Skip to content

Commit 4d6b9b2

Browse files
authored
Merge branch 'MicrosoftDocs:main' into v1-migration
2 parents 68423fa + 17ac51b commit 4d6b9b2

File tree

188 files changed

+1651
-1865
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

188 files changed

+1651
-1865
lines changed

.openpublishing.redirection.json

Lines changed: 110 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -22783,6 +22783,116 @@
2278322783
"source_path_from_root": "/articles/sentinel/data-connectors/threat-intelligence-upload-indicators-api.md",
2278422784
"redirect_url": "/azure/sentinel/data-connectors-reference",
2278522785
"redirect_document_id": false
22786+
},
22787+
{
22788+
"source_path_from_root": "/articles/networking/scripts/virtual-network-powershell-sample-peer-two-virtual-networks.md",
22789+
"redirect_url": "/azure/virtual-network/tutorial-connect-virtual-networks-powershell",
22790+
"redirect_document_id": false
22791+
},
22792+
{
22793+
"source_path_from_root": "/articles/networking/scripts/virtual-network-powershell-filter-network-traffic.md",
22794+
"redirect_url": "/azure/virtual-network/tutorial-filter-network-traffic",
22795+
"redirect_document_id": false
22796+
},
22797+
{
22798+
"source_path_from_root": "/articles/networking/powershell-samples.md",
22799+
"redirect_url": "/azure/networking/fundamentals/networking-overview",
22800+
"redirect_document_id": false
22801+
},
22802+
{
22803+
"source_path_from_root": "/articles/networking/scripts/virtual-network-filter-network-traffic.md",
22804+
"redirect_url": "/azure/virtual-network/tutorial-filter-network-traffic",
22805+
"redirect_document_id": false
22806+
},
22807+
{
22808+
"source_path_from_root": "/articles/virtual-network/scripts/virtual-network-powershell-sample-filter-network-traffic.md",
22809+
"redirect_url": "/azure/virtual-network/tutorial-filter-network-traffic",
22810+
"redirect_document_id": false
22811+
},
22812+
{
22813+
"source_path_from_root": "/articles/networking/scripts/virtual-network-powershell-sample-route-traffic-through-nva.md",
22814+
"redirect_url": "/azure/virtual-network/tutorial-create-route-table-portal",
22815+
"redirect_document_id": false
22816+
},
22817+
{
22818+
"source_path_from_root": "/articles/virtual-network/scripts/virtual-network-powershell-sample-route-traffic-through-nva.md",
22819+
"redirect_url": "/azure/virtual-network/tutorial-create-route-table-portal",
22820+
"redirect_document_id": false
22821+
},
22822+
{
22823+
"source_path_from_root": "/articles/networking/cli-samples.md",
22824+
"redirect_url": "/azure/networking/fundamentals/networking-overview",
22825+
"redirect_document_id": false
22826+
},
22827+
{
22828+
"source_path_from_root": "/articles/virtual-network/powershell-samples.md",
22829+
"redirect_url": "/azure/networking/fundamentals/networking-overview",
22830+
"redirect_document_id": false
22831+
},
22832+
{
22833+
"source_path_from_root": "/articles/virtual-network/cli-samples.md",
22834+
"redirect_url": "/azure/networking/fundamentals/networking-overview",
22835+
"redirect_document_id": false
22836+
},
22837+
{
22838+
"source_path_from_root": "/articles/networking/scripts/virtual-network-cli-sample-peer-two-virtual-networks.md",
22839+
"redirect_url": "/azure/virtual-network/tutorial-connect-virtual-networks-cli",
22840+
"redirect_document_id": false
22841+
},
22842+
{
22843+
"source_path_from_root": "/articles/virtual-network/scripts/virtual-network-powershell-sample-ipv6-dual-stack-standard-load-balancer.md",
22844+
"redirect_url": "/azure/load-balancer/virtual-network-ipv4-ipv6-dual-stack-standard-load-balancer-powershell",
22845+
"redirect_document_id": false
22846+
},
22847+
{
22848+
"source_path_from_root": "/articles/virtual-network/scripts/virtual-network-cli-sample-ipv6-dual-stack-standard-load-balancer.md",
22849+
"redirect_url": "/azure/load-balancer/virtual-network-ipv4-ipv6-dual-stack-standard-load-balancer-cli",
22850+
"redirect_document_id": false
22851+
},
22852+
{
22853+
"source_path_from_root": "/articles/networking/scripts/virtual-network-cli-sample-route-traffic-through-nva.md",
22854+
"redirect_url": "/azure/virtual-network/tutorial-create-route-table-portal",
22855+
"redirect_document_id": false
22856+
},
22857+
{
22858+
"source_path_from_root": "/articles/virtual-network/scripts/virtual-network-cli-sample-ipv6-dual-stack.md",
22859+
"redirect_url": "/azure/load-balancer/virtual-network-ipv4-ipv6-dual-stack-standard-load-balancer-cli",
22860+
"redirect_document_id": false
22861+
},
22862+
{
22863+
"source_path_from_root": "/articles/networking/scripts/virtual-network-cli-sample-multi-tier-application.md",
22864+
"redirect_url": "/architecture/example-scenario/infrastructure/multi-tier-app-disaster-recovery",
22865+
"redirect_document_id": false
22866+
},
22867+
{
22868+
"source_path_from_root": "/articles/networking/scripts/virtual-network-powershell-sample-multi-tier-application.md",
22869+
"redirect_url": "/architecture/example-scenario/infrastructure/multi-tier-app-disaster-recovery",
22870+
"redirect_document_id": false
22871+
},
22872+
{
22873+
"source_path_from_root": "/articles/virtual-network/scripts/virtual-network-powershell-sample-ipv6-dual-stack.md",
22874+
"redirect_url": "/azure/load-balancer/virtual-network-ipv4-ipv6-dual-stack-standard-load-balancer-powershell",
22875+
"redirect_document_id": false
22876+
},
22877+
{
22878+
"source_path_from_root": "/articles/virtual-network/scripts/virtual-network-cli-sample-filter-network-traffic.md",
22879+
"redirect_url": "/azure/virtual-network/tutorial-filter-network-traffic",
22880+
"redirect_document_id": false
22881+
},
22882+
{
22883+
"source_path_from_root": "/articles/virtual-network/scripts/virtual-network-cli-sample-route-traffic-through-nva.md",
22884+
"redirect_url": "/azure/virtual-network/tutorial-create-route-table-portal",
22885+
"redirect_document_id": false
22886+
},
22887+
{
22888+
"source_path_from_root": "/articles/virtual-network/scripts/virtual-network-cli-sample-multi-tier-application.md",
22889+
"redirect_url": "/architecture/example-scenario/infrastructure/multi-tier-app-disaster-recovery",
22890+
"redirect_document_id": false
22891+
},
22892+
{
22893+
"source_path_from_root": "/articles/active-directory/authentication/how-to-migrate-mfa-server-to-azure-mfa-with-federation.md",
22894+
"redirect_url": "/azure/active-directory/authentication/how-to-migrate-mfa-server-to-mfa-with-federation",
22895+
"redirect_document_id": true
2278622896
}
2278722897
]
2278822898
}

