Skip to content

Commit 4a7a701

Browse files
authored
Merge pull request #200203 from MicrosoftDocs/main
6/01 PM Publish
2 parents b49628b + 2f7179a commit 4a7a701

File tree

547 files changed

+1568
-1355
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

547 files changed

+1568
-1355
lines changed

.openpublishing.redirection.azure-monitor.json

Lines changed: 78 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,65 @@
11
{
22
"redirections": [
3+
{
4+
"source_path_from_root": "/articles/azure-monitor/app/profiler.md",
5+
"redirect_url": "/azure/azure-monitor/profiler/profiler",
6+
"redirect_document_id": false
7+
},
8+
{
9+
"source_path_from_root": "/articles/azure-monitor/app/profiler-aspnetcore-linux.md",
10+
"redirect_url": "/azure/azure-monitor/profiler/profiler-aspnetcore-linux",
11+
"redirect_document_id": false
12+
},
13+
{
14+
"source_path_from_root": "/articles/azure-monitor/app/profiler-azure-functions.md",
15+
"redirect_url": "/azure/azure-monitor/profiler/profiler-azure-functions",
16+
"redirect_document_id": false
17+
},
18+
{
19+
"source_path_from_root": "/articles/azure-monitor/app/profiler-bring-your-own-storage.md",
20+
"redirect_url": "/azure/azure-monitor/profiler/profiler-bring-your-own-storage",
21+
"redirect_document_id": false
22+
},
23+
{
24+
"source_path_from_root": "/articles/azure-monitor/app/profiler-cloudservice.md",
25+
"redirect_url": "/azure/azure-monitor/profiler/profiler-cloudservice",
26+
"redirect_document_id": false
27+
},
28+
{
29+
"source_path_from_root": "/articles/azure-monitor/app/profiler-containers.md",
30+
"redirect_url": "/azure/azure-monitor/profiler/profiler-containers",
31+
"redirect_document_id": false
32+
},
33+
{
34+
"source_path_from_root": "/articles/azure-monitor/app/profiler-overview.md",
35+
"redirect_url": "/azure/azure-monitor/profiler/profiler-overview",
36+
"redirect_document_id": false
37+
},
38+
{
39+
"source_path_from_root": "/articles/azure-monitor/app/profiler-servicefabric.md",
40+
"redirect_url": "/azure/azure-monitor/profiler/profiler-servicefabric",
41+
"redirect_document_id": false
42+
},
43+
{
44+
"source_path_from_root": "/articles/azure-monitor/app/profiler-settings.md",
45+
"redirect_url": "/azure/azure-monitor/profiler/profiler-settings",
46+
"redirect_document_id": false
47+
},
48+
{
49+
"source_path_from_root": "/articles/azure-monitor/app/profiler-trackrequests.md",
50+
"redirect_url": "/azure/azure-monitor/profiler/profiler-trackrequests",
51+
"redirect_document_id": false
52+
},
53+
{
54+
"source_path_from_root": "/articles/azure-monitor/app/profiler-troubleshooting.md",
55+
"redirect_url": "/azure/azure-monitor/profiler/profiler-troubleshooting",
56+
"redirect_document_id": false
57+
},
58+
{
59+
"source_path_from_root": "/articles/azure-monitor/app/profiler-vm.md",
60+
"redirect_url": "/azure/azure-monitor/profiler/profiler-vm",
61+
"redirect_document_id": false
62+
},
363
{
464
"source_path_from_root": "/articles/azure-monitor/app/app-insights-dashboards.md",
565
"redirect_url": "/azure/azure-monitor/app/overview-dashboard",
@@ -102,22 +162,37 @@
102162
},
103163
{
104164
"source_path_from_root": "/articles/azure-monitor/alerts/alerts-metric-overview.md" ,
105-
"redirect_url": "/azure/azure-monitor/alerts/alert-types.md",
165+
"redirect_url": "/azure/azure-monitor/alerts/alerts-types",
106166
"redirect_document_id": false
107167
},
108168
{
109169
"source_path_from_root": "/articles/azure-monitor/alerts/alerts-managing-alert-instances.md" ,
110170
"redirect_url": "/azure/azure-monitor/alerts/alerts-page.md",
111171
"redirect_document_id": false
112172
},
173+
{
174+
"source_path_from_root": "/articles/azure-monitor/alerts/alerts-managing-alert-states.md" ,
175+
"redirect_url": "/azure/azure-monitor/alerts/alerts-page",
176+
"redirect_document_id": false
177+
},
113178
{
114179
"source_path_from_root": "/articles/azure-monitor/alerts/alerts-unified-log.md" ,
115-
"redirect_url": "/azure/azure-monitor/alerts/alert-types.md",
180+
"redirect_url": "/azure/azure-monitor/alerts/alerts-types",
116181
"redirect_document_id": false
117182
},
118183
{
119184
"source_path_from_root": "/articles/azure-monitor/alerts/activity-log-alerts.md" ,
120-
"redirect_url": "/azure/azure-monitor/alerts/alert-types.md",
185+
"redirect_url": "/azure/azure-monitor/alerts/alerts-types",
186+
"redirect_document_id": false
187+
},
188+
{
189+
"source_path_from_root": "/articles/azure-monitor/alerts/alerts-smartgroups-overview.md" ,
190+
"redirect_url": "/azure/azure-monitor/alerts/alerts-types",
191+
"redirect_document_id": false
192+
},
193+
{
194+
"source_path_from_root": "/articles/azure-monitor/alerts/alerts-managing-smart-groups.md" ,
195+
"redirect_url": "/azure/azure-monitor/alerts/alerts-types",
121196
"redirect_document_id": false
122197
},
123198
{

