Skip to content

Commit 3b0efa3

Browse files
authored
Merge pull request #154034 from MicrosoftDocs/master
Merge master to live, 4 AM
2 parents 49b59ad + 84289da commit 3b0efa3

File tree

86 files changed

+1102
-582
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

86 files changed

+1102
-582
lines changed

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -64969,6 +64969,11 @@
6496964969
{
6497064970
"source_path": "articles/app-service/quickstart-dotnet-framework.md",
6497164971
"redirect_url": "/azure/app-service/quickstart-dotnetcore?tabs=netframework48"
64972+
},
64973+
{
64974+
"source_path": "articles/virtual-desktop/rd-gateway-role.md",
64975+
"redirect_url": "/windows-server/remote/remote-desktop-services/remote-desktop-gateway-role",
64976+
"redirect_document_id": false
6497264977
}
6497364978
]
6497464979
}

articles/active-directory/authentication/howto-mfa-mfasettings.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -233,7 +233,7 @@ The _Trusted IPs_ feature of Azure AD Multi-Factor Authentication bypasses multi
233233
> [!NOTE]
234234
> The trusted IPs can include private IP ranges only when you use MFA Server. For cloud-based Azure AD Multi-Factor Authentication, you can only use public IP address ranges.
235235
>
236-
> IPv6 ranges are only supported in the [Named location (preview)](../conditional-access/location-condition.md#preview-features) interface.
236+
> IPv6 ranges are only supported in the [Named location (preview)](../conditional-access/location-condition.md) interface.
237237
238238
If your organization deploys the NPS extension to provide MFA to on-premises applications note the source IP address will always appear to be the NPS server the authentication attempt flows through.
239239

articles/active-directory/conditional-access/concept-continuous-access-evaluation.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -139,7 +139,7 @@ From this page, you can optionally limit the users and groups that will be subje
139139
For CAE, we only have insights into named IP-based named locations. We have no insights into other location settings like [MFA trusted IPs](../authentication/howto-mfa-mfasettings.md#trusted-ips) or country-based locations. When user comes from an MFA trusted IP or trusted locations that include MFA Trusted IPs or country location, CAE will not be enforced after user move to a different location. In those cases, we will issue a 1-hour CAE token without instant IP enforcement check.
140140

141141
> [!IMPORTANT]
142-
> When configuring locations for continuous access evaluation, use only the [IP based Conditional Access location condition](../conditional-access/location-condition.md#preview-features) and configure all IP addresses, **including both IPv4 and IPv6**, that can be seen by your identity provider and resources provider. Do not use country location conditions or the trusted ips feature that is available in Azure AD Multi-Factor Authentication's service settings page.
142+
> When configuring locations for continuous access evaluation, use only the [IP based Conditional Access location condition](../conditional-access/location-condition.md) and configure all IP addresses, **including both IPv4 and IPv6**, that can be seen by your identity provider and resources provider. Do not use country location conditions or the trusted ips feature that is available in Azure AD Multi-Factor Authentication's service settings page.
143143
144144
### IP address configuration
145145

articles/active-directory/conditional-access/location-condition.md

Lines changed: 14 additions & 43 deletions
Original file line numberDiff line numberDiff line change
@@ -30,39 +30,37 @@ Organizations can use this network location for common tasks like:
3030

3131
The network location is determined by the public IP address a client provides to Azure Active Directory. Conditional Access policies by default apply to all IPv4 and IPv6 addresses.
3232

33-
> [!TIP]
34-
> IPv6 ranges are only supported in the **[Named location (preview)](#preview-features)** interface.
35-
3633
## Named locations
3734

38-
Locations are designated in the Azure portal under **Azure Active Directory** > **Security** > **Conditional Access** > **Named locations**. These named network locations may include locations like an organization's headquarters network ranges, VPN network ranges, or ranges that you wish to block.
35+
Locations are designated in the Azure portal under **Azure Active Directory** > **Security** > **Conditional Access** > **Named locations**. These named network locations may include locations like an organization's headquarters network ranges, VPN network ranges, or ranges that you wish to block. Named locations can be defined by IPv4/IPv6 address ranges or by countries/regions.
3936

4037
![Named locations in the Azure portal](./media/location-condition/new-named-location.png)
4138

42-
To configure a location, you will need to provide at least a **Name** and the IP range.
43-
44-
The number of named locations you can configure is constrained by the size of the related object in Azure AD. You can configure locations based on of the following limitations:
39+
### IP address ranges
4540

