Skip to content

Commit 4566530

Browse files
authored
Merge pull request #252543 from Justinha/ds-rename-6
rebrand
2 parents 90b912e + 0b7c05d commit 4566530

File tree

9 files changed

+116
-116
lines changed

9 files changed

+116
-116
lines changed

articles/active-directory-domain-services/TOC.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -49,7 +49,7 @@
4949
href: concepts-replica-sets.md
5050
- name: Forests trusts
5151
href: concepts-forest-trust.md
52-
- name: How Microsoft Entra DS synchronization works
52+
- name: How Domain Services synchronization works
5353
href: synchronization.md
5454
- name: How password hash synchronization works
5555
href: ../active-directory/hybrid/connect/how-to-connect-password-hash-synchronization.md?context=/azure/active-directory-domain-services/context/azure-ad-ds-context
@@ -71,7 +71,7 @@
7171
href: create-ou.md
7272
- name: Create a group managed service account (gMSA)
7373
href: create-gmsa.md
74-
- name: Manage Microsoft Entra DS
74+
- name: Manage Domain Services
7575
items:
7676
- name: Administer Group Policy
7777
href: manage-group-policy.md
@@ -89,7 +89,7 @@
8989
href: change-sku.md
9090
- name: Retrieve data
9191
href: how-to-data-retrieval.md
92-
- name: Secure Microsoft Entra DS
92+
- name: Secure Domain Services
9393
items:
9494
- name: Secure your managed domain
9595
href: secure-your-domain.md

articles/active-directory-domain-services/security-audit-events.md

Lines changed: 17 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -17,35 +17,35 @@ ms.custom: devx-track-azurepowershell
1717
---
1818
# Enable security and DNS audits for Microsoft Entra Domain Services
1919

20-
Microsoft Entra Domain Services (Microsoft Entra DS) security and DNS audits let Azure stream events to targeted resources. These resources include Azure Storage, Azure Log Analytics workspaces, or Azure Event Hub. After you enable security audit events, Microsoft Entra DS sends all the audited events for the selected category to the targeted resource.
20+
Microsoft Entra Domain Services security and DNS audits let Azure stream events to targeted resources. These resources include Azure Storage, Azure Log Analytics workspaces, or Azure Event Hub. After you enable security audit events, Domain Services sends all the audited events for the selected category to the targeted resource.
2121

2222
You can archive events into Azure storage and stream events into security information and event management (SIEM) software (or equivalent) using Azure Event Hubs, or do your own analysis and using Azure Log Analytics workspaces from the Microsoft Entra admin center.
2323

2424
## Security audit destinations
2525

26-
You can use Azure Storage, Azure Event Hubs, or Azure Log Analytics workspaces as a target resource for Microsoft Entra DS security audits. These destinations can be combined. For example, you could use Azure Storage for archiving security audit events, but an Azure Log Analytics workspace to analyze and report on the information in the short term.
26+
You can use Azure Storage, Azure Event Hubs, or Azure Log Analytics workspaces as a target resource for Domain Services security audits. These destinations can be combined. For example, you could use Azure Storage for archiving security audit events, but an Azure Log Analytics workspace to analyze and report on the information in the short term.
2727