.openpublishing.redirection.json

Lines changed: 18 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -43186,92 +43186,92 @@
4318643186
},
4318743187
{
4318843188
"source_path_from_root": "/articles/cognitive-services/video-indexer/connect-to-azure.md",
43189-
"redirect_url": "/azure/azure-video-analyzer/video-analyzer-for-media-docs/connect-to-azure",
43189+
"redirect_url": "/azure/azure-video-indexer/connect-to-azure",
4319043190
"redirect_document_id": false
4319143191
},
4319243192
{
4319343193
"source_path_from_root": "/articles/cognitive-services/video-indexer/manage-account-connected-to-azure.md",
43194-
"redirect_url": "/azure/azure-video-analyzer/video-analyzer-for-media-docs/manage-account-connected-to-azure",
43194+
"redirect_url": "/azure/azure-video-indexer/manage-account-connected-to-azure",
4319543195
"redirect_document_id": false
4319643196
},
4319743197
{
4319843198
"source_path_from_root": "/articles/cognitive-services/video-indexer/migrate-from-v1-to-v2.md",
43199-
"redirect_url": "/azure/azure-video-analyzer/video-analyzer-for-media-docs/",
43199+
"redirect_url": "/azure/azure-video-indexer/",
4320043200
"redirect_document_id": false
4320143201
},
4320243202
{
4320343203
"source_path_from_root": "/articles/cognitive-services/video-indexer/upload-index-videos.md",
43204-
"redirect_url": "/azure/azure-video-analyzer/video-analyzer-for-media-docs/upload-index-videos",
43204+
"redirect_url": "/azure/azure-video-indexer/upload-index-videos",
4320543205
"redirect_document_id": false
4320643206
},
4320743207
{
4320843208
"source_path_from_root": "/articles/cognitive-services/video-indexer/video-indexer-concepts.md",
43209-
"redirect_url": "/azure/azure-video-analyzer/video-analyzer-for-media-docs/video-indexer-overview",
43209+
"redirect_url": "/azure/azure-video-indexer/video-indexer-overview",
4321043210
"redirect_document_id": false
4321143211
},
4321243212
{
4321343213
"source_path_from_root": "/articles/cognitive-services/video-indexer/video-indexer-create-new.md",
43214-
"redirect_url": "/azure/azure-video-analyzer/video-analyzer-for-media-docs/",
43214+
"redirect_url": "/azure/azure-video-indexer/",
4321543215
"redirect_document_id": false
4321643216
},
4321743217
{
4321843218
"source_path_from_root": "/articles/cognitive-services/video-indexer/video-indexer-embed-widgets.md",
43219-
"redirect_url": "/azure/azure-video-analyzer/video-analyzer-for-media-docs/video-indexer-embed-widgets",
43219+
"redirect_url": "/azure/azure-video-indexer/video-indexer-embed-widgets",
4322043220
"redirect_document_id": false
4322143221
},
4322243222
{
4322343223
"source_path_from_root": "/articles/cognitive-services/video-indexer/video-indexer-get-started.md",
43224-
"redirect_url": "/azure/azure-video-analyzer/video-analyzer-for-media-docs/video-indexer-get-started",
43224+
"redirect_url": "/azure/azure-video-indexer/video-indexer-get-started",
4322543225
"redirect_document_id": false
4322643226
},
4322743227
{
4322843228
"source_path_from_root": "/articles/cognitive-services/video-indexer/video-indexer-output-json-v2.md",
43229-
"redirect_url": "/azure/azure-video-analyzer/video-analyzer-for-media-docs/video-indexer-output-json-v2",
43229+
"redirect_url": "/azure/azure-video-indexer/video-indexer-output-json-v2",
