Skip to content

Commit 24aae56

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into asc-melvyn-daily
2 parents f4eb013 + 4bb3c6d commit 24aae56

22 files changed

+172
-86
lines changed

articles/active-directory/fundamentals/active-directory-deployment-plans.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -57,9 +57,10 @@ Widening the rollout to larger groups of users should be carried out by increasi
5757

5858
| Capability | Description|
5959
| -| -|
60-
| [Multi-Factor Authentication](https://docs.microsoft.com/en-us/azure/active-directory/authentication/howto-mfa-getstarted)| Azure Multi-Factor Authentication (MFA) is Microsoft's two-step verification solution. Using admin-approved authentication methods, Azure MFA helps safeguard access to your data and applications while meeting the demand for a simple sign-in process. |
60+
| [Multi-Factor Authentication](https://aka.ms/deploymentplans/mfa)| Azure Multi-Factor Authentication (MFA) is Microsoft's two-step verification solution. Using admin-approved authentication methods, Azure MFA helps safeguard access to your data and applications while meeting the demand for a simple sign-in process. |
6161
| [Conditional Access](https://aka.ms/deploymentplans/ca)| With Conditional Access, you can implement automated access control decisions for who can access your cloud apps, based on conditions. |
6262
| [Self-service password reset](https://aka.ms/deploymentplans/sspr)| Self-service password reset helps your users reset their passwords without administrator intervention, when and where they need to. |
63+
| [Passwordless](https://aka.ms/deploymentplans/passwordless) | Implement passwordless authentication using the the Microsoft Authenticator app or FIDO2 Security keys in your organization |
6364

6465
## Deploy application management
6566

@@ -82,7 +83,7 @@ Widening the rollout to larger groups of users should be carried out by increasi
8283

8384
| Capability | Description|
8485
| -| -|
85-
| [User provisioning](https://aka.ms/UserProvisioningDPDownload)| Azure AD helps you automate the creation, maintenance, and removal of user identities in cloud (SaaS) applications, such as Dropbox, Salesforce, ServiceNow, and more. |
86+
| [User provisioning](https://aka.ms/deploymentplans/userprovisioning)| Azure AD helps you automate the creation, maintenance, and removal of user identities in cloud (SaaS) applications, such as Dropbox, Salesforce, ServiceNow, and more. |
8687
| [Workday-driven Inbound User Provisioning](https://aka.ms/WorkdayDeploymentPlan)| Workday-driven Inbound User Provisioning to Active Directory creates a foundation for ongoing identity governance and enhances the quality of business processes that rely on authoritative identity data. Using this feature, you can seamlessly manage the identity lifecycle of employees and contingent workers by configuring rules that map Joiner-Mover-Leaver processes (such as New Hire, Terminate, Transfer) to IT provisioning actions (such as Create, Enable, Disable) |
8788

8889
## Deploy governance and reporting

articles/active-directory/hybrid/reference-connect-faq.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -51,7 +51,7 @@ Yes. After you install the agent, you can complete the registration process by u
5151

5252
`Register-AzureADConnectHealthADDSAgent -Credentials $cred`
5353

54-
**Q: Does Azure AD Connect support syncing from two domains to on Azure AD?**
54+
**Q: Does Azure AD Connect support syncing from two domains to an Azure AD?**
5555
Yes, this scenario is supported. Refer to [Multiple Domains](how-to-connect-install-multiple-domains.md).
5656

