Skip to content

Commit 23e6b59

Browse files
committed
Merging changes synced from https://github.com/MicrosoftDocs/azure-docs-pr (branch live)
2 parents 09a410b + 95d9a6a commit 23e6b59

File tree

700 files changed

+10418
-6875
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

700 files changed

+10418
-6875
lines changed

.openpublishing.redirection.json

Lines changed: 20 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -11521,6 +11521,26 @@
1152111521
"redirect_url": "/azure/cognitive-services/Translator/quickstart-java-translate",
1152211522
"redirect_document_id": false
1152311523
},
11524+
{
11525+
"source_path": "articles/cognitive-services/Translator/quickstarts/nodejs.md",
11526+
"redirect_url": "/azure/cognitive-services/Translator/quickstart-nodejs-translate",
11527+
"redirect_document_id": false
11528+
},
11529+
{
11530+
"source_path": "articles/cognitive-services/Translator/quickstarts/php.md",
11531+
"redirect_url": "/azure/cognitive-services/Translator/quickstart-php-translate",
11532+
"redirect_document_id": false
11533+
},
11534+
{
11535+
"source_path": "articles/cognitive-services/Translator/quickstarts/python.md",
11536+
"redirect_url": "/azure/cognitive-services/Translator/quickstart-python-translate",
11537+
"redirect_document_id": false
11538+
},
11539+
{
11540+
"source_path": "articles/cognitive-services/Translator/quickstarts/ruby.md",
11541+
"redirect_url": "/azure/cognitive-services/Translator/quickstart-ruby-translate",
11542+
"redirect_document_id": false
11543+
},
1152411544
{
1152511545
"source_path": "articles/iot-suite/iot-solution-build-system.md",
1152611546
"redirect_url": "https://github.com/Azure-Samples/MyDriving/blob/master/docs/iot-solution-build-system.md",

articles/active-directory-domain-services/active-directory-ds-admin-guide-administer-dns.md

Lines changed: 13 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -14,15 +14,17 @@ ms.workload: identity
1414
ms.tgt_pltfrm: na
1515
ms.devlang: na
1616
ms.topic: article
17-
ms.date: 09/23/2017
17+
ms.date: 06/22/2018
1818
ms.author: maheshu
1919

2020
---
2121
# Administer DNS on an Azure AD Domain Services managed domain
2222
Azure Active Directory Domain Services includes a DNS (Domain Name Resolution) server that provides DNS resolution for the managed domain. Occasionally, you may need to configure DNS on the managed domain. You may need to create DNS records for machines that are not joined to the domain, configure virtual IP addresses for load-balancers or setup external DNS forwarders. For this reason, users who belong to the 'AAD DC Administrators' group are granted DNS administration privileges on the managed domain.
2323

24+
[!INCLUDE [active-directory-ds-prerequisites.md](../../includes/active-directory-ds-prerequisites.md)]
25+
2426
## Before you begin
25-
To perform the tasks listed in this article, you need:
27+
To complete the tasks listed in this article, you need:
2628

2729
1. A valid **Azure subscription**.
2830
2. An **Azure AD directory** - either synchronized with an on-premises directory or a cloud-only directory.
@@ -32,21 +34,21 @@ To perform the tasks listed in this article, you need:
3234

3335
<br>
3436

35-
## Task 1 - Provision a domain-joined virtual machine to remotely administer DNS for the managed domain
37+
## Task 1 - Create a domain-joined virtual machine to remotely administer DNS for the managed domain
3638
Azure AD Domain Services managed domains can be managed remotely using familiar Active Directory administrative tools such as the Active Directory Administrative Center (ADAC) or AD PowerShell. Similarly, DNS for the managed domain can be administered remotely using the DNS Server administration tools.
3739