4323043230
"redirect_document_id": false
4323143231
},
4323243232
{
4323343233
"source_path_from_root": "/articles/cognitive-services/Video/GetStarted.md",
43234-
"redirect_url": "/azure/azure-video-analyzer/video-analyzer-for-media-docs/video-indexer-overview",
43234+
"redirect_url": "/azure/azure-video-indexer/video-indexer-overview",
4323543235
"redirect_document_id": false
4323643236
},
4323743237
{
4323843238
"source_path_from_root": "/articles/cognitive-services/Video/Glossary.md",
43239-
"redirect_url": "/azure/azure-video-analyzer/video-analyzer-for-media-docs/video-indexer-overview",
43239+
"redirect_url": "/azure/azure-video-indexer/video-indexer-overview",
4324043240
"redirect_document_id": false
4324143241
},
4324243242
{
4324343243
"source_path_from_root": "/articles/cognitive-services/Video/Home.md",
43244-
"redirect_url": "/azure/azure-video-analyzer/video-analyzer-for-media-docs/video-indexer-overview",
43244+
"redirect_url": "/azure/azure-video-indexer/video-indexer-overview",
4324543245
"redirect_document_id": false
4324643246
},
4324743247
{
4324843248
"source_path_from_root": "/articles/cognitive-services/Video/How-To/HowtoAnalyzeVideo_Video.md",
43249-
"redirect_url": "/azure/azure-video-analyzer/video-analyzer-for-media-docs/video-indexer-overview",
43249+
"redirect_url": "/azure/azure-video-indexer/video-indexer-overview",
4325043250
"redirect_document_id": false
4325143251
},
4325243252
{
4325343253
"source_path_from_root": "/articles/cognitive-services/Video/How-To/HowtoCallVideoAPIs.md",
43254-
"redirect_url": "/azure/azure-video-analyzer/video-analyzer-for-media-docs/video-indexer-overview",
43254+
"redirect_url": "/azure/azure-video-indexer/video-indexer-overview",
4325543255
"redirect_document_id": false
4325643256
},
4325743257
{
4325843258
"source_path_from_root": "/articles/cognitive-services/video-indexer/video-indexer-overview.md",
43259-
"redirect_url": "/azure/azure-video-analyzer/video-analyzer-for-media-docs/video-indexer-overview",
43259+
"redirect_url": "/azure/azure-video-indexer/video-indexer-overview",
4326043260
"redirect_document_id": false
4326143261
},
4326243262
{
4326343263
"source_path_from_root": "/articles/cognitive-services/video-indexer/video-indexer-search.md",
43264-
"redirect_url": "/azure/azure-video-analyzer/video-analyzer-for-media-docs/video-indexer-search",
43264+
"redirect_url": "/azure/azure-video-indexer/video-indexer-search",
4326543265
"redirect_document_id": false
4326643266
},
4326743267
{
4326843268
"source_path_from_root": "/articles/cognitive-services/video-indexer/video-indexer-use-apis.md",
43269-
"redirect_url": "/azure/azure-video-analyzer/video-analyzer-for-media-docs/video-indexer-use-apis",
43269+
"redirect_url": "/azure/azure-video-indexer/video-indexer-use-apis",
4327043270
"redirect_document_id": false
4327143271
},
4327243272
{
4327343273
"source_path_from_root": "/articles/cognitive-services/video-indexer/video-indexer-view-edit.md",
43274-
"redirect_url": "/azure/azure-video-analyzer/video-analyzer-for-media-docs/video-indexer-view-edit",
43274+
"redirect_url": "/azure/azure-video-indexer/video-indexer-view-edit",
4327543275
"redirect_document_id": false
4327643276
},
4327743277
{

