You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/authentication/howto-mfa-mfasettings.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -233,7 +233,7 @@ The _Trusted IPs_ feature of Azure AD Multi-Factor Authentication bypasses multi
233
233
> [!NOTE]
234
234
> The trusted IPs can include private IP ranges only when you use MFA Server. For cloud-based Azure AD Multi-Factor Authentication, you can only use public IP address ranges.
235
235
>
236
-
> IPv6 ranges are only supported in the [Named location (preview)](../conditional-access/location-condition.md#preview-features) interface.
236
+
> IPv6 ranges are only supported in the [Named location (preview)](../conditional-access/location-condition.md) interface.
237
237
238
238
If your organization deploys the NPS extension to provide MFA to on-premises applications note the source IP address will always appear to be the NPS server the authentication attempt flows through.
Copy file name to clipboardExpand all lines: articles/active-directory/conditional-access/concept-continuous-access-evaluation.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -139,7 +139,7 @@ From this page, you can optionally limit the users and groups that will be subje
139
139
For CAE, we only have insights into named IP-based named locations. We have no insights into other location settings like [MFA trusted IPs](../authentication/howto-mfa-mfasettings.md#trusted-ips) or country-based locations. When user comes from an MFA trusted IP or trusted locations that include MFA Trusted IPs or country location, CAE will not be enforced after user move to a different location. In those cases, we will issue a 1-hour CAE token without instant IP enforcement check.
140
140
141
141
> [!IMPORTANT]
142
-
> When configuring locations for continuous access evaluation, use only the [IP based Conditional Access location condition](../conditional-access/location-condition.md#preview-features) and configure all IP addresses, **including both IPv4 and IPv6**, that can be seen by your identity provider and resources provider. Do not use country location conditions or the trusted ips feature that is available in Azure AD Multi-Factor Authentication's service settings page.
142
+
> When configuring locations for continuous access evaluation, use only the [IP based Conditional Access location condition](../conditional-access/location-condition.md) and configure all IP addresses, **including both IPv4 and IPv6**, that can be seen by your identity provider and resources provider. Do not use country location conditions or the trusted ips feature that is available in Azure AD Multi-Factor Authentication's service settings page.
Copy file name to clipboardExpand all lines: articles/active-directory/conditional-access/location-condition.md
+14-43Lines changed: 14 additions & 43 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -30,39 +30,37 @@ Organizations can use this network location for common tasks like:
30
30
31
31
The network location is determined by the public IP address a client provides to Azure Active Directory. Conditional Access policies by default apply to all IPv4 and IPv6 addresses.
32
32
33
-
> [!TIP]
34
-
> IPv6 ranges are only supported in the **[Named location (preview)](#preview-features)** interface.
35
-
36
33
## Named locations
37
34
38
-
Locations are designated in the Azure portal under **Azure Active Directory** > **Security** > **Conditional Access** > **Named locations**. These named network locations may include locations like an organization's headquarters network ranges, VPN network ranges, or ranges that you wish to block.
35
+
Locations are designated in the Azure portal under **Azure Active Directory** > **Security** > **Conditional Access** > **Named locations**. These named network locations may include locations like an organization's headquarters network ranges, VPN network ranges, or ranges that you wish to block. Named locations can be defined by IPv4/IPv6 address ranges or by countries/regions.
39
36
40
37

41
38
42
-
To configure a location, you will need to provide at least a **Name** and the IP range.
43
-
44
-
The number of named locations you can configure is constrained by the size of the related object in Azure AD. You can configure locations based on of the following limitations:
39
+
### IP address ranges
45
40
46
-
- One named location with up to 1200 IPv4 ranges.
47
-
- A maximum of 90 named locations with one IP range assigned to each of them.
41
+
To define a named location by IPv4/IPv6 address ranges, you will need to provide a **Name** and an IP range.
48
42
49
-
> [!TIP]
50
-
> IPv6 ranges are only supported in the **[Named location (preview)](#preview-features)** interface.