46-
- One named location with up to 1200 IPv4 ranges.
47-
- A maximum of 90 named locations with one IP range assigned to each of them.
41+
To define a named location by IPv4/IPv6 address ranges, you will need to provide a **Name** and an IP range.
4842

49-
> [!TIP]
50-
> IPv6 ranges are only supported in the **[Named location (preview)](#preview-features)** interface.
43+
Named locations defined by IPv4/IPv6 address ranges are subject to the following limitations:
44+
- Configure up to 195 named locations
45+
- Configure up to 2000 IP ranges per named location
46+
- Both IPv4 and IPv6 ranges are supported
47+
- Private IP ranges connot be configured
48+
- The number of IP addresses contained in a range is limited. Only CIDR masks greater than /8 are allowed when defining an IP range.
5149

5250
### Trusted locations
5351

54-
When creating a network location, an administrator has the option to mark a location as a trusted location.
52+
Administrators can designate named locations defined by IP address ranges to be trusted named locations.
5553

5654
![Trusted locations in the Azure portal](./media/location-condition/new-trusted-location.png)
5755

58-
This option can factor in to Conditional Access policies where you may, for example, require registration for multi-factor authentication from a trusted network location. It also factors in to Azure AD Identity Protection's risk calculation, lowering a users' sign-in risk when coming from a location marked as trusted.
56+
Sign-ins from trusted named locations improve the accuracy of Azure AD Identity Protection's risk calculation, lowering a users' sign-in risk when they authenticate from a location marked as trusted. Additionally, trusted named locations can be targeted in Conditional Access policies. For example, you may require restrict multi-factor authentication registration to trusted named locations only.
5957

6058
### Countries and regions
6159

62-
Some organizations may choose to define entire countries or regions IP boundaries as named locations for Conditional Access policies. They may use these locations when blocking unnecessary traffic when they know valid users will never come from a location such as North Korea. These mappings of IP address to country are updated periodically.
60+
Some organizations may choose to restrict access to certain countries or regions using Conditional Access. In addition to defining named locations by IP ranges, admins can define named locations by country or regions. When a user signs in, Azure AD resolves the user's IPv4 address to a country or region, and the mapping is updated periodically. Organizations can use named locations defined by countries to block traffic from countries where they do not do business, such as North Korea.
6361

6462
> [!NOTE]
65-
> IPv6 address ranges cannot be mapped to countries. Only IPv4 addresses map to countries.
63+
> Sign-ins from IPv6 addresses cannot be mapped to countries or regions, and are considered unknown areas. Only IPv4 addresses can be mapped to countries or regions.
6664
6765
![Create a new country or region-based location in the Azure portal](./media/location-condition/new-named-location-country-region.png)
6866

@@ -89,33 +87,6 @@ For mobile and desktop applications, which have long lived session lifetimes, Co
8987

9088
If both steps fail, a user is considered to be no longer on a trusted IP.
9189

92-
## Preview features
93-
94-
In addition to the generally available named location feature, there is also a named location (preview). You can access the named location preview by using the banner at the top of the current named location blade.
95-
96-
![Try the named locations preview](./media/location-condition/preview-features.png)
97-
98-
With the named location preview, you are able to
99-
100-
- Configure up to 195 named locations
101-
- Configure up to 2000 IP Ranges per named location
102-
- Configure IPv6 addresses alongside IPv4 addresses
103-
104-
We’ve also added some additional checks to help reduce the change of misconfiguration.
105-
106-
- Private IP ranges can no longer be configured
107-
- The number of IP addresses that can be included in a range are limited. Only CIDR masks greater than /8 will be allowed when configuring an IP range.
108-
109-
With the preview, there are now two create options:
110-
111-
- **Countries location**
112-
- **IP ranges location**
113-
114-
> [!NOTE]
115-
> IPv6 address ranges cannot be mapped to countries. Only IPv4 addresses map to countries.
116-
117-
![Named locations preview interface](./media/location-condition/named-location-preview.png)
118-
11990
## Location condition in policy
12091

12192
When you configure the location condition, you have the option to distinguish between:
@@ -141,7 +112,7 @@ With this option, you can select one or more named locations. For a policy with
141112

142113
## IPv6 traffic
143114

144-
By default, Conditional Access policies will apply to all IPv6 traffic. With the [named location preview](#preview-features), you can exclude specific IPv6 address ranges from a Conditional Access policy. This option is useful in cases where you don’t want policy to be enforced for specific IPv6 ranges. For example, if you want to not enforce a policy for uses on your corporate network, and your corporate network is hosted on public IPv6 ranges.
115+
By default, Conditional Access policies will apply to all IPv6 traffic. You can exclude specific IPv6 address ranges from a Conditional Access policy if you don’t want policies to be enforced for specific IPv6 ranges. For example, if you want to not enforce a policy for uses on your corporate network, and your corporate network is hosted on public IPv6 ranges.
145116