5757
**Q: Can you have multiple connectors for the same Active Directory domain in Azure AD Connect?**

articles/cognitive-services/LUIS/luis-boundaries.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: nitinme
88
ms.service: cognitive-services
99
ms.subservice: language-understanding
1010
ms.topic: conceptual
11-
ms.date: 10/24/2019
11+
ms.date: 11/04/2019
1212
ms.author: diberry
1313
ms.custom: seodec18
1414
---
@@ -30,10 +30,11 @@ If your app exceeds the LUIS model limits and boundaries, consider using a [LUIS
3030
| [Intents][intents]|500 per application: 499 custom intents, and the required _None_ intent.<br>[Dispatch-based](https://aka.ms/dispatch-tool) application has corresponding 500 dispatch sources.|
3131
| [List entities](./luis-concept-entity-types.md) | Parent: 50, child: 20,000 items. Canonical name is *default character max. Synonym values have no length restriction. |
3232
| [Machine-learned entities + roles](./luis-concept-entity-types.md):<br> composite,<br>simple,<br>entity role|A limit of either 100 parent entities or 330 entities, whichever limit the user hits first. A role counts as an entity for the purpose of this boundary. An example is a composite with a simple entity, which has 2 roles is: 1 composite + 1 simple + 2 roles = 4 of the 330 entities.|
33+
|Model as a feature| Maximum number of models that can be used as a descriptor (feature) to a specific model to be 10 models. The maximum number of phrase lists used as a descriptor (feature) for a specific model to be 10 phrase lists.|
3334
| [Preview - Dynamic list entities](https://aka.ms/luis-api-v3-doc#dynamic-lists-passed-in-at-prediction-time)|2 lists of ~1k per query prediction endpoint request|
3435
| [Patterns](luis-concept-patterns.md)|500 patterns per application.<br>Maximum length of pattern is 400 characters.<br>3 Pattern.any entities per pattern<br>Maximum of 2 nested optional texts in pattern|
3536
| [Pattern.any](./luis-concept-entity-types.md)|100 per application, 3 pattern.any entities per pattern |
36-
| [Phrase list][phrase-list]|10 phrase lists, 5,000 items per list|
37+
| [Phrase list][phrase-list]|500 phrase lists. Non-interchangeable phraselist has max of 5,000 phrases. Interchangeable Phraselist has max of 50,000 phrases. Maximum number of total phrases per application of 500,000 phrases.|
3738
| [Prebuilt entities](./luis-prebuilt-entities.md) | no limit|
3839
| [Regular expression entities](./luis-concept-entity-types.md)|20 entities<br>500 character max. per regular expression entity pattern|
3940
| [Roles](luis-concept-roles.md)|300 roles per application. 10 roles per entity|

articles/cognitive-services/LUIS/luis-concept-feature.md

Lines changed: 9 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.custom: seodec18
99
ms.service: cognitive-services
1010
ms.subservice: language-understanding
1111
ms.topic: conceptual
12-
ms.date: 10/25/2019
12+
ms.date: 11/03/2019
1313
ms.author: diberry
1414
---
1515
# Machine-learned features
@@ -37,6 +37,14 @@ When you want to be able to recognize new instances, like a meeting scheduler th
3737

3838
Phrase lists are like domain-specific vocabulary that help with enhancing the quality of understanding of both intents and entities.
3939

40+
## Considerations when using a phrase list
41+
42+
A phrase list is applied, by default, to all models in the app. This will work for phrase lists that can cross all intents and entities. For decomposability, you should apply a phrase list to only the models it is relevant to.
43+
44+
If you create a phrase list (created globally by default), then later apply it as a descriptor (feature) to a specific model, it is removed from the other models. This removal adds relevance to the phrase list for the model it is applied to, helping improve the accuracy it provides in the model.
45+
46+
The `enabledForAllModels` flag controls this model scope in the API.
47+
4048
<a name="how-to-use-phrase-lists"></a>
4149

4250
### How to use a phrase list

articles/cognitive-services/LUIS/luis-how-to-add-features.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.custom: seodec18
99
ms.service: cognitive-services
1010
ms.subservice: language-understanding
1111
ms.topic: conceptual
12-
ms.date: 10/25/2019
12+
ms.date: 11/03/2019
1313
ms.author: diberry
1414
---
1515

@@ -21,6 +21,8 @@ A [phrase list](luis-concept-feature.md) includes a group of values (words or ph
2121