38-
Administrators in your Azure AD directory do not have privileges to connect to domain controllers on the managed domain via Remote Desktop. Members of the 'AAD DC Administrators' group can administer DNS for managed domains remotely using DNS Server tools from a Windows Server/client computer that is joined to the managed domain. DNS Server tools can be installed as part of the Remote Server Administration Tools (RSAT) optional feature on Windows Server and client machines joined to the managed domain.
40+
Administrators in your Azure AD directory do not have privileges to connect to domain controllers on the managed domain via Remote Desktop. Members of the 'AAD DC Administrators' group can administer DNS for managed domains remotely using DNS Server tools from a Windows Server/client computer that is joined to the managed domain. DNS Server tools are part of the Remote Server Administration Tools (RSAT) optional feature.
3941

40-
The first task is to provision a Windows Server virtual machine that is joined to the managed domain. For instructions, refer to the article titled [join a Windows Server virtual machine to an Azure AD Domain Services managed domain](active-directory-ds-admin-guide-join-windows-vm.md).
42+
The first task is to create a Windows Server virtual machine that is joined to the managed domain. For instructions, refer to the article titled [join a Windows Server virtual machine to an Azure AD Domain Services managed domain](active-directory-ds-admin-guide-join-windows-vm.md).
4143

4244
## Task 2 - Install DNS Server tools on the virtual machine
43-
Perform the following steps to install the DNS Administration tools on the domain joined virtual machine. For more information on [installing and using Remote Server Administration Tools](https://technet.microsoft.com/library/hh831501.aspx), see Technet.
45+
Complete the following steps to install the DNS Administration tools on the domain joined virtual machine. For more information on [installing and using Remote Server Administration Tools](https://technet.microsoft.com/library/hh831501.aspx), see Technet.
4446

4547
1. Navigate to the Azure portal. Click **All resources** on the left-hand panel. Locate and click the virtual machine you created in Task 1.
4648
2. Click the **Connect** button on the Overview tab. A Remote Desktop Protocol (.rdp) file is created and downloaded.
4749

4850
![Connect to Windows virtual machine](./media/active-directory-domain-services-admin-guide/connect-windows-vm.png)
49-
3. To connect to your VM, open the downloaded RDP file. If prompted, click **Connect**. At the login prompt, use the credentials of a user belonging to the 'AAD DC Administrators' group. For example, we use '[email protected]' in our case. You may receive a certificate warning during the sign-in process. Click Yes or Continue to proceed with the connection.
51+
3. To connect to your VM, open the downloaded RDP file. If prompted, click **Connect**. Use the credentials of a user belonging to the 'AAD DC Administrators' group. For example, '[email protected]'. You may receive a certificate warning during the sign-in process. Click Yes or Continue to connect.
5052

5153
4. From the Start screen, open **Server Manager**. Click **Add Roles and Features** in the central pane of the Server Manager window.
5254

@@ -60,7 +62,7 @@ Perform the following steps to install the DNS Administration tools on the domai
6062
7. On the **Server Selection** page, select the current virtual machine from the server pool, and click **Next**.
6163

6264
![Server Selection page](./media/active-directory-domain-services-admin-guide/install-rsat-server-manager-add-roles-server.png)
63-
8. On the **Server Roles** page, click **Next**. We skip this page since we are not installing any roles on the server.
65+
8. On the **Server Roles** page, click **Next**.
6466
9. On the **Features** page, click to expand the **Remote Server Administration Tools** node and then click to expand the **Role Administration Tools** node. Select **DNS Server Tools** feature from the list of role administration tools.
6567

6668
![Features page](./media/active-directory-domain-services-admin-guide/install-rsat-server-manager-add-roles-dns-tools.png)
@@ -69,7 +71,7 @@ Perform the following steps to install the DNS Administration tools on the domai
6971
![Confirmation page](./media/active-directory-domain-services-admin-guide/install-rsat-server-manager-add-roles-dns-confirmation.png)
7072

7173
## Task 3 - Launch the DNS management console to administer DNS
72-
Now that the DNS Server Tools feature is installed on the domain joined virtual machine, we can use the DNS tools to administer DNS on the managed domain.
74+
Now, you can use Windows Server DNS tools to administer DNS on the managed domain.
7375

