Skip to content

Commit 2d5e28a

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into patch-2
2 parents 2ad71cf + 17ac51b commit 2d5e28a

File tree

107 files changed

+228
-1579
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

107 files changed

+228
-1579
lines changed

.openpublishing.redirection.json

Lines changed: 105 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -22784,6 +22784,111 @@
2278422784
"redirect_url": "/azure/sentinel/data-connectors-reference",
2278522785
"redirect_document_id": false
2278622786
},
22787+
{
22788+
"source_path_from_root": "/articles/networking/scripts/virtual-network-powershell-sample-peer-two-virtual-networks.md",
22789+
"redirect_url": "/azure/virtual-network/tutorial-connect-virtual-networks-powershell",
22790+
"redirect_document_id": false
22791+
},
22792+
{
22793+
"source_path_from_root": "/articles/networking/scripts/virtual-network-powershell-filter-network-traffic.md",
22794+
"redirect_url": "/azure/virtual-network/tutorial-filter-network-traffic",
22795+
"redirect_document_id": false
22796+
},
22797+
{
22798+
"source_path_from_root": "/articles/networking/powershell-samples.md",
22799+
"redirect_url": "/azure/networking/fundamentals/networking-overview",
22800+
"redirect_document_id": false
22801+
},
22802+
{
22803+
"source_path_from_root": "/articles/networking/scripts/virtual-network-filter-network-traffic.md",
22804+
"redirect_url": "/azure/virtual-network/tutorial-filter-network-traffic",
22805+
"redirect_document_id": false
22806+
},
22807+
{
22808+
"source_path_from_root": "/articles/virtual-network/scripts/virtual-network-powershell-sample-filter-network-traffic.md",
22809+
"redirect_url": "/azure/virtual-network/tutorial-filter-network-traffic",
22810+
"redirect_document_id": false
22811+
},
22812+
{
22813+
"source_path_from_root": "/articles/networking/scripts/virtual-network-powershell-sample-route-traffic-through-nva.md",
22814+
"redirect_url": "/azure/virtual-network/tutorial-create-route-table-portal",
22815+
"redirect_document_id": false
22816+
},
22817+
{
22818+
"source_path_from_root": "/articles/virtual-network/scripts/virtual-network-powershell-sample-route-traffic-through-nva.md",
22819+
"redirect_url": "/azure/virtual-network/tutorial-create-route-table-portal",
22820+
"redirect_document_id": false
22821+
},
22822+
{
22823+
"source_path_from_root": "/articles/networking/cli-samples.md",
22824+
"redirect_url": "/azure/networking/fundamentals/networking-overview",
22825+
"redirect_document_id": false
22826+
},
22827+
{
22828+
"source_path_from_root": "/articles/virtual-network/powershell-samples.md",
22829+
"redirect_url": "/azure/networking/fundamentals/networking-overview",
22830+
"redirect_document_id": false
22831+
},
22832+
{
22833+
"source_path_from_root": "/articles/virtual-network/cli-samples.md",
22834+
"redirect_url": "/azure/networking/fundamentals/networking-overview",
22835+
"redirect_document_id": false
22836+
},
22837+
{
22838+
"source_path_from_root": "/articles/networking/scripts/virtual-network-cli-sample-peer-two-virtual-networks.md",
22839+
"redirect_url": "/azure/virtual-network/tutorial-connect-virtual-networks-cli",
