Skip to content

Commit 5921e0f

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into yelevin/atomic-incidents
2 parents 634cb11 + 2782f47 commit 5921e0f

File tree

613 files changed

+8650
-4956
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

613 files changed

+8650
-4956
lines changed

.openpublishing.redirection.active-directory.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4361,6 +4361,11 @@
43614361
"redirect_url": "/azure/active-directory/fundamentals/concept-fundamentals-mfa-get-started",
43624362
"redirect_document_id": true
43634363
},
4364+
{
4365+
"source_path_from_root": "/articles/active-directory/conditional-access/faqs.md",
4366+
"redirect_url": "/azure/active-directory/conditional-access/overview",
4367+
"redirect_document_id": false
4368+
},
43644369
{
43654370
"source_path_from_root": "/articles/active-directory/conditional-access/concept-baseline-protection.md",
43664371
"redirect_url": "/azure/active-directory/fundamentals/concept-fundamentals-security-defaults",

.openpublishing.redirection.azure-monitor.json

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4174,7 +4174,7 @@
41744174
},
41754175
{
41764176
"source_path_from_root": "/articles/azure-monitor/platform/autoscale-resource-log-schema.md",
4177-
"redirect_url": "/azure/azure-monitor/autoscale/autoscale-resource-log-schema",
4177+
"redirect_url": "/azure/azure-monitor/autoscale/autoscale-diagnostics",
41784178
"redirect_document_id": false
41794179
},
41804180
{
@@ -5681,6 +5681,11 @@
56815681
"source_path_from_root": "/articles/azure-monitor/app/windows-desktop.md",
56825682
"redirect_url": "https://github.com/Microsoft/appcenter",
56835683
"redirect_document_id": false
5684+
},
5685+
{
5686+
"source_path_from_root": "/articles/azure-monitor/autoscale/autoscale-resource-log-schema.md",
5687+
"redirect_url": "/azure/azure-monitor/autoscale/autoscale-diagnostics",
5688+
"redirect_document_id": false
56845689
}
56855690
]
56865691
}

.openpublishing.redirection.json

Lines changed: 30 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,35 @@
11
{
22
"redirections": [
3+
{
4+
"source_path": "articles/security/develop/security-code-analysis-customize.md",
5+
"redirect_url": "/previous-versions/azure/security/develop/security-code-analysis-customize",
6+
"redirect_document_id": false
7+
},
8+
{
9+
"source_path": "articles/security/develop/security-code-analysis-faq.yml",
10+
"redirect_url": "/previous-versions/azure/security/develop/security-code-analysis-faq",
11+
"redirect_document_id": false
12+
},
13+
{
14+
"source_path": "articles/security/develop/security-code-analysis-onboard.md",
15+
"redirect_url": "/previous-versions/azure/security/develop/security-code-analysis-onboard",
16+
"redirect_document_id": false
17+
},
18+
{
19+
"source_path": "articles/security/develop/security-code-analysis-overview.md",
20+
"redirect_url": "/previous-versions/azure/security/develop/security-code-analysis-overview",
21+
"redirect_document_id": false
22+
},
23+
{
24+
"source_path": "articles/security/develop/security-code-analysis-releases.md",
25+
"redirect_url": "/previous-versions/azure/security/develop/security-code-analysis-releases",
26+
"redirect_document_id": false
27+
},
28+
{
29+
"source_path": "articles/security/develop/yaml-configuration.md",
30+
"redirect_url": "/previous-versions/azure/security/develop/yaml-configuration",
31+
"redirect_document_id": false
32+
},
333
{
434
"source_path": "articles/vmware-cloudsimple/access-cloudsimple-portal.md",
535
"redirect_url": "/previous-versions/azure/vmware-cloudsimple/access-cloudsimple-portal",

articles/active-directory-b2c/azure-monitor.md

Lines changed: 12 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ ms.workload: identity
1111
ms.topic: how-to
1212
ms.author: kengaderdus
1313
ms.subservice: B2C
14-
ms.date: 07/12/2022
14+
ms.date: 01/31/2023
1515
---
1616

