Skip to content

Commit 34b58a4

Browse files
fixed warnings
1 parent b20a176 commit 34b58a4

File tree

4 files changed

+8
-8
lines changed

4 files changed

+8
-8
lines changed

articles/azure-monitor/scom-manage-instance/configure-network-firewall.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -100,8 +100,8 @@ To function properly, SCOM Managed Instance must have access to the following po
100100
|*.azuremonitor-scommiconnect.azure.com|443|Outbound| |Bridge Service|
101101

102102
> [!IMPORTANT]
103-
> To minimize the need for extensive communication with both your Active Directory admin and the network admin, see [Self-verification](self-verification-of-steps.md). The article outlines the procedures that the Active Directory admin and the network admin use to validate their configuration changes and ensure their successful implementation. This process reduces unnecessary back-and-forth interactions from the Operations Manager admin to the Active Directory admin and the network admin. This configuration saves time for the admins.
103+
> To minimize the need for extensive communication with both your Active Directory admin and the network admin, see [Self-verification](self-verification-steps.md). The article outlines the procedures that the Active Directory admin and the network admin use to validate their configuration changes and ensure their successful implementation. This process reduces unnecessary back-and-forth interactions from the Operations Manager admin to the Active Directory admin and the network admin. This configuration saves time for the admins.
104104
105105
## Next steps
106106

107-
- [Verify Azure and internal GPO policies](verify-azure-and-internal-gpo-policies.md)
107+
- [Verify Azure and internal GPO policies](verify-azure-internal-group-policy-object-policies.md)

articles/azure-monitor/scom-manage-instance/create-group-managed-service-account.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -73,8 +73,8 @@ Add-KdsRootKey -EffectiveTime ((get-date).addhours(-10))
7373
Ensure that the created gMSA account is a local admin account. If there are any Group Policy Object policies on the local admins at the Active Directory level, ensure that they have the gMSA account as the local admin.
7474

7575
> [!IMPORTANT]
76-
> To minimize the need for extensive communication with both your Active Directory admin and the network admin, see [Self-verification](self-verification-of-steps.md). The article outlines the procedures that the Active Directory admin and network admin use to validate their configuration changes and ensure their successful implementation. This process reduces unnecessary back-and-forth interactions from the Operations Manager admin to the Active Directory admin and the network admin. This configuration saves time for the admins.
76+
> To minimize the need for extensive communication with both your Active Directory admin and the network admin, see [Self-verification](self-verification-steps.md). The article outlines the procedures that the Active Directory admin and network admin use to validate their configuration changes and ensure their successful implementation. This process reduces unnecessary back-and-forth interactions from the Operations Manager admin to the Active Directory admin and the network admin. This configuration saves time for the admins.
7777
7878
## Next steps
7979

80-
[Store domain credentials in Azure Key Vault](store-domain-credentials-in-key-vault.md)
80+
[Store domain credentials in Azure Key Vault](store-domain-credentials-key-vault.md)

articles/azure-monitor/scom-manage-instance/create-static-ip.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.topic: how-to
1313

1414
# Create a static IP for Azure Monitor SCOM Managed Instance
1515

16-
This article describes how to create a static IP for a load balancer in a dedicated subnet of Azure Monitor SCOM Managed Instance. Additionally, insert an entry into the Domain Name System (DNS) server, and ensure that the DNS name resolves to the DNS name (`DNSHostName`) of the group managed service account (gMSA). Get the DNS host name of the gMSA account from [step 6](create-gmsa-account.md).
16+
This article describes how to create a static IP for a load balancer in a dedicated subnet of Azure Monitor SCOM Managed Instance. Additionally, insert an entry into the Domain Name System (DNS) server, and ensure that the DNS name resolves to the DNS name (`DNSHostName`) of the group managed service account (gMSA). Get the DNS host name of the gMSA account from [step 6](create-group-managed-service-account.md).
1717

1818
>[!NOTE]
1919
> To learn about the SCOM Managed Instance architecture, see [Azure Monitor SCOM Managed Instance](overview.md).
@@ -38,7 +38,7 @@ Create the forward lookup entry in DNS by creating an association between the IP
3838
:::image type="DNS manager" source="media/create-static-ip/dns-manager.png" alt-text="Screenshot that shows host information in DNS Manager.":::
3939

4040
> [!IMPORTANT]
41-
> To minimize the need for extensive communication with both your Active Directory admin and the network admin, see [Self-verification](self-verification-of-steps.md). The article outlines the procedures that the Active Directory admin and the network admin use to validate their configuration changes and ensure their successful implementation. This process reduces unnecessary back-and-forth interactions from the Operations Manager admin to the Active Directory admin and the network admin. This configuration saves time for the admins.
41+
> To minimize the need for extensive communication with both your Active Directory admin and the network admin, see [Self-verification](self-verification-steps.md). The article outlines the procedures that the Active Directory admin and the network admin use to validate their configuration changes and ensure their successful implementation. This process reduces unnecessary back-and-forth interactions from the Operations Manager admin to the Active Directory admin and the network admin. This configuration saves time for the admins.
4242
4343
## Next steps
4444

articles/azure-monitor/scom-manage-instance/verify-azure-internal-group-policy-object-policies.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -41,8 +41,8 @@ The following policies could potentially influence the local administrator group
4141
- Assess whether any policies are obstructing remote logins to the local administrator group.
4242

4343
> [!IMPORTANT]
44-
> To minimize the need for extensive communication with both your Active Directory admin and network admin, see [Self-verification](self-verification-of-steps.md). The article outlines the procedures that the Active Directory admin and network admin use to validate their configuration changes and ensure their successful implementation. This process reduces unnecessary back-and-forth interactions from the Operations Manager admin to the Active Directory admin and the network admin. This configuration saves time for the admins.
44+
> To minimize the need for extensive communication with both your Active Directory admin and network admin, see [Self-verification](self-verification-steps.md). The article outlines the procedures that the Active Directory admin and network admin use to validate their configuration changes and ensure their successful implementation. This process reduces unnecessary back-and-forth interactions from the Operations Manager admin to the Active Directory admin and the network admin. This configuration saves time for the admins.
4545
4646
## Next step
4747

48-
- [SCOM Managed Instance self-verification of steps](self-verification-of-steps.md)
48+
- [SCOM Managed Instance self-verification of steps](self-verification-steps.md)

0 commit comments

Comments
 (0)