22840+
"redirect_document_id": false
22841+
},
22842+
{
22843+
"source_path_from_root": "/articles/virtual-network/scripts/virtual-network-powershell-sample-ipv6-dual-stack-standard-load-balancer.md",
22844+
"redirect_url": "/azure/load-balancer/virtual-network-ipv4-ipv6-dual-stack-standard-load-balancer-powershell",
22845+
"redirect_document_id": false
22846+
},
22847+
{
22848+
"source_path_from_root": "/articles/virtual-network/scripts/virtual-network-cli-sample-ipv6-dual-stack-standard-load-balancer.md",
22849+
"redirect_url": "/azure/load-balancer/virtual-network-ipv4-ipv6-dual-stack-standard-load-balancer-cli",
22850+
"redirect_document_id": false
22851+
},
22852+
{
22853+
"source_path_from_root": "/articles/networking/scripts/virtual-network-cli-sample-route-traffic-through-nva.md",
22854+
"redirect_url": "/azure/virtual-network/tutorial-create-route-table-portal",
22855+
"redirect_document_id": false
22856+
},
22857+
{
22858+
"source_path_from_root": "/articles/virtual-network/scripts/virtual-network-cli-sample-ipv6-dual-stack.md",
22859+
"redirect_url": "/azure/load-balancer/virtual-network-ipv4-ipv6-dual-stack-standard-load-balancer-cli",
22860+
"redirect_document_id": false
22861+
},
22862+
{
22863+
"source_path_from_root": "/articles/networking/scripts/virtual-network-cli-sample-multi-tier-application.md",
22864+
"redirect_url": "/architecture/example-scenario/infrastructure/multi-tier-app-disaster-recovery",
22865+
"redirect_document_id": false
22866+
},
22867+
{
22868+
"source_path_from_root": "/articles/networking/scripts/virtual-network-powershell-sample-multi-tier-application.md",
22869+
"redirect_url": "/architecture/example-scenario/infrastructure/multi-tier-app-disaster-recovery",
22870+
"redirect_document_id": false
22871+
},
22872+
{
22873+
"source_path_from_root": "/articles/virtual-network/scripts/virtual-network-powershell-sample-ipv6-dual-stack.md",
22874+
"redirect_url": "/azure/load-balancer/virtual-network-ipv4-ipv6-dual-stack-standard-load-balancer-powershell",
22875+
"redirect_document_id": false
22876+
},
22877+
{
22878+
"source_path_from_root": "/articles/virtual-network/scripts/virtual-network-cli-sample-filter-network-traffic.md",
22879+
"redirect_url": "/azure/virtual-network/tutorial-filter-network-traffic",
22880+
"redirect_document_id": false
22881+
},
22882+
{
22883+
"source_path_from_root": "/articles/virtual-network/scripts/virtual-network-cli-sample-route-traffic-through-nva.md",
22884+
"redirect_url": "/azure/virtual-network/tutorial-create-route-table-portal",
22885+
"redirect_document_id": false
22886+
},
22887+
{
22888+
"source_path_from_root": "/articles/virtual-network/scripts/virtual-network-cli-sample-multi-tier-application.md",
22889+
"redirect_url": "/architecture/example-scenario/infrastructure/multi-tier-app-disaster-recovery",
22890+
"redirect_document_id": false
22891+
},
2278722892
{
2278822893
"source_path_from_root": "/articles/active-directory/authentication/how-to-migrate-mfa-server-to-azure-mfa-with-federation.md",
2278922894
"redirect_url": "/azure/active-directory/authentication/how-to-migrate-mfa-server-to-mfa-with-federation",

