Skip to content

Commit 5526e07

Browse files
authored
Merge pull request #220327 from MicrosoftDocs/main
Publish to live, Sunday 4 PM PST, 12/4
2 parents 6d63b28 + 32d79d0 commit 5526e07

File tree

62 files changed

+176
-142
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

62 files changed

+176
-142
lines changed

articles/active-directory/fundamentals/users-default-permissions.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -54,7 +54,6 @@ You can restrict default permissions for member users in the following ways:
5454
| Permission | Setting explanation |
5555
| ---------- | ------------ |
5656
| **Register applications** | Setting this option to **No** prevents users from creating application registrations. You can then grant the ability back to specific individuals, by adding them to the application developer role. |
57-
| **Create tenants** | By default all of your users can create new tenants. If you set this option to **No**, you prevent users from creating new Azure AD or Azure AD B2C tenants. You can grant the ability back to specific individuals by adding them to tenant creator role. |
5857
| **Allow users to connect work or school account with LinkedIn** | Setting this option to **No** prevents users from connecting their work or school account with their LinkedIn account. For more information, see [LinkedIn account connections data sharing and consent](../enterprise-users/linkedin-user-consent.md). |
5958
| **Create security groups** | Setting this option to **No** prevents users from creating security groups. Global administrators and user administrators can still create security groups. To learn how, see [Azure Active Directory cmdlets for configuring group settings](../enterprise-users/groups-settings-cmdlets.md). |
6059
| **Create Microsoft 365 groups** | Setting this option to **No** prevents users from creating Microsoft 365 groups. Setting this option to **Some** allows a set of users to create Microsoft 365 groups. Global administrators and user administrators can still create Microsoft 365 groups. To learn how, see [Azure Active Directory cmdlets for configuring group settings](../enterprise-users/groups-settings-cmdlets.md). |

articles/active-directory/governance/lifecycle-workflow-extensibility.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ manager: amycolannino
77
ms.service: active-directory
88
ms.workload: identity
99
ms.topic: conceptual
10-
ms.date: 07/06/2022
10+
ms.date: 04/12/2022
1111
ms.custom: template-concept
1212
---
1313

@@ -37,8 +37,8 @@ When creating custom task extensions, the scenarios for how it will interact wit
3737

3838
:::image type="content" source="media/lifecycle-workflow-extensibility/task-extension-deployment-scenarios.png" alt-text="Screenshot of custom task deployment scenarios.":::
3939

40-
- **Launch and complete**- The Azure Logic App is started, and the following task execution immediately continues with no response expected from the Azure Logic App. This scenario is best suited if the Lifecycle workflow doesn't require any feedback (including status) from the Azure Logic App. With this scenario, as long as the workflow is started successfully, the workflow is viewed as a success.
41-
- **Launch and wait**- The Azure Logic App is started, and the following task's execution waits on the response from the Logic App. You enter a time duration for how long the custom task extension should wait for a response from the Azure Logic App. If no response is received within a customer defined duration window, the task will be considered failed.
40+
- **Launch and continue** - The Azure Logic App is started, and the following task execution immediately continues with no response expected from the Azure Logic App. This scenario is best suited if the Lifecycle workflow doesn't require any feedback (including status) from the Azure Logic App. With this scenario, as long as the workflow is started successfully, the workflow is viewed as a success.
41+
- **Launch and wait** - The Azure Logic App is started, and the following task's execution waits on the response from the Logic App. You enter a time duration for how long the custom task extension should wait for a response from the Azure Logic App. If no response is received within a customer defined duration window, the task will be considered failed.
4242
:::image type="content" source="media/lifecycle-workflow-extensibility/custom-task-launch-wait.png" alt-text="Screenshot of custom task launch and wait task choice.":::
4343

4444
## Custom task extension integration with Azure Logic Apps high-level steps
@@ -72,4 +72,4 @@ For a guide on supplying this information to a custom task extension via Microso
7272

7373
- [customTaskExtension resource type](/graph/api/resources/identitygovernance-customtaskextension?view=graph-rest-beta&preserve-view=true)
7474
- [Trigger Logic Apps based on custom task extensions (Preview)](trigger-custom-task.md)
75-
- [Configure a Logic App for Lifecycle Workflow use (Preview)](configure-logic-app-lifecycle-workflows.md)
75+
- [Configure a Logic App for Lifecycle Workflow use (Preview)](configure-logic-app-lifecycle-workflows.md)

