service/webjobs-sdk-how-to.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -397,7 +397,7 @@ static async Task Main()
397397
}
398398
```
399399

400-
For more information, see the [Azure CosmosDB binding](../azure-functions/functions-bindings-cosmosdb-v2-output.md#hostjson-settings) article.
400+
For more information, see the [Azure CosmosDB binding](../azure-functions/functions-bindings-cosmosdb-v2.md#hostjson-settings) article.
401401

402402
#### Event Hubs trigger configuration (version 3.*x*)
403403

@@ -526,7 +526,7 @@ static async Task Main()
526526
}
527527
```
528528

529-
For more details, see the [Service Bus binding](../azure-functions/functions-bindings-service-bus.md#hostjson-settings) article.
529+
For more details, see the [Service Bus binding](../azure-functions/functions-bindings-service-bus.md) article.
530530

531531
### Configuration for other bindings
532532

@@ -684,7 +684,7 @@ The Azure Functions documentation provides reference information about each bind
684684

685685
* [Packages](../azure-functions/functions-bindings-storage-queue.md). The package you need to install to include support for the binding in a WebJobs SDK project.
686686
* [Examples](../azure-functions/functions-bindings-storage-queue-trigger.md). Code samples. The C# class library example applies to the WebJobs SDK. Just omit the `FunctionName` attribute.
687-
* [Attributes](../azure-functions/functions-bindings-storage-queue-trigger.md#attributes-and-annotations). The attributes to use for the binding type.
687+
* [Attributes](../azure-functions/functions-bindings-storage-queue-trigger.md#attributes). The attributes to use for the binding type.
688688
* [Configuration](../azure-functions/functions-bindings-storage-queue-trigger.md#configuration). Explanations of the attribute properties and constructor parameters.
689689
* [Usage](../azure-functions/functions-bindings-storage-queue-trigger.md#usage). The types you can bind to and information about how the binding works. For example: polling algorithm, poison queue processing.
690690

articles/azure-functions/TOC.yml

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -198,6 +198,8 @@
198198
href: functions-deployment-technologies.md
199199
- name: Events and messaging
200200
items:
201+
- name: Connect to services
202+
href: event-messaging-bindings.md
201203
- name: Event-driven scaling
202204
href: event-driven-scaling.md
203205
- name: Reliable event processing
@@ -477,6 +479,8 @@
477479
href: functions-add-output-binding-storage-queue-vs-code.md
478480
- name: Storage - Visual Studio
479481
href: functions-add-output-binding-storage-queue-vs.md
482+
- name: Work with Event Grid
483+
href: event-grid-how-tos.md
480484
- name: Start/Stop VMs
481485
items:
482486
- name: Overview
@@ -620,9 +624,6 @@
620624
- name: Trigger
621625
href: functions-bindings-event-iot-trigger.md
622626
displayName: Azure IoT Hubs
623-
- name: Output
624-
href: functions-bindings-event-iot-output.md
625-
displayName: Azure IoT Hubs
626627
- name: Kafka
627628
href: https://github.com/azure/azure-functions-kafka-extension
628629
- name: HTTP and webhooks

0 commit comments

Comments
 (0)