1717
# Monitor Azure AD B2C with Azure Monitor
@@ -66,7 +66,7 @@ In summary, you'll use Azure Lighthouse to allow a user or group in your Azure A
6666
First, create, or choose a resource group that contains the destination Log Analytics workspace that will receive data from Azure AD B2C. You'll specify the resource group name when you deploy the Azure Resource Manager template.
6767

6868
1. Sign in to the [Azure portal](https://portal.azure.com).
69-
1. Make sure you're using the directory that contains your Azure AD tenant. Select the **Directories + subscriptions** icon in the portal toolbar.
69+
1. Make sure you're using the directory that contains your *Azure AD* tenant. Select the **Directories + subscriptions** icon in the portal toolbar.
7070
1. On the **Portal settings | Directories + subscriptions** page, find your Azure AD directory in the **Directory name** list, and then select **Switch**.
7171
1. [Create a resource group](../azure-resource-manager/management/manage-resource-groups-portal.md#create-resource-groups) or choose an existing one. This example uses a resource group named _azure-ad-b2c-monitor_.
7272

@@ -75,7 +75,7 @@ First, create, or choose a resource group that contains the destination Log Anal
7575
A **Log Analytics workspace** is a unique environment for Azure Monitor log data. You'll use this Log Analytics workspace to collect data from Azure AD B2C [audit logs](view-audit-logs.md), and then visualize it with queries and workbooks, or create alerts.
7676

7777
1. Sign in to the [Azure portal](https://portal.azure.com).
78-
1. Make sure you're using the directory that contains your Azure AD tenant. Select the **Directories + subscriptions** icon in the portal toolbar.
78+
1. Make sure you're using the directory that contains your *Azure AD* tenant. Select the **Directories + subscriptions** icon in the portal toolbar.
7979
1. On the **Portal settings | Directories + subscriptions** page, find your Azure AD directory in the **Directory name** list, and then select **Switch**.
8080
1. [Create a Log Analytics workspace](../azure-monitor/logs/quick-create-workspace.md). This example uses a Log Analytics workspace named _AzureAdB2C_, in a resource group named _azure-ad-b2c-monitor_.
8181

@@ -88,7 +88,7 @@ In this step, you choose your Azure AD B2C tenant as a **service provider**. You
8888
First, get the **Tenant ID** of your Azure AD B2C directory (also known as the directory ID).
8989

9090
1. Sign in to the [Azure portal](https://portal.azure.com/).
91-
1. Make sure you're using the directory that contains your Azure AD B2C tenant. Select the **Directories + subscriptions** icon in the portal toolbar.
91+
1. Make sure you're using the directory that contains your *Azure AD B2C* tenant. Select the **Directories + subscriptions** icon in the portal toolbar.
9292
1. On the **Portal settings | Directories + subscriptions** page, find your Azure AD B2C directory in the **Directory name** list, and then select **Switch**.
9393
1. Select **Azure Active Directory**, select **Overview**.
9494
1. Record the **Tenant ID**.
@@ -110,7 +110,7 @@ To make management easier, we recommend using Azure AD user _groups_ for each ro
110110
To create the custom authorization and delegation in Azure Lighthouse, we use an Azure Resource Manager template. This template grants Azure AD B2C access to the Azure AD resource group, which you created earlier, for example, _azure-ad-b2c-monitor_. Deploy the template from the GitHub sample by using the **Deploy to Azure** button, which opens the Azure portal and lets you configure and deploy the template directly in the portal. For these steps, make sure you're signed in to your Azure AD tenant (not the Azure AD B2C tenant).
111111

112112
1. Sign in to the [Azure portal](https://portal.azure.com).
113-
1. Make sure you're using the directory that contains your Azure AD tenant. Select the **Directories + subscriptions** icon in the portal toolbar.
113+
1. Make sure you're using the directory that contains your *Azure AD tenant*. Select the **Directories + subscriptions** icon in the portal toolbar.
114114
1. On the **Portal settings | Directories + subscriptions** page, find your Azure AD directory in the **Directory name** list, and then select **Switch**.
115115
1. Use the **Deploy to Azure** button to open the Azure portal and deploy the template directly in the portal. For more information, see [create an Azure Resource Manager template](../lighthouse/how-to/onboard-customer.md#create-an-azure-resource-manager-template).
116116