2828
The following table outlines scenarios for each destination resource type.
2929

3030
> [!IMPORTANT]
31-
> You need to create the target resource before you enable Microsoft Entra DS security audits. You can create these resources using the Microsoft Entra admin center, Azure PowerShell, or the Azure CLI.
31+
> You need to create the target resource before you enable Domain Services security audits. You can create these resources using the Microsoft Entra admin center, Azure PowerShell, or the Azure CLI.
3232
3333
| Target Resource | Scenario |
3434
|:---|:---|
35-
|Azure Storage| This target should be used when your primary need is to store security audit events for archival purposes. Other targets can be used for archival purposes, however those targets provide capabilities beyond the primary need of archiving. <br /><br />Before you enable Microsoft Entra DS security audit events, first [Create an Azure Storage account](../storage/common/storage-account-create.md).|
36-
|Azure Event Hubs| This target should be used when your primary need is to share security audit events with additional software such as data analysis software or security information & event management (SIEM) software.<br /><br />Before you enable Microsoft Entra DS security audit events, [Create an event hub using Microsoft Entra admin center](../event-hubs/event-hubs-create.md)|
37-
|Azure Log Analytics Workspace| This target should be used when your primary need is to analyze and review secure audits from the Microsoft Entra admin center directly.<br /><br />Before you enable Microsoft Entra DS security audit events, [Create a Log Analytics workspace in the Microsoft Entra admin center.](../azure-monitor/logs/quick-create-workspace.md)|
35+
|Azure Storage| This target should be used when your primary need is to store security audit events for archival purposes. Other targets can be used for archival purposes, however those targets provide capabilities beyond the primary need of archiving. <br /><br />Before you enable Domain Services security audit events, first [Create an Azure Storage account](../storage/common/storage-account-create.md).|
36+
|Azure Event Hubs| This target should be used when your primary need is to share security audit events with additional software such as data analysis software or security information & event management (SIEM) software.<br /><br />Before you enable Domain Services security audit events, [Create an event hub using Microsoft Entra admin center](../event-hubs/event-hubs-create.md)|
37+
|Azure Log Analytics Workspace| This target should be used when your primary need is to analyze and review secure audits from the Microsoft Entra admin center directly.<br /><br />Before you enable Domain Services security audit events, [Create a Log Analytics workspace in the Microsoft Entra admin center.](../azure-monitor/logs/quick-create-workspace.md)|
3838

3939
## Enable security audit events using the Microsoft Entra admin center
4040

41-
To enable Microsoft Entra DS security audit events using the Microsoft Entra admin center, complete the following steps.
41+
To enable Domain Services security audit events using the Microsoft Entra admin center, complete the following steps.
4242

4343
> [!IMPORTANT]
44-
> Microsoft Entra DS security audits aren't retroactive. You can't retrieve or replay events from the past. Microsoft Entra DS can only send events that occur after security audits are enabled.
44+
> Domain Services security audits aren't retroactive. You can't retrieve or replay events from the past. Domain Services can only send events that occur after security audits are enabled.
4545
4646
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as a Global Administrator.
4747
1. Search for and select **Microsoft Entra Domain Services**. Choose your managed domain, such as *aaddscontoso.com*.
48-
1. In the Microsoft Entra DS window, select **Diagnostic settings** on the left-hand side.
48+
1. In the Domain Services window, select **Diagnostic settings** on the left-hand side.
4949
1. No diagnostics are configured by default. To get started, select **Add diagnostic setting**.
5050

5151
![Add a diagnostic setting for Microsoft Entra Domain Services](./media/security-audit-events/add-diagnostic-settings.png)
@@ -71,14 +71,14 @@ To enable Microsoft Entra DS security audit events using the Microsoft Entra adm
7171

7272
You can select different log categories for each targeted resource within a single configuration. This ability lets you choose which logs categories you want to keep for Log Analytics and which logs categories you want to archive, for example.
7373

74-
1. When done, select **Save** to commit your changes. The target resources start to receive Microsoft Entra DS audit events soon after the configuration is saved.
74+
1. When done, select **Save** to commit your changes. The target resources start to receive Domain Services audit events soon after the configuration is saved.
7575

7676
## Enable security and DNS audit events using Azure PowerShell
7777

78-
To enable Microsoft Entra DS security and DNS audit events using Azure PowerShell, complete the following steps. If needed, first [install the Azure PowerShell module and connect to your Azure subscription](/powershell/azure/install-azure-powershell).
78+
To enable Domain Services security and DNS audit events using Azure PowerShell, complete the following steps. If needed, first [install the Azure PowerShell module and connect to your Azure subscription](/powershell/azure/install-azure-powershell).
7979