articles/active-directory/authentication/TOC.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -255,7 +255,7 @@
255255
- name: Migrate to Azure MFA and user authentication
256256
href: how-to-migrate-mfa-server-to-mfa-user-authentication.md
257257
- name: Migrate to Azure MFA with Federation
258-
href: how-to-migrate-mfa-server-to-azure-mfa-with-federation.md
258+
href: how-to-migrate-mfa-server-to-mfa-with-federation.md
259259
- name: Migration Utility
260260
href: how-to-mfa-server-migration-utility.md
261261
- name: Deploy MFA on-premises

articles/active-directory/authentication/how-to-migrate-mfa-server-to-azure-mfa.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ ms.collection: M365-identity-device-management
1717
---
1818
# Migrate from MFA Server to Azure AD Multi-Factor Authentication
1919

20-
Multifactor authentication (MFA) is important to securing your infrastructure and assets from bad actors. Azure AD Multi-Factor Authentication Server (MFA Server) isnt available for new deployments and will be deprecated. Customers who are using MFA Server should move to using cloud-based Azure Active Directory (Azure AD) Multi-Factor Authentication.
20+
Multifactor authentication (MFA) is important to securing your infrastructure and assets from bad actors. Azure AD Multi-Factor Authentication Server (MFA Server) isn't available for new deployments and will be deprecated. Customers who are using MFA Server should move to using cloud-based Azure Active Directory (Azure AD) Multi-Factor Authentication.
2121

2222
In this article, we assume that you have a hybrid environment where:
2323

@@ -31,13 +31,13 @@ There are multiple possible end states to your migration, depending on your goal
3131