146117
### When will my tenant have IPv6 traffic?
147118

articles/active-directory/managed-identities-azure-resources/services-support-managed-identities.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -285,7 +285,7 @@ Refer to the following list to configure managed identity for Azure Policy (in r
285285
- [PowerShell](../../governance/policy/how-to/remediate-resources.md#create-managed-identity-with-powershell)
286286
- [Azure CLI](/cli/azure/policy/assignment#az-policy-assignment-create)
287287
- [Azure Resource Manager templates](/azure/templates/microsoft.authorization/policyassignments)
288-
- [REST](/rest/api/resources/policyassignments/create)
288+
- [REST](/rest/api/policy/policyassignments/create)
289289

290290

291291
### Azure Service Fabric

articles/azure-cache-for-redis/cache-high-availability.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -16,9 +16,9 @@ Azure Cache for Redis implements high availability by using multiple VMs, called
1616

1717
| Option | Description | Availability | Standard | Premium | Enterprise |
1818
| ------------------- | ------- | ------- | :------: | :---: | :---: |
19-
| [Standard replication](#standard-replication)| Dual-node replicated configuration in a single datacenter with automatic failover | 99.9% |||-|
20-
| [Zone redundancy](#zone-redundancy) | Multi-node replicated configuration across AZs, with automatic failover | 99.95% (Premium tier), 99.99% (Enterprise tiers) |-|Preview|Preview|
21-
| [Geo-replication](#geo-replication) | Linked cache instances in two regions, with user-controlled failover | 99.999% (Enterprise tier) |-||Preview|
19+
| [Standard replication](#standard-replication)| Dual-node replicated configuration in a single datacenter with automatic failover | 99.9% (see [details](https://azure.microsoft.com/support/legal/sla/cache/v1_0/)) |||-|
20+
| [Zone redundancy](#zone-redundancy) | Multi-node replicated configuration across AZs, with automatic failover | Up to 99.99% (see [details](https://azure.microsoft.com/support/legal/sla/cache/v1_0/)) |-|Preview|Preview|
21+
| [Geo-replication](#geo-replication) | Linked cache instances in two regions, with user-controlled failover | Up to 99.999% (see [details](https://azure.microsoft.com/support/legal/sla/cache/v1_0/)) |-||Preview|
2222

2323
## Standard replication
2424

articles/azure-monitor/alerts/alerts-action-rules.md

Lines changed: 13 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Action rules for Azure Monitor alerts
33
description: Understanding what action rules in Azure Monitor are and how to configure and manage them.
44
ms.topic: conceptual
5-
ms.date: 03/15/2021
5+
ms.date: 04/08/2021
66

77
---
88

@@ -63,7 +63,7 @@ The available filters are:
6363

6464
* **Severity**
6565
This rule will apply only to alerts with the selected severities.
66-
For example, **severity = Sev1** means that the rule will apply only to alerts with Sev1 severity.
66+
For example, **severity = "Sev1"** means that the rule will apply only to alerts with Sev1 severity.
6767
* **Monitor service**
6868
This rule will apply only to alerts coming from the selected monitoring services.
6969
For example, **monitor service = “Azure Backup”** means that the rule will apply only to backup alerts (coming from Azure Backup).
@@ -75,15 +75,22 @@ This rule will apply only to alerts coming from a specific alert rule. The value
7575
For example, **alert rule ID = "/subscriptions/SubId1/resourceGroups/RG1/providers/microsoft.insights/metricalerts/API-Latency"** means this rule will apply only to alerts coming from "API-Latency" metric alert rule.
7676
_NOTE - you can get the proper alert rule ID by listing your alert rules from the CLI, or by opening a specific alert rule in the portal, clicking "Properties", and copying the "Resource ID" value._
7777
* **Monitor condition**
78-
This rule will apply only to alert events with the specified monitor condition - either **Fired** or **Resolved**.
78+
This rule will apply only to alert events with the specified monitor condition - either **"Fired"** or **"Resolved"**.
7979
* **Description**
8080
This rule will apply only to alerts that contains a specific string in the alert description field. That field contains the alert rule description.
81-
For example, **description contains 'prod'** means that the rule will only match alerts that contain the string "prod" in their description.
81+
For example, **description contains "prod"** means that the rule will only match alerts that contain the string "prod" in their description.
8282
* **Alert context (payload)**
8383
This rule will apply only to alerts that contain any of one or more specific values in the alert context fields.
84-
For example, **alert context (payload) contains 'Computer-01'** means that the rule will only apply to alerts whose payload contain the string "Computer-01".
84+
For example, **alert context (payload) contains "Computer-01"** means that the rule will only apply to alerts whose payload contain the string "Computer-01".
8585