8080
> [!IMPORTANT]
81-
> Microsoft Entra DS audits aren't retroactive. You can't retrieve or replay events from the past. Microsoft Entra DS can only send events that occur after audits are enabled.
81+
> Domain Services audits aren't retroactive. You can't retrieve or replay events from the past. Domain Services can only send events that occur after audits are enabled.
8282
8383
1. Authenticate to your Azure subscription using the [Connect-AzAccount](/powershell/module/Az.Accounts/Connect-AzAccount) cmdlet. When prompted, enter your account credentials.
8484

@@ -90,12 +90,12 @@ To enable Microsoft Entra DS security and DNS audit events using Azure PowerShel
9090
9191
* **Azure Log Analytic workspaces** - [Create a Log Analytics workspace with Azure PowerShell](../azure-monitor/logs/powershell-workspace-configuration.md).
9292
* **Azure storage** - [Create a storage account using Azure PowerShell](../storage/common/storage-account-create.md?tabs=azure-powershell)
93-
* **Azure event hubs** - [Create an event hub using Azure PowerShell](../event-hubs/event-hubs-quickstart-powershell.md). You may also need to use the [New-AzEventHubAuthorizationRule](/powershell/module/az.eventhub/new-azeventhubauthorizationrule) cmdlet to create an authorization rule that grants Microsoft Entra DS permissions to the event hub *namespace*. The authorization rule must include the **Manage**, **Listen**, and **Send** rights.
93+
* **Azure event hubs** - [Create an event hub using Azure PowerShell](../event-hubs/event-hubs-quickstart-powershell.md). You may also need to use the [New-AzEventHubAuthorizationRule](/powershell/module/az.eventhub/new-azeventhubauthorizationrule) cmdlet to create an authorization rule that grants Domain Services permissions to the event hub *namespace*. The authorization rule must include the **Manage**, **Listen**, and **Send** rights.
9494
9595
> [!IMPORTANT]
9696
> Ensure you set the authorization rule on the event hub namespace and not the event hub itself.
9797
98-
1. Get the resource ID for your Microsoft Entra DS managed domain using the [Get-AzResource](/powershell/module/Az.Resources/Get-AzResource) cmdlet. Create a variable named *$aadds.ResourceId* to hold the value:
98+
1. Get the resource ID for your Domain Services managed domain using the [Get-AzResource](/powershell/module/Az.Resources/Get-AzResource) cmdlet. Create a variable named *$aadds.ResourceId* to hold the value:
9999
100100
```azurepowershell
101101
$aadds = Get-AzResource -name aaddsDomainName
@@ -138,7 +138,7 @@ Log Analytic workspaces let you view and analyze the security and DNS audit even
138138
* [Get started with log queries in Azure Monitor](../azure-monitor/logs/get-started-queries.md)
139139
* [Create and share dashboards of Log Analytics data](../azure-monitor/visualize/tutorial-logs-dashboards.md)
140140
141-
The following sample queries can be used to start analyzing audit events from Microsoft Entra DS.
141+
The following sample queries can be used to start analyzing audit events from Domain Services.
142142
143143
### Sample query 1
144144
@@ -206,7 +206,7 @@ AADDomainServicesAccountLogon
206206

207207
## Audit security and DNS event categories
208208

209-
Microsoft Entra DS security and DNS audits align with traditional auditing for traditional AD DS domain controllers. In hybrid environments, you can reuse existing audit patterns so the same logic may be used when analyzing the events. Depending on the scenario you need to troubleshoot or analyze, the different audit event categories need to be targeted.
209+
Domain Services security and DNS audits align with traditional auditing for traditional AD DS domain controllers. In hybrid environments, you can reuse existing audit patterns so the same logic may be used when analyzing the events. Depending on the scenario you need to troubleshoot or analyze, the different audit event categories need to be targeted.
210210

211211
The following audit event categories are available:
212212

@@ -226,7 +226,7 @@ The following audit event categories are available:
226226

227227
## Event IDs per category
228228

229-