2222
A phrase list adds to the vocabulary of the app domain as a second signal to LUIS about those words.
2323

24+
Review [feature concepts](luis-concept-feature.md) to understand when and why to use a phrase list.
25+
2426
[!INCLUDE [Waiting for LUIS portal refresh](./includes/wait-v3-upgrade.md)]
2527

2628
## Add phrase list

articles/cognitive-services/LUIS/whats-new.md

Lines changed: 3 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ services: cognitive-services
99
ms.service: cognitive-services
1010
ms.subservice: language-understanding
1111
ms.topic: conceptual
12-
ms.date: 10/23/2019
12+
ms.date: 11/04/2019
1313
ms.author: diberry
1414
---
1515

@@ -30,17 +30,14 @@ Learn what's new in the service. These items include release notes, videos, blog
3030
* [Prebuilt domains](luis-reference-prebuilt-domains.md) is now generally available (GA)
3131
* Japanese [prebuilt entities](luis-reference-prebuilt-entities.md#japanese-entity-support) - age, currency, number, percentage are not support in V3.
3232
* Italian [prebuilt entities](luis-reference-prebuilt-entities.md#italian-entity-support) - age, currency, dimension, number, percentage resolution changed from V2.
33-
* Enhance user experience in [LUIS portal](https://www.luis.ai) - revamped labeling experience to enable building and debugging complex models.
33+
* Enhance user experience in [preview.luis.ai portal](https://preview.luis.ai) - revamped labeling experience to enable building and debugging complex models.
3434
* Advance language understanding capabilities - [building sophisticated language models](luis-concept-entity-types.md) with less effort.
3535
* Defining machine learning features at the model level and enabling models to be used as signals to other model, like using entities as features to intents and to other entities.
36+
* New, expanded [limits](luis-boundaries.md) - higher max for phrase lists and total phrases, new model as a feature limits
3637
* Extract information from text in the format of deep hierarchy structure, making conversation applications more powerful.
3738

3839
![machine-learned entity image](./media/whats-new/deep-entity-extraction-example.png)
3940

40-
41-
42-
43-
4441
### September 3, 2019
4542

4643
* Azure authoring resource - [migrate now](luis-migration-authoring.md).

articles/event-hubs/event-hubs-ip-filtering.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -48,7 +48,6 @@ IP filter rules are applied in order, and the first rule that matches the IP add
4848
> - Integration with Azure Event Grid
4949
> - Azure IoT Hub Routes
5050
> - Azure IoT Device Explorer
51-
> - Azure Data Explorer
5251
>
5352
> The below Microsoft services are required to be on a virtual network
5453
> - Azure Web Apps

articles/event-hubs/event-hubs-service-endpoints.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,6 @@ The result is a private and isolated relationship between the workloads bound to
3535
> - Integration with Azure Event Grid
3636
> - Azure IoT Hub Routes
3737
> - Azure IoT Device Explorer
38-
> - Azure Data Explorer
3938
>
4039
> The below Microsoft services are required to be on a virtual network
4140
> - Azure Web Apps

articles/governance/policy/concepts/definition-structure.md

Lines changed: 21 additions & 50 deletions
Original file line numberDiff line numberDiff line change
@@ -170,8 +170,7 @@ would be used by each assignment of the policy definition to limit the accepted
170170

171171
### Using a parameter value
172172

173-
In the policy rule, you reference parameters with the following `parameters` deployment value
174-
function syntax:
173+
In the policy rule, you reference parameters with the following `parameters` function syntax:
175174