7476
> [!NOTE]
7577
> You need to be a member of the 'AAD DC Administrators' group, to administer DNS on the managed domain.
@@ -80,7 +82,7 @@ Now that the DNS Server Tools feature is installed on the domain joined virtual
8082

8183
![Administrative tools - DNS Console](./media/active-directory-domain-services-admin-guide/install-rsat-dns-tools-installed.png)
8284
2. Click **DNS** to launch the DNS Management console.
83-
3. In the **Connect to DNS Server** dialog, click the option titled **The following computer**, and enter the DNS domain name of the managed domain (for example, 'contoso100.com').
85+
3. In the **Connect to DNS Server** dialog, click **The following computer**, and enter the DNS domain name of the managed domain (for example, 'contoso100.com').
8486

8587
![DNS Console - connect to domain](./media/active-directory-domain-services-admin-guide/dns-console-connect-to-domain.png)
8688
4. The DNS Console connects to the managed domain.
@@ -93,7 +95,7 @@ Now that the DNS Server Tools feature is installed on the domain joined virtual
9395
>
9496
>
9597
96-
See the [DNS tools article on Technet](https://technet.microsoft.com/library/cc753579.aspx) for more information about managing DNS.
98+
For more information about managing DNS, see the [DNS tools article on Technet](https://technet.microsoft.com/library/cc753579.aspx).
9799

98100
## Related Content
99101
* [Azure AD Domain Services - Getting Started guide](active-directory-ds-getting-started.md)

articles/active-directory-domain-services/active-directory-ds-admin-guide-administer-domain.md

Lines changed: 16 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -14,15 +14,17 @@ ms.workload: identity
1414
ms.tgt_pltfrm: na
1515
ms.devlang: na
1616
ms.topic: article
17-
ms.date: 09/23/2017
17+
ms.date: 06/22/2018
1818
ms.author: maheshu
1919

2020
---
2121
# Administer an Azure Active Directory Domain Services managed domain
2222
This article shows you how to administer an Azure Active Directory (AD) Domain Services managed domain.
2323

24+
[!INCLUDE [active-directory-ds-prerequisites.md](../../includes/active-directory-ds-prerequisites.md)]
25+
2426
## Before you begin
25-
To perform the tasks listed in this article, you need:
27+
To complete the tasks listed in this article, you need:
2628

2729
1. A valid **Azure subscription**.
2830
2. An **Azure AD directory** - either synchronized with an on-premises directory or a cloud-only directory.
@@ -33,7 +35,7 @@ To perform the tasks listed in this article, you need:
3335
<br>
3436

3537
## Administrative tasks you can perform on a managed domain
36-
Members of the 'AAD DC Administrators' group are granted privileges on the managed domain that enable them to perform tasks such as:
38+
Members of the 'AAD DC Administrators' group are granted privileges on the managed domain that enable them to do tasks such as:
3739

3840
* Join machines to the managed domain.
3941
* Configure the built-in GPO for the 'AADDC Computers' and 'AADDC Users' containers in the managed domain.
@@ -42,15 +44,15 @@ Members of the 'AAD DC Administrators' group are granted privileges on the manag
4244
* Gain administrative access to computers joined to the managed domain.
4345

4446
## Administrative privileges you do not have on a managed domain
45-
The domain is managed by Microsoft, including activities such as patching, monitoring and, performing backups. Therefore, the domain is locked down and you do not have privileges to perform certain administrative tasks on the domain. Some examples of tasks you cannot perform are below.
47+
The domain is managed by Microsoft, including activities such as patching, monitoring and, taking backups. The domain is locked down and you do not have privileges to do certain administrative tasks on the domain. Some examples of tasks you cannot do are below.
4648