86-
If you set multiple filters in a rule, all of them apply. For example, if you set **resource type' = Virtual Machines** and **severity' = Sev0**, then the rule will apply only for Sev0 alerts on virtual machines.
86+
> [!NOTE]
87+
> Each filter may include up to five values.
88+
> For example, a filter on monitor service may include up to five monitor service names.
89+
90+
91+
92+
93+
If you set multiple filters in a rule, all of them apply. For example, if you set **resource type = "Virtual Machines"** and **severity = "Sev0"**, then the rule will apply only for Sev0 alerts on virtual machines.
8794

8895
![Action rule filters](media/alerts-action-rules/action-rules-new-rule-creation-flow-filters.png)
8996

articles/azure-monitor/app/sampling.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -179,7 +179,7 @@ The above code will disable adaptive sampling. Follow the steps below to add sam
179179
Use extension methods of `TelemetryProcessorChainBuilder` as shown below to customize sampling behavior.
180180

181181
> [!IMPORTANT]
182-
> If you use this method to configure sampling, please make sure to set the `aiOptions.EnableAdaptiveSampling` property to `false` when calling `AddApplicationInsightsTelemetry()`.
182+
> If you use this method to configure sampling, please make sure to set the `aiOptions.EnableAdaptiveSampling` property to `false` when calling `AddApplicationInsightsTelemetry()`. After making this change, you then need to follow the instructions in the code block below **exactly** in order to re-enable adaptive sampling with your customizations in place. Failure to do so can result in excess data ingestion. Always test post changing sampling settings, and set an appropriate [daily data cap](pricing.md#set-the-daily-cap) to help control your costs.
183183
184184
```csharp
185185
using Microsoft.ApplicationInsights.Extensibility

articles/azure-monitor/logs/cross-workspace-query.md

Lines changed: 7 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: This article describes how you can query against resources from mul
44
ms.topic: conceptual
55
author: bwren
66
ms.author: bwren
7-
ms.date: 09/22/2020
7+
ms.date: 04/11/2021
88

99
---
1010

@@ -23,7 +23,7 @@ There are two methods to query data that is stored in multiple workspace and app
2323
## Cross-resource query limits
2424

2525
* The number of Application Insights resources and Log Analytics workspaces that you can include in a single query is limited to 100.
26-
* Cross-resource query is not supported in View Designer. You can Author a query in Log Analytics and pin it to Azure dashboard to [visualize a log query](../visualize/tutorial-logs-dashboards.md).
26+
* Cross-resource query is not supported in View Designer. You can Author a query in Log Analytics and pin it to Azure dashboard to [visualize a log query](../visualize/tutorial-logs-dashboards.md) or include in [Workbooks](../visualize/workbooks-overview.md).
2727
* Cross-resource queries in log alerts are only supported in the current [scheduledQueryRules API](/rest/api/monitor/scheduledqueryrules). If you're using the legacy Log Analytics Alerts API, you'll need to [switch to the current API](../alerts/alerts-log-api-switch.md).
2828

2929

@@ -37,15 +37,17 @@ Identifying a workspace can be accomplished one of several ways:
3737

3838
* Resource name - is a human-readable name of the workspace, sometimes referred to as *component name*.
3939

40+
>[!Note]
41+
>Because app and workspace names are not unique, this identifier might be ambiguous. When there are multiple instances of the resource name, reference should be by Qualified name, Resource ID, or Azure Resource ID.
42+
4043
`workspace("contosoretail-it").Update | count`
4144

42-
* Qualified name - is the full name of the workspace, composed of the subscription name, resource group, and component name in this format: *subscriptionName/resourceGroup/componentName*.
45+
* Qualified name - is the "full name" of the workspace, composed of the subscription name, resource group, and component name in this format: *subscriptionName/resourceGroup/componentName*.
4346

4447
`workspace('contoso/contosoretail/contosoretail-it').Update | count`
4548

4649
>[!NOTE]
47-
>Because Azure subscription names are not unique, this identifier might be ambiguous.
48-
>
50+
>Because Azure subscription names are not unique, this identifier might be ambiguous.
4951
5052
* Workspace ID - A workspace ID is the unique, immutable, identifier assigned to each workspace represented as a globally unique identifier (GUID).
5153

120 KB
Loading

0 commit comments

Comments
 (0)