articles/active-directory/authentication/howto-mfa-mfasettings.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: multi-factor-authentication
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: how-to
9-
ms.date: 05/17/2023
9+
ms.date: 05/30/2023
1010

1111
ms.author: justinha
1212
author: justinha
@@ -78,14 +78,14 @@ To unblock a user, complete the following steps:
7878

7979
## Report suspicious activity
8080

81-
A preview of **Report Suspicious Activity**, the updated MFA **Fraud Alert** feature, is now available. When an unknown and suspicious MFA prompt is received, users can report the fraud attempt by using Microsoft Authenticator or through their phone. These alerts are integrated with [Identity Protection](../identity-protection/overview-identity-protection.md) for more comprehensive coverage and capability.
81+
**Report suspicious activity**, the updated **MFA Fraud Alert** feature, is now available. When an unknown and suspicious MFA prompt is received, users can report the fraud attempt by using Microsoft Authenticator or through their phone. These alerts are integrated with [Identity Protection](../identity-protection/overview-identity-protection.md) for more comprehensive coverage and capability.
8282

8383
Users who report an MFA prompt as suspicious are set to **High User Risk**. Administrators can use risk-based policies to limit access for these users, or enable self-service password reset (SSPR) for users to remediate problems on their own. If you previously used the **Fraud Alert** automatic blocking feature and don't have an Azure AD P2 license for risk-based policies, you can use risk detection events to identify and disable impacted users and automatically prevent their sign-in. For more information about using risk-based policies, see [Risk-based access policies](../identity-protection/concept-identity-protection-policies.md).
8484

85-
To enable **Report Suspicious Activity** from the Authentication Methods Settings:
85+
To enable **Report suspicious activity** from the Authentication Methods Settings:
8686

8787
1. In the Azure portal, click **Azure Active Directory** > **Security** > **Authentication Methods** > **Settings**.
88-
1. Set **Report Suspicious Activity** to **Enabled**.
88+
1. Set **Report suspicious activity** to **Enabled**.
8989
1. Select **All users** or a specific group.
9090

9191
### View suspicious activity events
@@ -104,9 +104,9 @@ Once a user has reported a prompt as suspicious, the risk should be investigated
104104

105105
### Report suspicious activity and fraud alert
106106

107-
**Report Suspicious Activity** and the legacy **Fraud Alert** implementation can operate in parallel. You can keep your tenant-wide **Fraud Alert** functionality in place while you start to use **Report Suspicious Activity** with a targeted test group.
107+
**Report suspicious activity** and the legacy **Fraud Alert** implementation can operate in parallel. You can keep your tenant-wide **Fraud Alert** functionality in place while you start to use **Report suspicious activity** with a targeted test group.
108108

109-
If **Fraud Alert** is enabled with Automatic Blocking, and **Report Suspicious Activity** is enabled, the user will be added to the blocklist and set as high-risk and in-scope for any other policies configured. These users will need to be removed from the blocklist and have their risk remediated to enable them to sign in with MFA.
109+
If **Fraud Alert** is enabled with Automatic Blocking, and **Report suspicious activity** is enabled, the user will be added to the blocklist and set as high-risk and in-scope for any other policies configured. These users will need to be removed from the blocklist and have their risk remediated to enable them to sign in with MFA.
110110

111111
## Notifications
112112

articles/firewall/firewall-multi-hub-spoke.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: firewall
55
author: vhorne
66
ms.service: firewall
77
ms.topic: conceptual
8-
ms.date: 05/22/2023
8+
ms.date: 05/30/2023
99
ms.author: maroja
1010
---
1111

@@ -49,4 +49,4 @@ Here's an example route table for the spoke subnets connected to Hub-01:
4949

5050
## Next steps
5151

52-
- Learn how to [deploy and configure an Azure Firewall](tutorial-firewall-deploy-portal.md).
52+
- Learn how to [deploy and configure an Azure Firewall](tutorial-firewall-deploy-portal.md).

articles/networking/TOC.yml

Lines changed: 0 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -122,12 +122,6 @@
122122
items:
123123
- name: Create a Zero Trust network for web applications
124124
href: create-zero-trust-network-web-apps.md
125-
- name: Sample scripts
126-
items:
127-
- name: Azure CLI
128-
href: cli-samples.md
129-
- name: Azure PowerShell
130-
href: powershell-samples.md
131125
- name: Tutorials
132126
items:
133127
- name: Load balance VMs

articles/networking/cli-samples.md

Lines changed: 0 additions & 26 deletions
This file was deleted.

articles/networking/powershell-samples.md

Lines changed: 0 additions & 25 deletions
This file was deleted.

articles/networking/scripts/virtual-network-cli-sample-multi-tier-application.md

Lines changed: 0 additions & 53 deletions
This file was deleted.

0 commit comments

Comments
 (0)