47-
* You are not granted Domain Administrator or Enterprise Administrator privileges for the managed domain.
48-
* You cannot extend the schema of the managed domain.
49-
* You cannot connect to domain controllers for the managed domain using Remote Desktop.
50-
* You cannot add domain controllers to the managed domain.
49+
* You don't have Domain Administrator or Enterprise Administrator privileges for the managed domain.
50+
* You can't extend the schema of the managed domain.
51+
* You can't connect to domain controllers for the managed domain using Remote Desktop.
52+
* You can't add domain controllers to the managed domain.
5153

52-
## Task 1 - Provision a domain-joined Windows Server virtual machine to remotely administer the managed domain
53-
Azure AD Domain Services managed domains can be managed using familiar Active Directory administrative tools such as the Active Directory Administrative Center (ADAC) or AD PowerShell. Tenant administrators do not have privileges to connect to domain controllers on the managed domain via Remote Desktop. Therefore, members of the 'AAD DC Administrators' group can administer managed domains remotely using AD administrative tools from a Windows Server/client computer that is joined to the managed domain. AD administrative tools can be installed as part of the Remote Server Administration Tools (RSAT) optional feature on Windows Server and client machines joined to the managed domain.
54+
## Task 1 - Create a domain-joined Windows Server virtual machine to remotely administer the managed domain
55+
Azure AD Domain Services managed domains can be managed using familiar Active Directory administrative tools such as the Active Directory Administrative Center (ADAC) or AD PowerShell. Tenant administrators do not have privileges to connect to domain controllers on the managed domain via Remote Desktop. Members of the 'AAD DC Administrators' group can administer managed domains remotely using AD administrative tools from a Windows Server/client computer that is joined to the managed domain. AD administrative tools can be installed as part of the Remote Server Administration Tools (RSAT) optional feature on Windows Server and client machines joined to the managed domain.
5456

5557
The first step is to set up a Windows Server virtual machine that is joined to the managed domain. For instructions, refer to the article titled [join a Windows Server virtual machine to an Azure AD Domain Services managed domain](active-directory-ds-admin-guide-join-windows-vm.md).
5658

@@ -60,13 +62,13 @@ The instructions in this article use a Windows Server virtual machine to adminis
6062
You can [install Remote Server Administration Tools (RSAT)](http://social.technet.microsoft.com/wiki/contents/articles/2202.remote-server-administration-tools-rsat-for-windows-client-and-windows-server-dsforum2wiki.aspx) on a Windows client virtual machine by following the instructions on TechNet.
6163

6264
## Task 2 - Install Active Directory administration tools on the virtual machine
63-
Perform the following steps to install the Active Directory Administration tools on the domain joined virtual machine. See Technet for more [information on installing and using Remote Server Administration Tools](https://technet.microsoft.com/library/hh831501.aspx).
65+
Complete the following steps to install the Active Directory Administration tools on the domain joined virtual machine. See Technet for more [information on installing and using Remote Server Administration Tools](https://technet.microsoft.com/library/hh831501.aspx).
6466

6567
1. Navigate to the Azure portal. Click **All resources** on the left-hand panel. Locate and click the virtual machine you created in Task 1.
6668
2. Click the **Connect** button on the Overview tab. A Remote Desktop Protocol (.rdp) file is created and downloaded.
6769

6870
![Connect to Windows virtual machine](./media/active-directory-domain-services-admin-guide/connect-windows-vm.png)
69-
3. To connect to your VM, open the downloaded RDP file. If prompted, click **Connect**. At the login prompt, use the credentials of a user belonging to the 'AAD DC Administrators' group. For example, we use '[email protected]' in our case. You may receive a certificate warning during the sign-in process. Click Yes or Continue to proceed with the connection.
71+
3. To connect to your VM, open the downloaded RDP file. If prompted, click **Connect**. Use the credentials of a user belonging to the 'AAD DC Administrators' group. For example, '[email protected]'. You may receive a certificate warning during the sign-in process. Click Yes or Continue to proceed with the connection.
7072
4. From the Start screen, open **Server Manager**. Click **Add Roles and Features** in the central pane of the Server Manager window.
7173