43
+
Named locations defined by IPv4/IPv6 address ranges are subject to the following limitations:
44
+
- Configure up to 195 named locations
45
+
- Configure up to 2000 IP ranges per named location
46
+
- Both IPv4 and IPv6 ranges are supported
47
+
- Private IP ranges connot be configured
48
+
- The number of IP addresses contained in a range is limited. Only CIDR masks greater than /8 are allowed when defining an IP range.
51
49
52
50
### Trusted locations
53
51
54
-
When creating a network location, an administrator has the option to mark a location as a trusted location.
52
+
Administrators can designate named locations defined by IP address ranges to be trusted named locations.
55
53
56
54

57
55
58
-
This option can factor in to Conditional Access policies where you may, for example, require registration for multi-factor authentication from a trusted network location. It also factors in to Azure AD Identity Protection's risk calculation, lowering a users' sign-in risk when coming from a location marked as trusted.
56
+
Sign-ins from trusted named locations improve the accuracy of Azure AD Identity Protection's risk calculation, lowering a users' sign-in risk when they authenticate from a location marked as trusted. Additionally, trusted named locations can be targeted in Conditional Access policies. For example, you may require restrict multi-factor authentication registration to trusted named locations only.
59
57
60
58
### Countries and regions
61
59
62
-
Some organizations may choose to define entire countries or regions IP boundaries as named locations for Conditional Access policies. They may use these locations when blocking unnecessary traffic when they know valid users will never come from a location such as North Korea. These mappings of IP address to country are updated periodically.
60
+
Some organizations may choose to restrict access to certain countries or regions using Conditional Access. In addition to defining named locations by IP ranges, admins can define named locations by country or regions. When a user signs in, Azure AD resolves the user's IPv4 address to a country or region, and the mapping is updated periodically. Organizations can use named locations defined by countries to block traffic from countries where they do not do business, such as North Korea.
63
61
64
62
> [!NOTE]
65
-
> IPv6 address ranges cannot be mapped to countries. Only IPv4 addresses map to countries.
63
+
> Sign-ins from IPv6 addresses cannot be mapped to countries or regions, and are considered unknown areas. Only IPv4 addresses can be mapped to countries or regions.
66
64
67
65

68
66
@@ -89,33 +87,6 @@ For mobile and desktop applications, which have long lived session lifetimes, Co
89
87
90
88
If both steps fail, a user is considered to be no longer on a trusted IP.
91
89
92
-
## Preview features
93
-
94
-
In addition to the generally available named location feature, there is also a named location (preview). You can access the named location preview by using the banner at the top of the current named location blade.
95
-
96
-

97
-
98
-
With the named location preview, you are able to
99
-
100
-
- Configure up to 195 named locations
101
-
- Configure up to 2000 IP Ranges per named location
We’ve also added some additional checks to help reduce the change of misconfiguration.
105
-
106
-
- Private IP ranges can no longer be configured
107
-
- The number of IP addresses that can be included in a range are limited. Only CIDR masks greater than /8 will be allowed when configuring an IP range.
108
-
109
-
With the preview, there are now two create options:
110
-
111
-
-**Countries location**
112
-
-**IP ranges location**
113
-
114
-
> [!NOTE]
115
-
> IPv6 address ranges cannot be mapped to countries. Only IPv4 addresses map to countries.
When you configure the location condition, you have the option to distinguish between:
@@ -141,7 +112,7 @@ With this option, you can select one or more named locations. For a policy with
141
112
142
113
## IPv6 traffic
143
114
144
-
By default, Conditional Access policies will apply to all IPv6 traffic. With the [named location preview](#preview-features), you can exclude specific IPv6 address ranges from a Conditional Access policy. This option is useful in cases where you don’t want policy to be enforced for specific IPv6 ranges. For example, if you want to not enforce a policy for uses on your corporate network, and your corporate network is hosted on public IPv6 ranges.