Microsoft Entra DS security and DNS audits record the following event IDs when the specific action triggers an auditable event:
229+
Domain Services security and DNS audits record the following event IDs when the specific action triggers an auditable event:
230230

231231
| Event Category Name | Event IDs |
232232
|:---|:---|

articles/active-directory-domain-services/suspension.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Suspended domains in Microsoft Entra Domain Services | Microsoft Docs
3-
description: Learn about the different health states for a Microsoft Entra DS managed domain and how to restore a suspended domain.
3+
description: Learn about the different health states for a Microsoft Entra Domain Services managed domain and how to restore a suspended domain.
44
services: active-directory-ds
55
author: justinha
66
manager: amycolannino
@@ -16,7 +16,7 @@ ms.author: justinha
1616
---
1717
# Understand the health states and resolve suspended domains in Microsoft Entra Domain Services
1818

19-
When Microsoft Entra Domain Services (Microsoft Entra DS) is unable to service a managed domain for a long period of time, it puts the managed domain into a suspended state. If a managed domain remains in a suspended state, it's automatically deleted. To keep your Microsoft Entra DS managed domain healthy and avoid suspension, resolve any alerts as quickly as you can.
19+
When Microsoft Entra Domain Services is unable to service a managed domain for a long period of time, it puts the managed domain into a suspended state. If a managed domain remains in a suspended state, it's automatically deleted. To keep your Domain Services managed domain healthy and avoid suspension, resolve any alerts as quickly as you can.
2020

2121
This article explains why managed domains are suspended, and how to recover a suspended domain.
2222

@@ -70,7 +70,7 @@ When a managed domain is in the *Needs Attention* state, the Azure platform may
7070
A managed domain enters the **Suspended** state for one of the following reasons:
7171

7272
* One or more critical alerts haven't been resolved in 15 days.
73-
* Critical alerts can be caused by a misconfiguration that blocks access to resources that are needed by Microsoft Entra DS. For example, the alert [AADDS104: Network Error][alert-nsg] has been unresolved for more than 15 days in the managed domain.
73+
* Critical alerts can be caused by a misconfiguration that blocks access to resources that are needed by Domain Services. For example, the alert [AADDS104: Network Error][alert-nsg] has been unresolved for more than 15 days in the managed domain.
7474
* There's a billing issue with the Azure subscription or the Azure subscription has expired.
7575

7676
Managed domains are suspended when the Azure platform can't manage, monitor, patch, or back up the domain. A managed domain stays in a *Suspended* state for 15 days. To maintain access to the managed domain, resolve critical alerts immediately.
@@ -87,7 +87,7 @@ The following behavior is experienced when a managed domain is in the *Suspended
8787

8888
### How do you know if your managed domain is suspended?
8989

90-
You see an [alert][resolve-alerts] on the Microsoft Entra DS Health page in the Microsoft Entra admin center that notes the domain is suspended. The state of the domain also shows *Suspended*.
90+
You see an [alert][resolve-alerts] on the Domain Services Health page in the Microsoft Entra admin center that notes the domain is suspended. The state of the domain also shows *Suspended*.
9191

9292
### Restore a suspended domain
9393

@@ -111,7 +111,7 @@ If a managed domain stays in the *Suspended* state for 15 days, it's deleted. Th
111111
When a managed domain enters the *Deleted* state, the following behavior is seen:
112112

113113
* All resources and backups for the managed domain are deleted.
114-
* You can't restore the managed domain. You must create a replacement managed domain to reuse Microsoft Entra DS.
114+
* You can't restore the managed domain. You must create a replacement managed domain to reuse Domain Services.
115115
* After it's deleted, you aren't billed for the managed domain.
116116

117117
## Next steps

0 commit comments

Comments
 (0)