articles/azure-arc/vmware-vsphere/day2-operations-resource-bridge.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -57,11 +57,11 @@ To upgrade to the latest version of the resource bridge, perform the following s
5757
5858
6. Once the onboarding is successfully completed, the resource bridge is upgraded to the latest version.
5959
60-
## Updating the vSphere account credentials
60+
## Updating the vSphere account credentials (using a new password or a new vSphere account after onboarding)
6161
6262
Azure Arc-enabled VMware vSphere uses the vSphere account credentials you provided during the onboarding to communicate with your vCenter server. These credentials are only persisted locally on the Arc resource bridge VM.
6363
64-
As part of your security practices, you might need to rotate credentials for your vCenter accounts. As credentials are rotated, you must also update the credentials provided to Azure Arc to ensure the functioning of Azure Arc-enabled VMware services.
64+
As part of your security practices, you might need to rotate credentials for your vCenter accounts. As credentials are rotated, you must also update the credentials provided to Azure Arc to ensure the functioning of Azure Arc-enabled VMware services. You can also use the same steps in case you need to use a different vSphere account after onboarding. You must ensure the new account also has all the [required vSphere permissions](support-matrix-for-arc-enabled-vmware-vsphere.md#required-vsphere-account-privileges).
6565
6666
There are two different sets of credentials stored on the Arc resource bridge. You can use the same account credentials for both.
6767

articles/azure-functions/functions-reference-powershell.md

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -390,16 +390,15 @@ The following table shows the PowerShell versions available to each major versio
390390

391391
| Functions version | PowerShell version | .NET version |
392392
|-------------------|--------------------------------------------------|---------------|
393-
| 4.x (recommended) | PowerShell 7.2 (recommended) <br/>PowerShell 7 | .NET 6 |
394-
| 3.x | PowerShell 7 | .NET Core 3.1 |
393+
| 4.x (recommended) | PowerShell 7.2 (recommended) | .NET 6 |
395394

396395
You can see the current version by printing `$PSVersionTable` from any function.
397396

398397
To learn more about Azure Functions runtime support policy, please refer to this [article](./language-support-policy.md)
399398

400399
### Running local on a specific version
401400

402-
Support for PowerShell 7.0 in Azure Functions is ending on 3 December 2022. To use PowerShell 7.2 when running locally, you need to add the setting `"FUNCTIONS_WORKER_RUNTIME_VERSION" : "7.2"` to the `Values` array in the local.setting.json file in the project root. When running locally on PowerShell 7.2, your local.settings.json file looks like the following example:
401+
Support for PowerShell 7.0 in Azure Functions ended on 3 December 2022. To use PowerShell 7.2 when running locally, you need to add the setting `"FUNCTIONS_WORKER_RUNTIME_VERSION" : "7.2"` to the `Values` array in the local.setting.json file in the project root. When running locally on PowerShell 7.2, your local.settings.json file looks like the following example:
403402