115
+
By default, Conditional Access policies will apply to all IPv6 traffic. You can exclude specific IPv6 address ranges from a Conditional Access policy if you don’t want policies to be enforced for specific IPv6 ranges. For example, if you want to not enforce a policy for uses on your corporate network, and your corporate network is hosted on public IPv6 ranges.
|[Standard replication](#standard-replication)| Dual-node replicated configuration in a single datacenter with automatic failover | 99.9% |✔|✔|-|
20
-
|[Zone redundancy](#zone-redundancy)| Multi-node replicated configuration across AZs, with automatic failover |99.95% (Premium tier), 99.99% (Enterprise tiers) |-|Preview|Preview|
21
-
|[Geo-replication](#geo-replication)| Linked cache instances in two regions, with user-controlled failover | 99.999% (Enterprise tier) |-|✔|Preview|
19
+
|[Standard replication](#standard-replication)| Dual-node replicated configuration in a single datacenter with automatic failover | 99.9% (see [details](https://azure.microsoft.com/support/legal/sla/cache/v1_0/)) |✔|✔|-|
20
+
|[Zone redundancy](#zone-redundancy)| Multi-node replicated configuration across AZs, with automatic failover |Up to 99.99% (see [details](https://azure.microsoft.com/support/legal/sla/cache/v1_0/)) |-|Preview|Preview|
21
+
|[Geo-replication](#geo-replication)| Linked cache instances in two regions, with user-controlled failover |Up to 99.999% (see [details](https://azure.microsoft.com/support/legal/sla/cache/v1_0/)) |-|✔|Preview|
Copy file name to clipboardExpand all lines: articles/azure-monitor/alerts/alerts-action-rules.md
+13-6Lines changed: 13 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,7 +2,7 @@
2
2
title: Action rules for Azure Monitor alerts
3
3
description: Understanding what action rules in Azure Monitor are and how to configure and manage them.
4
4
ms.topic: conceptual
5
-
ms.date: 03/15/2021
5
+
ms.date: 04/08/2021
6
6
7
7
---
8
8
@@ -63,7 +63,7 @@ The available filters are:
63
63
64
64
***Severity**
65
65
This rule will apply only to alerts with the selected severities.
66
-
For example, **severity = Sev1** means that the rule will apply only to alerts with Sev1 severity.
66
+
For example, **severity = "Sev1"** means that the rule will apply only to alerts with Sev1 severity.
67
67
***Monitor service**
68
68
This rule will apply only to alerts coming from the selected monitoring services.
69
69
For example, **monitor service = “Azure Backup”** means that the rule will apply only to backup alerts (coming from Azure Backup).
@@ -75,15 +75,22 @@ This rule will apply only to alerts coming from a specific alert rule. The value
75
75
For example, **alert rule ID = "/subscriptions/SubId1/resourceGroups/RG1/providers/microsoft.insights/metricalerts/API-Latency"** means this rule will apply only to alerts coming from "API-Latency" metric alert rule.
76
76
_NOTE - you can get the proper alert rule ID by listing your alert rules from the CLI, or by opening a specific alert rule in the portal, clicking "Properties", and copying the "Resource ID" value._
77
77
***Monitor condition**
78
-
This rule will apply only to alert events with the specified monitor condition - either **Fired** or **Resolved**.
78
+
This rule will apply only to alert events with the specified monitor condition - either **"Fired"** or **"Resolved"**.
79
79
***Description**
80
80
This rule will apply only to alerts that contains a specific string in the alert description field. That field contains the alert rule description.
81
-
For example, **description contains 'prod'** means that the rule will only match alerts that contain the string "prod" in their description.
81
+
For example, **description contains "prod"** means that the rule will only match alerts that contain the string "prod" in their description.
82
82
***Alert context (payload)**
83
83
This rule will apply only to alerts that contain any of one or more specific values in the alert context fields.
84
-
For example, **alert context (payload) contains 'Computer-01'** means that the rule will only apply to alerts whose payload contain the string "Computer-01".
