Skip to content

Commit 49cf978

Browse files
authored
Merge pull request #95774 from MicrosoftDocs/master
Merge Master to Live, 3 AM
2 parents ae8b23a + 92e93b4 commit 49cf978

File tree

596 files changed

+2431
-4106
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

596 files changed

+2431
-4106
lines changed

.openpublishing.redirection.json

Lines changed: 44 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -245,6 +245,12 @@
245245
"redirect_url": "/azure/site-recovery/vmware-physical-mobility-service-overview#install-mobility-agent-through-ui",
246246
"redirect_document_id": false
247247
},
248+
249+
{
250+
"source_path": "articles/site-recovery/scvmm-site-recovery-deprecation.md",
251+
"redirect_url": "/azure/site-recovery/site-to-site-deprecation",
252+
"redirect_document_id": false
253+
},
248254
{
249255
"source_path": "articles/machine-learning/service/quickstart-get-started.md",
250256
"redirect_url": "/azure/machine-learning/service/quickstart-run-cloud-notebook",
@@ -529,7 +535,7 @@
529535
"source_path": "articles/cognitive-services/LUIS/luis-tutorial-prebuilt-intents-entities.md",
530536
"redirect_url": "/azure/cognitive-services/LUIS/tutorial-machine-learned-entity",
531537
"redirect_document_id": false
532-
},
538+
},
533539
{
534540
"source_path": "articles/cognitive-services/LUIS/luis-quickstart-intents-only.md",
535541
"redirect_url": "/azure/cognitive-services/LUIS/tutorial-intents-only",
@@ -43609,6 +43615,43 @@
4360943615
"redirect_document_id": false
4361043616
},
4361143617
{
43618+
"source_path": "articles/load-balancer/load-balancer-outbound-connections-classic.md",
43619+
"redirect_url": "/previous-versions/azure/load-balancer/load-balancer-outbound-connections-classic",
43620+
"redirect_document_id": false
43621+
},
43622+
{
43623+
"source_path": "articles/load-balancer/load-balancer-multivip.md",
43624+
"redirect_url": "/previous-versions/azure/load-balancer/load-balancer-multivip",
43625+
"redirect_document_id": false
43626+
},
43627+
{
43628+
"source_path": "articles/load-balancer/load-balancer-get-started-ilb-classic-cloud.md",
43629+
"redirect_url": "/previous-versions/azure/load-balancer/load-balancer-get-started-ilb-classic-cloud",
43630+
"redirect_document_id": false
43631+
},
43632+
{
43633+
"source_path": "articles/load-balancer/load-balancer-get-started-ilb-classic-ps.md",
43634+
"redirect_url": "/previous-versions/azure/load-balancer/load-balancer-get-started-ilb-classic-ps",
43635+
"redirect_document_id": false
43636+
},
43637+
{
43638+
"source_path": "articles/load-balancer/load-balancer-get-started-ilb-classic-cli.md",
43639+
"redirect_url": "/previous-versions/azure/load-balancer/load-balancer-get-started-ilb-classic-cli",
43640+
"redirect_document_id": false
43641+
},
43642+
{
43643+
"source_path": "articles/load-balancer/load-balancer-get-started-internet-classic-ps.md",
43644+
"redirect_url": "/previous-versions/azure/load-balancer/load-balancer-get-started-internet-classic-ps",
43645+
"redirect_document_id": false
43646+
},
43647+
{
43648+
"source_path": "articles/load-balancer/load-balancer-get-started-internet-classic-cloud.md",
43649+
"redirect_url": "/previous-versions/azure/load-balancer/load-balancer-get-started-internet-classic-cloud",
43650+
"redirect_document_id": false
43651+
},
43652+
{
43653+
"source_path": "articles/load-balancer/load-balancer-get-started-internet-classic-cli.md",
43654+
"redirect_url": "/previous-versions/azure/load-balancer/load-balancer-get-started-internet-classic-cli",
4361243655
"source_path": "articles/cognitive-services/translator/how-to-install-containers.md",
4361343656
"redirect_url": "/azure/cognitive-services/translator/translator-info-overview",
4361443657
"redirect_document_id": false

articles/active-directory/authentication/howto-sspr-writeback.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -96,7 +96,7 @@ To set up the appropriate permissions for password writeback to occur, complete
9696
* **Write pwdLastSet**
9797
9. Select **Apply/OK** to apply the changes and exit any open dialog boxes.
9898