404403
```json
405404
{
@@ -414,7 +413,7 @@ Support for PowerShell 7.0 in Azure Functions is ending on 3 December 2022. To u
414413

415414
### Changing the PowerShell version
416415

417-
Support for PowerShell 7.0 in Azure Functions is ending on 3 December 2022. Your function app must be running on version 4.x to be able to upgrade to PowerShell 7.2. To learn how to do this, see [View and update the current runtime version](set-runtime-version.md#view-and-update-the-current-runtime-version).
416+
Support for PowerShell 7.0 in Azure Functions ended on 3 December 2022. Your function app must be running on version 4.x to be able to upgrade to PowerShell 7.2. To learn how to do this, see [View and update the current runtime version](set-runtime-version.md#view-and-update-the-current-runtime-version).
418417

419418

420419
Use the following steps to change the PowerShell version used by your function app. You can do this either in the Azure portal or by using PowerShell.

articles/azure-monitor/agents/azure-monitor-agent-data-collection-endpoint.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ Azure Monitor Agent supports [Azure virtual network service tags](../../virtual-
2323
|------|------|------|---------|--------|--------|------|
2424
| Azure Commercial |global.handler.control.monitor.azure.com |Access control service|Port 443 |Outbound|Yes | - |
2525
| Azure Commercial |`<virtual-machine-region-name>`.handler.control.monitor.azure.com |Fetch data collection rules for specific machine |Port 443 |Outbound|Yes | westus2.handler.control.monitor.azure.com |
26-
| Azure Commercial |`<log-analytics-workspace-id>`.ods.opinsights.azure.com |Ingest logs data |Port 443 |Outbound|Yes | 1234a123-aa1a-123a-aaa1-a1a345aa6789.ods.opsinsights.azure.com
26+
| Azure Commercial |`<log-analytics-workspace-id>`.ods.opinsights.azure.com |Ingest logs data |Port 443 |Outbound|Yes | 1234a123-aa1a-123a-aaa1-a1a345aa6789.ods.opinsights.azure.com
2727
| Azure Commercial | management.azure.com | Only needed if sending time series data (metrics) to Azure Monitor [Custom metrics](../essentials/metrics-custom-overview.md) database | Port 443 | Outbound | Yes | - |
2828
| Azure Commercial | `<virtual-machine-region-name>`.monitoring.azure.com | Only needed if sending time series data (metrics) to Azure Monitor [Custom metrics](../essentials/metrics-custom-overview.md) database | Port 443 | Outbound | Yes | westus2.monitoring.azure.com |
2929
| Azure Government | Replace '.com' above with '.us' | Same as above | Same as above | Same as above| Same as above |

articles/bastion/connect-native-client-windows.md

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -53,6 +53,12 @@ Before you begin, verify that you have the following prerequisites:
5353
* [Configure your Windows VM to be Azure AD-joined](../active-directory/devices/concept-azure-ad-join.md).
5454
* [Configure your Windows VM to be hybrid Azure AD-joined](../active-directory/devices/concept-azure-ad-join-hybrid.md).
5555

56+
57+
## <a name="secure "></a>Secure your native client connection
58+
You can limit port access by only providing access to port 22/3389. To restrict port access, you must deploy the following NSG rules on your AzureBastionSubnet to allow access to select ports and deny access from any other ports.
59+
![image](https://user-images.githubusercontent.com/91911522/205508594-a2ef2ae3-256e-44f8-84ed-4aba0eb3af1c.png)
60+
61+
5662
## <a name="configure"></a>Configure the native client support feature
5763

5864
You can configure this feature by either modifying an existing Bastion deployment, or you can deploy Bastion with the feature configuration already specified.

articles/defender-for-cloud/defender-for-cloud-introduction.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -95,7 +95,7 @@ Learn more about connecting your [AWS](quickstart-onboard-aws.md) and [GCP](quic
9595

9696
Defender for Cloud includes vulnerability assessment solutions for your virtual machines, container registries, and SQL servers as part of the enhanced security features. Some of the scanners are powered by Qualys. But you don't need a Qualys license, or even a Qualys account - everything's handled seamlessly inside Defender for Cloud.
9797

98-
Microsoft Defender for Servers includes automatic, native integration with Microsoft Defender for Endpoint. Learn more, [Protect your endpoints with Defender for Cloud's integrated EDR solution: Microsoft Defender for Endpoint](integration-defender-for-endpoint.md). With this integration enabled, you'll have access to the vulnerability findings from **Microsoft threat and vulnerability management**. Learn more in [Investigate weaknesses with Microsoft Defender for Endpoint's threat and vulnerability management](deploy-vulnerability-assessment-defender-vulnerability-management.md).
98+
Microsoft Defender for Servers includes automatic, native integration with Microsoft Defender for Endpoint. Learn more, [Protect your endpoints with Defender for Cloud's integrated EDR solution: Microsoft Defender for Endpoint](integration-defender-for-endpoint.md). With this integration enabled, you'll have access to the vulnerability findings from **Microsoft Defender Vulnerability Management**. Learn more in [Investigate weaknesses with Microsoft Defender for Endpoint's Defender Vulnerability Management](deploy-vulnerability-assessment-defender-vulnerability-management.md).
9999

100100
Review the findings from these vulnerability scanners and respond to them all from within Defender for Cloud. This broad approach brings Defender for Cloud closer to being the single pane of glass for all of your cloud security efforts.
101101

articles/defender-for-cloud/defender-for-containers-introduction.md

Lines changed: 1 addition & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -56,13 +56,7 @@ You can learn more about [Kubernetes data plane hardening](kubernetes-workload-p
5656

5757
## Vulnerability assessment
5858

59-
### Scanning images in container registries
60-
61-
Defender for Containers scans the containers in Azure Container Registry (ACR) and Amazon AWS Elastic Container Registry (ECR) to notify you if there are known vulnerabilities in your images.
62-
63-
When you push an image to a container registry and while the image is stored in the container registry, Defender for Containers automatically scans it. Defender for Containers checks for known vulnerabilities in packages or dependencies defined in the image file.
64-
65-
When the scan completes, Defender for Containers provides details for each vulnerability detected, a security classification for each vulnerability detected, and guidance on how to remediate issues and protect vulnerable attack surfaces.
59+
Defender for Containers scans the containers in Azure Container Registry (ACR) and Amazon AWS Elastic Container Registry (ECR) to notify you if there are known vulnerabilities in your images. When the scan completes, Defender for Containers provides details for each vulnerability detected, a security classification for each vulnerability detected, and guidance on how to remediate issues and protect vulnerable attack surfaces.
6660

6761
Learn more about:
6862
- [Vulnerability assessment for Azure Container Registry (ACR)](defender-for-containers-vulnerability-assessment-azure.md)

articles/education-hub/about-education-hub.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,6 @@ ms.author: rymend
66
ms.topic: overview
77
ms.date: 12/09/2020
88
ms.service: azure-education
9-
ms.subservice: education-hub
109
---
1110

1211
# What is the Azure Education Hub?

articles/education-hub/access-education-hub.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,6 @@ author: tfosmark
55
ms.author: rymend
66
ms.topic: quickstart
77
ms.service: azure-education
8-
ms.subservice: education-hub
98
ms.date: 10/19/2022
109
ms.custom: mode-other
1110
---

0 commit comments

Comments
 (0)