articles/active-directory/authentication/howto-mfa-userstates.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: multi-factor-authentication
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: how-to
9-
ms.date: 07/22/2021
9+
ms.date: 06/01/2022
1010

1111
ms.author: justinha
1212
author: justinha
@@ -54,9 +54,9 @@ All users start out *Disabled*. When you enroll users in per-user Azure AD Multi
5454
To view and manage user states, complete the following steps to access the Azure portal page:
5555

5656
1. Sign in to the [Azure portal](https://portal.azure.com) as a Global administrator.
57-
1. Search for and select *Azure Active Directory*, then select **Users** > **All users**.
58-
1. Select **Per-user MFA**. You may need to scroll to the right to see this menu option. Select the example screenshot below to see the full Azure portal window and menu location:
59-
[![Select Multi-Factor Authentication from the Users window in Azure AD.](media/howto-mfa-userstates/selectmfa-cropped.png)](media/howto-mfa-userstates/selectmfa.png#lightbox)
57+
1. Search for and select **Azure Active Directory**, then select **Users** > **All users**.
58+
1. Select **Per-user MFA**.
59+
:::image type="content" border="true" source="media/howto-mfa-userstates/selectmfa-cropped.png" alt-text="Screenshot of select Multi-Factor Authentication from the Users window in Azure AD.":::
6060
1. A new page opens that displays the user state, as shown in the following example.
6161
![Screenshot that shows example user state information for Azure AD Multi-Factor Authentication](./media/howto-mfa-userstates/userstate1.png)
6262

9.19 KB
Loading

articles/active-directory/conditional-access/block-legacy-authentication.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ manager: karenhoran
1111
ms.reviewer: calebb, dawoo, jebeckha, grtaylor
1212
ms.collection: M365-identity-device-management
1313
---
14-
# How to: Block legacy authentication to Azure AD with Conditional Access
14+
# How to: Block legacy authentication access to Azure AD with Conditional Access
1515

1616
To give your users easy access to your cloud apps, Azure Active Directory (Azure AD) supports a broad variety of authentication protocols including legacy authentication. However, legacy authentication doesn't support multifactor authentication (MFA). MFA is in many environments a common requirement to address identity theft.
1717

articles/active-directory/conditional-access/concept-condition-filters-for-devices.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -145,7 +145,8 @@ The filter for devices condition in Conditional Access evaluates policy based on
145145

146146
## Next steps
147147

148+
- [Back to school – Using Boolean algebra correctly in complex filters](https://techcommunity.microsoft.com/t5/intune-customer-success/back-to-school-using-boolean-algebra-correctly-in-complex/ba-p/3422765)
148149
- [Update device Graph API](/graph/api/device-update?tabs=http)
149150
- [Conditional Access: Conditions](concept-conditional-access-conditions.md)
150151
- [Common Conditional Access policies](concept-conditional-access-policy-common.md)
151-
- [Securing devices as part of the privileged access story](/security/compass/privileged-access-devices)
152+
- [Securing devices as part of the privileged access story](/security/compass/privileged-access-devices)

articles/active-directory/conditional-access/concept-conditional-access-users-groups.md