99-
Since the source of authority is on premises, the password complexity policies apply from the same connected data source. Make sure you've changed the existing group policies for "Minimum Password Length". The group policy shouldn't be set to 1, which means password should be at least a day old before it can be updated. You need make sure it's set to 0. These settings can be found in `gpmc.msc` under **Computer Configuration > Policies > Windows Settings > Security Settings > Account Policies**. Run `gpupdate /force` to ensure that the change takes effect.
99+
Since the source of authority is on premises, the password complexity policies apply from the same connected data source. Make sure you've changed the existing group policies for "Minimum password age". The group policy shouldn't be set to 1, which means password should be at least a day old before it can be updated. You need make sure it's set to 0. These settings can be found in `gpmc.msc` under **Computer Configuration > Policies > Windows Settings > Security Settings > Account Policies**. Run `gpupdate /force` to ensure that the change takes effect.
100100

101101
## Next steps
102102

articles/active-directory/b2b/troubleshoot.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: active-directory
55
ms.service: active-directory
66
ms.subservice: B2B
77
ms.topic: troubleshooting
8-
ms.date: 05/25/2017
8+
ms.date: 11/12/2019
99
tags: active-directory
1010
ms.author: mimart
1111
author: v-miegge
@@ -90,6 +90,10 @@ To resolve this problem, you must take over the abandoned tenant. Refer to [Tak
9090

9191
If the identity tenant is a just-in-time (JIT) or viral tenant (meaning it's a separate, unmanaged Azure tenant), only the guest user can reset their password. Sometimes an organization will [take over management of viral tenants](https://docs.microsoft.com/azure/active-directory/users-groups-roles/domains-admin-takeover) that are created when employees use their work email addresses to sign up for services. After the organization takes over a viral tenant, only an administrator in that organization can reset the user's password or enable SSPR. If necessary, as the inviting organization, you can remove the guest user account from your directory and resend an invitation.
9292

93+
## A guest user is unable to use the AzureAD PowerShell V1 module
94+
95+
As of November 18, 2019, guest users in your directory (defined as user accounts where the **userType** property equals **Guest**) are blocked from using the AzureAD PowerShell V1 module. Going forward, a user will need to either be a member user (where **userType** equals **Member**) or use the AzureAD PowerShell V2 module.
96+
9397
## Next steps
9498

9599
[Get support for B2B collaboration](get-support.md)

articles/active-directory/privileged-identity-management/pim-apis.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,16 +1,16 @@
11
---
2-
title: Microsoft Graph APIs for PIM (Preview) - Azure Active Directory | Microsoft Docs
2+
title: Microsoft Graph APIs for PIM (Preview) - Azure AD | Microsoft Docs
33
description: Provides information about using the Microsoft Graph APIs for Azure AD Privileged Identity Management (PIM) (Preview).
44
services: active-directory
55
documentationcenter: ''
66
author: curtand
7-
manager: mtillman
7+
manager: daveba
88
editor: ''
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.subservice: pim
1212
ms.topic: overview
13-
ms.date: 11/13/2018
13+
ms.date: 11/08/2019
1414
ms.author: curtand
1515
ms.custom: pim
1616
ms.collection: M365-identity-device-management

articles/active-directory/privileged-identity-management/pim-configure.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: What is Privileged Identity Management? - Azure Active Directory | Microsoft Docs
2+
title: What is Privileged Identity Management? - Azure AD | Microsoft Docs
33
description: Provides an overview of Azure AD Privileged Identity Management (PIM).
44
services: active-directory
55
documentationcenter: ''
@@ -10,7 +10,7 @@ ms.service: active-directory
1010
ms.workload: identity
1111
ms.subservice: pim
1212
ms.topic: overview
13-
ms.date: 04/09/2019
13+
ms.date: 11/08/2019
1414
ms.author: curtand
1515
ms.custom: pim
1616
ms.collection: M365-identity-device-management

articles/active-directory/privileged-identity-management/pim-deployment-plan.md

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,17 +1,16 @@
11
---
2-
title: Deploy Privileged Identity Management (PIM) - Azure Active Directory | Microsoft Docs
2+
title: Deploy Privileged Identity Management (PIM) - Azure AD | Microsoft Docs
33
description: Describes how to plan the deployment of Azure AD Privileged Identity Management (PIM).
44
services: active-directory
55
documentationcenter: ''
66
author: curtand
7-
manager: mtillman
7+
manager: daveba
88
editor: ''
9-
109
ms.service: active-directory
1110
ms.topic: conceptual
1211
ms.workload: identity
1312
ms.subservice: pim
14-
ms.date: 02/08/2019
13+
ms.date: 11/08/2019
1514
ms.author: curtand
1615
ms.custom:
1716
ms.collection: M365-identity-device-management

articles/active-directory/privileged-identity-management/pim-how-to-change-default-settings.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,17 +1,17 @@
11
---
2-
title: Configure Azure AD role settings in Privileged Identity Management - Azure Active Directory | Microsoft Docs
2+
title: Configure Azure AD role settings in PIM - Azure AD | Microsoft Docs
33
description: Learn how to configure Azure AD role settings in Azure AD Privileged Identity Management (PIM).
44
services: active-directory
55
documentationcenter: ''
66
author: curtand
7-
manager: mtillman
7+
manager: daveba
88
editor: ''
99