3232
| <br> | Goal: Decommission MFA Server ONLY | Goal: Decommission MFA Server and move to Azure AD Authentication | Goal: Decommission MFA Server and AD FS |
3333
|------|------------------------------------|-------------------------------------------------------------------|-----------------------------------------|
34-
|MFA provider | Change MFA provider from MFA Server to Azure AD Multi-Factor Authentication. | Change MFA provider from MFA Server to Azure AD Multi-Factor Authentication. | Change MFA provider from MFA Server to Azure AD Multi-Factor Authentication. |
34+
|MFA provider | Change MFA provider from MFA Server to Azure AD Multi-Factor Authentication. | Change MFA provider from MFA Server to Azure AD Multi-Factor Authentication. | Change MFA provider from MFA Server to Azure AD Multi-Factor Authentication. |
3535
|User authentication |Continue to use federation for Azure AD authentication. | Move to Azure AD with Password Hash Synchronization (preferred) or Passthrough Authentication **and** Seamless single sign-on (SSO).| Move to Azure AD with Password Hash Synchronization (preferred) or Passthrough Authentication **and** SSO. |
3636
|Application authentication | Continue to use AD FS authentication for your applications. | Continue to use AD FS authentication for your applications. | Move apps to Azure AD before migrating to Azure AD Multi-Factor Authentication. |
3737

3838
If you can, move both your multifactor authentication and your user authentication to Azure. For step-by-step guidance, see [Moving to Azure AD Multi-Factor Authentication and Azure AD user authentication](how-to-migrate-mfa-server-to-mfa-user-authentication.md).
3939

40-
If you cant move your user authentication, see the step-by-step guidance for [Moving to Azure AD Multi-Factor Authentication with federation](how-to-migrate-mfa-server-to-azure-mfa-with-federation.md).
40+
If you can't move your user authentication, see the step-by-step guidance for [Moving to Azure AD Multi-Factor Authentication with federation](how-to-migrate-mfa-server-to-mfa-with-federation.md).
4141

4242
## Prerequisites
4343

@@ -51,7 +51,7 @@ If you can’t move your user authentication, see the step-by-step guidance for
5151
## Considerations for all migration paths
5252

5353
Migrating from MFA Server to Azure AD Multi-Factor Authentication involves more than just moving the registered MFA phone numbers.
54-
Microsofts MFA server can be integrated with many systems, and you must evaluate how these systems are using MFA Server to understand the best ways to integrate with Azure AD Multi-Factor Authentication.
54+
Microsoft's MFA server can be integrated with many systems, and you must evaluate how these systems are using MFA Server to understand the best ways to integrate with Azure AD Multi-Factor Authentication.
5555

5656
### Migrating MFA user information
5757

@@ -157,7 +157,7 @@ Others might include:
157157

158158
## Next steps
159159

160-
- [Moving to Azure AD Multi-Factor Authentication with federation](how-to-migrate-mfa-server-to-azure-mfa-with-federation.md)
160+
- [Moving to Azure AD Multi-Factor Authentication with federation](how-to-migrate-mfa-server-to-mfa-with-federation.md)
161161
- [Moving to Azure AD Multi-Factor Authentication and Azure AD user authentication](how-to-migrate-mfa-server-to-mfa-user-authentication.md)
162162
- [How to use the MFA Server Migration Utility](how-to-mfa-server-migration-utility.md)
163163

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ To migrate to Azure AD MFA with federation, the Azure AD MFA authentication prov
1919

2020
The following diagram shows the migration process.
2121

22-
![Flow chart of the migration process. Process areas and headings in this document are in the same order](./media/how-to-migrate-mfa-server-to-azure-mfa-with-federation/mfa-federation-flow.png)
22+
![Flow chart of the migration process. Process areas and headings in this document are in the same order](./media/how-to-migrate-mfa-server-to-mfa-with-federation/mfa-federation-flow.png)
2323

2424
## Create migration groups
2525

@@ -300,7 +300,7 @@ In Usage & insights, select **Authentication methods**.
300300

301301
Detailed Azure AD MFA registration information can be found on the Registration tab. You can drill down to view a list of registered users by selecting the **Users capable of Azure multi-factor authentication** hyperlink.
302302

303-
![Image of Authentication methods activity screen showing user registrations to MFA](./media/how-to-migrate-mfa-server-to-azure-mfa-with-federation/authentication-methods.png)
303+
![Image of Authentication methods activity screen showing user registrations to MFA](./media/how-to-migrate-mfa-server-to-mfa-with-federation/authentication-methods.png)
304304