176175
```json
177176
{
@@ -330,7 +329,7 @@ The following fields are supported:
330329
- This bracket syntax supports tag names that have apostrophes in it by escaping with double
331330
apostrophes.
332331
- Where **'\<tagName\>'** is the name of the tag to validate the condition for.
333-
- Example: `tags['''My.Apostrophe.Tag''']` where **'\<tagName\>'** is the name of the tag.
332+
- Example: `tags['''My.Apostrophe.Tag''']` where **'My.Apostrophe.Tag'** is the name of the tag.
334333
- property aliases - for a list, see [Aliases](#aliases).
335334

336335
> [!NOTE]
@@ -343,7 +342,7 @@ A parameter value can be passed to a tag field. Passing a parameter to a tag fie
343342
flexibility of the policy definition during policy assignment.
344343

345344
In the following example, `concat` is used to create a tags field lookup for the tag named the
346-
value of the **tagName** parameter. If that tag doesn't exist, the **append** effect is used to add
345+
value of the **tagName** parameter. If that tag doesn't exist, the **modify** effect is used to add
347346
the tag using the value of the same named tag set on the audited resources parent resource group by
348347
using the `resourcegroup()` lookup function.
349348

@@ -354,11 +353,17 @@ using the `resourcegroup()` lookup function.
354353
"exists": "false"
355354
},
356355
"then": {
357-
"effect": "append",
358-
"details": [{
359-
"field": "[concat('tags[', parameters('tagName'), ']')]",
360-
"value": "[resourcegroup().tags[parameters('tagName')]]"
361-
}]
356+
"effect": "modify",
357+
"details": {
358+
"operations": [{
359+
"operation": "add",
360+
"field": "[concat('tags[', parameters('tagName'), ']')]",
361+
"value": "[resourcegroup().tags[parameters('tagName')]]"
362+
}],
363+
"roleDefinitionIds": [
364+
"/providers/microsoft.authorization/roleDefinitions/b24988ac-6180-42a0-ab88-20f7382dd24c"
365+
]
366+
}
362367
}
363368
}
364369
```
@@ -471,51 +476,17 @@ Azure Policy supports the following types of effect:
471476

472477
- **Append**: adds the defined set of fields to the request
473478
- **Audit**: generates a warning event in activity log but doesn't fail the request
474-
- **AuditIfNotExists**: enables auditing if a resource doesn't exist
479+
- **AuditIfNotExists**: generates a warning event in activity log if a related resource doesn't
480+
exist
475481
- **Deny**: generates an event in the activity log and fails the request
476-
- **DeployIfNotExists**: deploys a resource if it doesn't already exist
482+
- **DeployIfNotExists**: deploys a related resource if it doesn't already exist
477483
- **Disabled**: doesn't evaluate resources for compliance to the policy rule
478-
- **EnforceOPAConstraint**: configures the Open Policy Agent admissions controller with Gatekeeper
479-
v3 for self-managed Kubernetes clusters on Azure (preview)
480-
- **EnforceRegoPolicy**: configures the Open Policy Agent admissions controller with Gatekeeper v2
481-
in Azure Kubernetes Service (preview)
484+
- **EnforceOPAConstraint** (preview): configures the Open Policy Agent admissions controller with
485+
Gatekeeper v3 for self-managed Kubernetes clusters on Azure (preview)
486+
- **EnforceRegoPolicy** (preview): configures the Open Policy Agent admissions controller with
487+
Gatekeeper v2 in Azure Kubernetes Service
482488
- **Modify**: adds, updates, or removes the defined tags from a resource
483489