84
+
For example, **alert context (payload) contains "Computer-01"** means that the rule will only apply to alerts whose payload contain the string "Computer-01".
85
85
86
-
If you set multiple filters in a rule, all of them apply. For example, if you set **resource type' = Virtual Machines** and **severity' = Sev0**, then the rule will apply only for Sev0 alerts on virtual machines.
86
+
> [!NOTE]
87
+
> Each filter may include up to five values.
88
+
> For example, a filter on monitor service may include up to five monitor service names.
89
+
90
+
91
+
92
+
93
+
If you set multiple filters in a rule, all of them apply. For example, if you set **resource type = "Virtual Machines"** and **severity = "Sev0"**, then the rule will apply only for Sev0 alerts on virtual machines.
Copy file name to clipboardExpand all lines: articles/azure-monitor/app/sampling.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -179,7 +179,7 @@ The above code will disable adaptive sampling. Follow the steps below to add sam
179
179
Use extension methods of `TelemetryProcessorChainBuilder` as shown below to customize sampling behavior.
180
180
181
181
> [!IMPORTANT]
182
-
> If you use this method to configure sampling, please make sure to set the `aiOptions.EnableAdaptiveSampling` property to `false` when calling `AddApplicationInsightsTelemetry()`.
182
+
> If you use this method to configure sampling, please make sure to set the `aiOptions.EnableAdaptiveSampling` property to `false` when calling `AddApplicationInsightsTelemetry()`. After making this change, you then need to follow the instructions in the code block below **exactly** in order to re-enable adaptive sampling with your customizations in place. Failure to do so can result in excess data ingestion. Always test post changing sampling settings, and set an appropriate [daily data cap](pricing.md#set-the-daily-cap) to help control your costs.
Copy file name to clipboardExpand all lines: articles/azure-monitor/logs/cross-workspace-query.md
+7-5Lines changed: 7 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ description: This article describes how you can query against resources from mul
4
4
ms.topic: conceptual
5
5
author: bwren
6
6
ms.author: bwren
7
-
ms.date: 09/22/2020
7
+
ms.date: 04/11/2021
8
8
9
9
---
10
10
@@ -23,7 +23,7 @@ There are two methods to query data that is stored in multiple workspace and app
23
23
## Cross-resource query limits
24
24
25
25
* The number of Application Insights resources and Log Analytics workspaces that you can include in a single query is limited to 100.
26
-
* Cross-resource query is not supported in View Designer. You can Author a query in Log Analytics and pin it to Azure dashboard to [visualize a log query](../visualize/tutorial-logs-dashboards.md).
26
+
* Cross-resource query is not supported in View Designer. You can Author a query in Log Analytics and pin it to Azure dashboard to [visualize a log query](../visualize/tutorial-logs-dashboards.md) or include in [Workbooks](../visualize/workbooks-overview.md).
27
27
* Cross-resource queries in log alerts are only supported in the current [scheduledQueryRules API](/rest/api/monitor/scheduledqueryrules). If you're using the legacy Log Analytics Alerts API, you'll need to [switch to the current API](../alerts/alerts-log-api-switch.md).
28
28
29
29
@@ -37,15 +37,17 @@ Identifying a workspace can be accomplished one of several ways:
37
37
38
38
* Resource name - is a human-readable name of the workspace, sometimes referred to as *component name*.
39
39
40
+
>[!Note]
41
+
>Because app and workspace names are not unique, this identifier might be ambiguous. When there are multiple instances of the resource name, reference should be by Qualified name, Resource ID, or Azure Resource ID.
42
+
40
43
`workspace("contosoretail-it").Update | count`
41
44
42
-
* Qualified name - is the “full name” of the workspace, composed of the subscription name, resource group, and component name in this format: *subscriptionName/resourceGroup/componentName*.
45
+
* Qualified name - is the "full name" of the workspace, composed of the subscription name, resource group, and component name in this format: *subscriptionName/resourceGroup/componentName*.
0 commit comments