305305
## Cleanup steps
306306

articles/active-directory/authentication/howto-mfa-mfasettings.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: multi-factor-authentication
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: how-to
9-
ms.date: 05/17/2023
9+
ms.date: 05/30/2023
1010

1111
ms.author: justinha
1212
author: justinha
@@ -78,14 +78,14 @@ To unblock a user, complete the following steps:
7878

7979
## Report suspicious activity
8080

81-
A preview of **Report Suspicious Activity**, the updated MFA **Fraud Alert** feature, is now available. When an unknown and suspicious MFA prompt is received, users can report the fraud attempt by using Microsoft Authenticator or through their phone. These alerts are integrated with [Identity Protection](../identity-protection/overview-identity-protection.md) for more comprehensive coverage and capability.
81+
**Report suspicious activity**, the updated **MFA Fraud Alert** feature, is now available. When an unknown and suspicious MFA prompt is received, users can report the fraud attempt by using Microsoft Authenticator or through their phone. These alerts are integrated with [Identity Protection](../identity-protection/overview-identity-protection.md) for more comprehensive coverage and capability.
8282

8383
Users who report an MFA prompt as suspicious are set to **High User Risk**. Administrators can use risk-based policies to limit access for these users, or enable self-service password reset (SSPR) for users to remediate problems on their own. If you previously used the **Fraud Alert** automatic blocking feature and don't have an Azure AD P2 license for risk-based policies, you can use risk detection events to identify and disable impacted users and automatically prevent their sign-in. For more information about using risk-based policies, see [Risk-based access policies](../identity-protection/concept-identity-protection-policies.md).
8484

85-
To enable **Report Suspicious Activity** from the Authentication Methods Settings:
85+
To enable **Report suspicious activity** from the Authentication Methods Settings:
8686

8787
1. In the Azure portal, click **Azure Active Directory** > **Security** > **Authentication Methods** > **Settings**.
88-
1. Set **Report Suspicious Activity** to **Enabled**.
88+
1. Set **Report suspicious activity** to **Enabled**.
8989
1. Select **All users** or a specific group.
9090

9191
### View suspicious activity events
@@ -104,9 +104,9 @@ Once a user has reported a prompt as suspicious, the risk should be investigated
104104

105105
### Report suspicious activity and fraud alert
106106

107-
**Report Suspicious Activity** and the legacy **Fraud Alert** implementation can operate in parallel. You can keep your tenant-wide **Fraud Alert** functionality in place while you start to use **Report Suspicious Activity** with a targeted test group.
107+
**Report suspicious activity** and the legacy **Fraud Alert** implementation can operate in parallel. You can keep your tenant-wide **Fraud Alert** functionality in place while you start to use **Report suspicious activity** with a targeted test group.
108108

109-
If **Fraud Alert** is enabled with Automatic Blocking, and **Report Suspicious Activity** is enabled, the user will be added to the blocklist and set as high-risk and in-scope for any other policies configured. These users will need to be removed from the blocklist and have their risk remediated to enable them to sign in with MFA.
109+
If **Fraud Alert** is enabled with Automatic Blocking, and **Report suspicious activity** is enabled, the user will be added to the blocklist and set as high-risk and in-scope for any other policies configured. These users will need to be removed from the blocklist and have their risk remediated to enable them to sign in with MFA.
110110

111111
## Notifications
112112

articles/active-directory/develop/TOC.yml

Lines changed: 1 addition & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -524,10 +524,6 @@
524524
href: test-automate-integration-testing.md
525525
- name: Throttling and service limits
526526
href: test-throttle-service-limits.md
527-
- name: Call and test a web API using Postman
528-
href: howto-call-a-web-api-with-postman.md
529-
- name: Call and test a web API using cURL
530-
href: howto-call-a-web-api-with-curl.md
531527
- name: Create a service principal using the Azure portal
532528
href: howto-create-service-principal-portal.md
533529
- name: Create a service principal using Azure PowerShell
@@ -883,4 +879,4 @@
883879
- name: "Blog: Azure AD - Identity"
884880
href: https://techcommunity.microsoft.com/t5/azure-active-directory-identity/bg-p/Identity
885881
- name: Azure roadmap - security and identity
886-
href: https://azure.microsoft.com/roadmap/?category=security-identity
882+
href: https://azure.microsoft.com/roadmap/?category=security-identity

0 commit comments

Comments
 (0)