Lines changed: 9 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: conditional-access
88
ms.topic: conceptual
9-
ms.date: 03/17/2021
9+
ms.date: 06/01/2022
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -35,7 +35,7 @@ The following options are available to include when creating a Conditional Acces
3535
- All guest and external users
3636
- This selection includes any B2B guests and external users including any user with the `user type` attribute set to `guest`. This selection also applies to any external user signed-in from a different organization like a Cloud Solution Provider (CSP).
3737
- Directory roles
38-
- Allows administrators to select specific built-in Azure AD directory roles used to determine policy assignment. For example, organizations may create a more restrictive policy on users assigned the global administrator role. Other role types are not supported, including administrative unit-scoped roles and custom roles.
38+
- Allows administrators to select specific built-in Azure AD directory roles used to determine policy assignment. For example, organizations may create a more restrictive policy on users assigned the global administrator role. Other role types aren't supported, including administrative unit-scoped roles and custom roles.
3939
- Users and groups
4040
- Allows targeting of specific sets of users. For example, organizations can select a group that contains all members of the HR department when an HR app is selected as the cloud app. A group can be any type of user group in Azure AD, including dynamic or assigned security and distribution groups. Policy will be applied to nested users and groups.
4141

@@ -50,7 +50,7 @@ The following options are available to include when creating a Conditional Acces
5050
5151
## Exclude users
5252

53-
When organizations both include and exclude a user or group the user or group is excluded from the policy, as an exclude action overrides an include in policy. Exclusions are commonly used for emergency access or break-glass accounts. More information about emergency access accounts and why they are important can be found in the following articles:
53+
When organizations both include and exclude a user or group the user or group is excluded from the policy, as an exclude action overrides an include in policy. Exclusions are commonly used for emergency access or break-glass accounts. More information about emergency access accounts and why they're important can be found in the following articles:
5454

5555
* [Manage emergency access accounts in Azure AD](../roles/security-emergency-access.md)
5656
* [Create a resilient access control management strategy with Azure Active Directory](../authentication/concept-resilient-controls.md)
@@ -66,15 +66,19 @@ The following options are available to exclude when creating a Conditional Acces
6666

6767
### Preventing administrator lockout
6868

69-
To prevent an administrator from locking themselves out of their directory when creating a policy applied to **All users** and **All apps**, they will see the following warning.
69+
To prevent an administrator from locking themselves out of their directory when creating a policy applied to **All users** and **All apps**, they'll see the following warning.
7070

7171
> Don't lock yourself out! We recommend applying a policy to a small set of users first to verify it behaves as expected. We also recommend excluding at least one administrator from this policy. This ensures that you still have access and can update a policy if a change is required. Please review the affected users and apps.
7272
7373
By default the policy will provide an option to exclude the current user from the policy, but this default can be overridden by the administrator as shown in the following image.
7474

7575
![Warning, don't lock yourself out!](./media/concept-conditional-access-users-groups/conditional-access-users-and-groups-lockout-warning.png)
7676

77-
If you do find yourself locked out, see [What to do if you are locked out of the Azure portal?](troubleshoot-conditional-access.md#what-to-do-if-youre-locked-out-of-the-azure-portal)
77+
If you do find yourself locked out, see [What to do if you're locked out of the Azure portal?](troubleshoot-conditional-access.md#what-to-do-if-youre-locked-out-of-the-azure-portal)
78+
79+
### External partner access
80+
81+
Conditional Access policies that target external users may interfere with service provider access, for example granular delegated admin privileges [Introduction to granular delegated admin privileges (GDAP)](/partner-center/gdap-introduction).
7882

7983
## Next steps
8084

articles/active-directory/develop/access-tokens.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,5 @@
11
---
2-
title: Microsoft identity platform access tokens | Azure
3-
titleSuffix: Microsoft identity platform
2+
title: Microsoft identity platform access tokens
43
description: Learn about access tokens emitted by the Azure AD v1.0 and Microsoft identity platform (v2.0) endpoints.
54
services: active-directory
65
author: nickludwig

articles/active-directory/develop/accounts-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Microsoft identity platform accounts & tenant profiles on Android | Azure
2+
title: Microsoft identity platform accounts & tenant profiles on Android
33
description: An overview of the Microsoft identity platform accounts for Android
44
services: active-directory
55
author: shoatman

articles/active-directory/develop/active-directory-certificate-credentials.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,5 @@
11
---
22
title: Microsoft identity platform certificate credentials
3-
titleSuffix: Microsoft identity platform
43
description: This article discusses the registration and use of certificate credentials for application authentication.
54
services: active-directory
65
author: nickludwig

0 commit comments

Comments
 (0)