484-
For **append**, you must provide the following details:
485-
486-
```json
487-
"effect": "append",
488-
"details": [{
489-
"field": "field name",
490-
"value": "value of the field"
491-
}]
492-
```
493-
494-
The value can be either a string or a JSON format object.
495-
496-
**AuditIfNotExists** and **DeployIfNotExists** evaluate the existence of a related resource and
497-
apply a rule. If the resource doesn't match the rule, the effect is implemented. For example, you
498-
can require that a network watcher is deployed for all virtual networks. For more information, see
499-
the [Audit if extension doesn't exist](../samples/audit-ext-not-exist.md) example.
500-
501-
The **DeployIfNotExists** effect requires the **roleDefinitionId** property in the **details**
502-
portion of the policy rule. For more information, see [Remediation - Configure policy
503-
definition](../how-to/remediate-resources.md#configure-policy-definition).
504-
505-
```json
506-
"details": {
507-
...
508-
"roleDefinitionIds": [
509-
"/subscription/{subscriptionId}/providers/Microsoft.Authorization/roleDefinitions/{roleGUID}",
510-
"/providers/Microsoft.Authorization/roleDefinitions/{builtinroleGUID}"
511-
]
512-
}
513-
```
514-
515-
Similarly, **Modify** requires **roleDefinitionId** property in the **details** portion of the
516-
policy rule for the [remediation task](../how-to/remediate-resources.md). **Modify** also requires
517-
an **operations** array to define what actions to take on the resources tags.
518-
519490
For complete details on each effect, order of evaluation, properties, and examples, see
520491
[Understanding Azure Policy Effects](effects.md).
521492

articles/governance/policy/concepts/guest-configuration.md

Lines changed: 41 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -168,6 +168,46 @@ inside Linux and Windows machines* contains 18 policies. There are six **DeployI
168168
**AuditIfNotExists** pairs for Windows and three pairs for Linux. The [policy definition](definition-structure.md#policy-rule)
169169
logic validates that only the target operating system is evaluated.
170170

171+
#### Auditing operating system settings following industry baselines
172+
173+
One of the initiatives available in Azure Policy provides the ability to audit operating system settings
174+
inside virtual machines following a "baseline" from Microsoft. The definition,
175+
*[Preview]: Audit Windows VMs that do not match Azure security baseline settings*
176+
includes a complete set of audit rules based on settings from Active Directory Group Policy.
177+
178+
Most of the settings are available as parameters. This functionality allows you to customize
179+
what will be audited to align the policy with your organizational requirements,
180+
or to map the policy to 3rd party information such as industry regulatory standards.
181+
182+
Some parameters support an integer value range. For example, the Maximum Password Age
183+
parameter can be set using a range operator to give flexibility to machine
184+
owners. You could audit that the effective Group Policy setting
185+
requiring user to change their passwords should be no more than 70 days,
186+
but shouldn't be less than 1 day. As described in the info-bubble for the parameter,
187+
to make this the effective audit value, set the value to "1,70".
188+
189+
If you assign the policy using an Azure Resource Manager dployment template,
190+
you can use a parameters file to manage these settings from source control.
191+
Using a tool such as Git to manage changes to Audit policies with comments
192+
at each check-in, will document evidence as to why an assignment
193+
should be in exception to the expected value.
194+
195+
#### Applying configurations using Guest Configuration
196+
197+
The latest feature of Azure Policy configures settings inside machines.
198+
The definition *Configure the time zone on Windows machines* will
199+
make changes to the machine by configuring the time zone.
200+
201+
When assigning definitions that begin with *Configure*, you must also assign
202+
the definition *Deploy prerequisites to enable Guest Configuration Policy on Windows VMs.*
203+
You can combine these definitions in an initiative if you choose.
204+
205+
#### Assigning policies to machines outside of Azure
206+
207+
The Audit policies available for Guest Configuration include the **Microsoft.HybridCompute/machines**
208+
resource type. Any machines onboarded to Azure Arc that are in the scope of the assignment
209+
will automatically be included.
210+
171211
### Multiple assignments
172212

173213
Guest Configuration policies currently only support assigning the same Guest Assignment once per
@@ -238,4 +278,4 @@ Samples for Policy Guest Configuration are available in the following locations:
238278
- Understand how to [programmatically create policies](../how-to/programmatically-create.md).
239279
- Learn how to [get compliance data](../how-to/getting-compliance-data.md).
240280
- Learn how to [remediate non-compliant resources](../how-to/remediate-resources.md).
241-
- Review what a management group is with [Organize your resources with Azure management groups](../../management-groups/overview.md).
281+
- Review what a management group is with [Organize your resources with Azure management groups](../../management-groups/overview.md).

0 commit comments

Comments
 (0)