1010
ms.service: active-directory
1111
ms.topic: conceptual
1212
ms.workload: identity
1313
ms.subservice: pim
14-
ms.date: 10/22/2019
14+
ms.date: 11/08/2019
1515
ms.author: curtand
1616
ms.custom: pim
1717
ms.collection: M365-identity-device-management

articles/active-directory/privileged-identity-management/pim-how-to-complete-review.md

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,17 +1,16 @@
11
---
2-
title: Complete an access review of Azure AD roles in PIM - Azure Active Directory | Microsoft Docs
2+
title: Finish access review of Azure AD roles in PIM - Azure AD | Microsoft Docs
33
description: Learn how to complete an access review of Azure AD roles in Azure AD Privileged Identity Management (PIM) and view the results
44
services: active-directory
55
documentationcenter: ''
66
author: curtand
7-
manager: mtillman
7+
manager: daveba
88
editor: ''
9-
109
ms.service: active-directory
1110
ms.topic: conceptual
1211
ms.workload: identity
1312
ms.subservice: pim
14-
ms.date: 10/22/2019
13+
ms.date: 11/08/2019
1514
ms.author: curtand
1615
ms.custom: pim
1716
ms.collection: M365-identity-device-management

articles/active-directory/privileged-identity-management/pim-how-to-configure-security-alerts.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,17 +1,17 @@
11
---
2-
title: Configure security alerts for Azure AD roles in PIM - Azure Active Directory | Microsoft Docs
3-
description: Learn how to configure security alerts for Azure AD roles in Azure AD Privileged Identity Management (PIM).
2+
title: Security alerts for Azure AD roles in PIM - Azure AD | Microsoft Docs
3+
description: Configure security alerts for Azure AD roles Privileged Identity Management in Azure Active Directory.
44
services: active-directory
55
documentationcenter: ''
66
author: curtand
7-
manager: mtillman
7+
manager: daveba
88
editor: ''
99

1010
ms.service: active-directory
1111
ms.topic: conceptual
1212
ms.workload: identity
1313
ms.subservice: pim
14-
ms.date: 10/22/2019
14+
ms.date: 11/08/2019
1515
ms.author: curtand
1616
ms.custom: pim
1717
ms.collection: M365-identity-device-management
@@ -52,12 +52,12 @@ This section lists all the security alerts for Azure AD roles, along with how to
5252
| **Prevention** | [Require MFA](pim-how-to-change-default-settings.md) for every role. |
5353
| **In-portal mitigation action** | Makes multi-factor authentication required for activation of the privileged role. |
5454

55-
### The tenant doesn't have Azure AD Premium P2
55+
### The organization doesn't have Azure AD Premium P2
5656

5757
| | |
5858
| --- | --- |
5959
| **Severity** | Low |
60-
| **Why do I get this alert?** | The current tenant does not have Azure AD Premium P2. |
60+
| **Why do I get this alert?** | The current Azure AD organization does not have Azure AD Premium P2. |
6161
| **How to fix?** | Review information about [Azure AD editions](../fundamentals/active-directory-whatis.md). Upgrade to Azure AD Premium P2. |
6262

6363
### Potential stale accounts in a privileged role

articles/active-directory/privileged-identity-management/pim-how-to-give-access-to-pim.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,17 +1,17 @@
11
---
2-
title: Grant access to other administrators to manage PIM - Azure Active Directory | Microsoft Docs
2+
title: Grant access to manage PIM - Azure Active Directory | Microsoft Docs
33
description: Learn how to grant access to other administrations to manage Azure AD Privileged Identity Management (PIM).
44
services: active-directory
55
documentationcenter: ''
66
author: curtand
7-
manager: mtillman
7+
manager: daveba
88
editor: ''
99

1010
ms.service: active-directory
1111
ms.topic: conceptual
1212
ms.workload: identity
1313
ms.subservice: pim
14-
ms.date: 10/22/2019
14+
ms.date: 11/08/2019
1515
ms.author: curtand
1616
ms.custom: pim
1717
ms.collection: M365-identity-device-management

0 commit comments

Comments
 (0)