7274
![Launch Server Manager on virtual machine](./media/active-directory-domain-services-admin-guide/install-rsat-server-manager.png)
@@ -79,7 +81,7 @@ Perform the following steps to install the Active Directory Administration tools
7981
7. On the **Server Selection** page, select the current virtual machine from the server pool, and click **Next**.
8082

8183
![Server Selection page](./media/active-directory-domain-services-admin-guide/install-rsat-server-manager-add-roles-server.png)
82-
8. On the **Server Roles** page, click **Next**. We skip this page since we are not installing any roles on the server.
84+
8. On the **Server Roles** page, click **Next**.
8385
9. On the **Features** page, click to expand the **Remote Server Administration Tools** node and then click to expand the **Role Administration Tools** node. Select **AD DS and AD LDS Tools** feature from the list of role administration tools.
8486

8587
![Features page](./media/active-directory-domain-services-admin-guide/install-rsat-server-manager-add-roles-ad-tools.png)
@@ -88,7 +90,7 @@ Perform the following steps to install the Active Directory Administration tools
8890
![Confirmation page](./media/active-directory-domain-services-admin-guide/install-rsat-server-manager-add-roles-confirmation.png)
8991

9092
## Task 3 - Connect to and explore the managed domain
91-
Now that the AD Administrative Tools are installed on the domain joined virtual machine, we can use these tools to explore and administer the managed domain.
93+
Now, you can use Windows Server AD administrative tools to explore and administer the managed domain.
9294

9395
> [!NOTE]
9496
> You need to be a member of the 'AAD DC Administrators' group, to administer the managed domain.

articles/active-directory-domain-services/active-directory-ds-admin-guide-administer-group-policy.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,13 +14,15 @@ ms.workload: identity
1414
ms.tgt_pltfrm: na
1515
ms.devlang: na
1616
ms.topic: article
17-
ms.date: 09/26/2017
17+
ms.date: 06/22/2018
1818
ms.author: maheshu
1919

2020
---
2121
# Administer Group Policy on an Azure AD Domain Services managed domain
2222
Azure Active Directory Domain Services includes built-in Group Policy Objects (GPOs) for the 'AADDC Users' and 'AADDC Computers' containers. You can customize these built-in GPOs to configure Group Policy on the managed domain. Additionally, members of the 'AAD DC Administrators' group can create their own custom OUs in the managed domain. They can also create custom GPOs and link them to these custom OUs. Users who belong to the 'AAD DC Administrators' group are granted Group Policy administration privileges on the managed domain.
2323

24+
[!INCLUDE [active-directory-ds-prerequisites.md](../../includes/active-directory-ds-prerequisites.md)]
25+
2426
## Before you begin
2527
To perform the tasks listed in this article, you need:
2628

articles/active-directory-domain-services/active-directory-ds-admin-guide-configure-secure-ldap.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,13 +14,15 @@ ms.workload: identity
1414
ms.tgt_pltfrm: na
1515
ms.devlang: na
1616
ms.topic: article
17-
ms.date: 12/08/2017
17+
ms.date: 06/22/2018
1818
ms.author: maheshu
1919

2020
---
2121
# Configure secure LDAP (LDAPS) for an Azure AD Domain Services managed domain
2222
This article shows how you can enable Secure Lightweight Directory Access Protocol (LDAPS) for your Azure AD Domain Services managed domain. Secure LDAP is also known as 'Lightweight Directory Access Protocol (LDAP) over Secure Sockets Layer (SSL) / Transport Layer Security (TLS)'.
2323

24+
[!INCLUDE [active-directory-ds-prerequisites.md](../../includes/active-directory-ds-prerequisites.md)]
25+
2426
## Before you begin
2527
To perform the tasks listed in this article, you need:
2628

0 commit comments

Comments
 (0)