@@ -172,7 +172,7 @@ You're ready to [create diagnostic settings](../active-directory/reports-monitor
172172

173173
To configure monitoring settings for Azure AD B2C activity logs:
174174

175-
1. Sign in to the [Azure portal](https://portal.azure.com/) with your Azure AD B2C administrative account. This account must be a member of the security group you specified in the [Select a security group](#32-select-a-security-group) step.
175+
1. Sign in to the [Azure portal](https://portal.azure.com/) with your *Azure AD B2C* administrative account. This account must be a member of the security group you specified in the [Select a security group](#32-select-a-security-group) step.
176176
1. Make sure you're using the directory that contains your Azure AD B2C tenant:
177177
1. Select the **Directories + subscriptions** icon in the portal toolbar.
178178
2. On the **Portal settings | Directories + subscriptions** page, find your Azure AD B2C directory in the **Directory name** list, and then select **Switch**.
@@ -207,6 +207,8 @@ Now you can configure your Log Analytics workspace to visualize your data and co
207207

208208
Log queries help you to fully use the value of the data collected in Azure Monitor Logs. A powerful query language allows you to join data from multiple tables, aggregate large sets of data, and perform complex operations with minimal code. Virtually any question can be answered and analysis performed as long as the supporting data has been collected, and you understand how to construct the right query. For more information, see [Get started with log queries in Azure Monitor](../azure-monitor/logs/get-started-queries.md).
209209

210+
1. Sign in to the [Azure portal](https://portal.azure.com).
211+
1. Make sure you're using the directory that contains your *Azure AD* tenant. Select the **Directories + subscriptions** icon in the portal toolbar.
210212
1. From **Log Analytics workspace** window, select **Logs**
211213
1. In the query editor, paste the following [Kusto Query Language](/azure/data-explorer/kusto/query/) query. This query shows policy usage by operation over the past x days. The default duration is set to 90 days (90d). Notice that the query is focused only on the operation where a token/code is issued by policy.
212214

@@ -256,6 +258,8 @@ Workbooks provide a flexible canvas for data analysis and the creation of rich v
256258

257259
Follow the instructions below to create a new workbook using a JSON Gallery Template. This workbook provides a **User Insights** and **Authentication** dashboard for Azure AD B2C tenant.
258260

261+
1. Sign in to the [Azure portal](https://portal.azure.com).
262+
1. Make sure you're using the directory that contains your *Azure AD* tenant. Select the **Directories + subscriptions** icon in the portal toolbar.
259263
1. From the **Log Analytics workspace** window, select **Workbooks**.
260264
1. From the toolbar, select **+ New** option to create a new workbook.
261265
1. On the **New workbook** page, select the **Advanced Editor** using the **</>** option on the toolbar.
@@ -286,6 +290,8 @@ Alerts are created by alert rules in Azure Monitor and can automatically run sav
286290

287291
Use the following instructions to create a new Azure Alert, which will send an [email notification](../azure-monitor/alerts/action-groups.md#configure-notifications) whenever there's a 25% drop in the **Total Requests** compared to previous period. Alert will run every 5 minutes and look for the drop in the last hour compared to the hour before it. The alerts are created using Kusto query language.
288292

293+
1. Sign in to the [Azure portal](https://portal.azure.com).
294+
1. Make sure you're using the directory that contains your *Azure AD* tenant. Select the **Directories + subscriptions** icon in the portal toolbar.
289295
1. From **Log Analytics workspace**, select **Logs**.
290296
1. Create a new **Kusto query** by using the query below.
291297

articles/active-directory-domain-services/tutorial-create-replica-set.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -100,7 +100,7 @@ The replica set reports as *Provisioning* as deployment continues, as shown in t
100100

101101
## Delete a replica set
102102

103-
A managed domain is currently limited to four replicas - the initial replica set, and three additional replica sets. If you don't need a replica set anymore, or if you want to create a replica set in another region, you can delete unneeded replica sets.
103+
A managed domain is currently limited to five replicas - the initial replica set, and four additional replica sets. If you don't need a replica set anymore, or if you want to create a replica set in another region, you can delete unneeded replica sets.
104104

105105
> [!IMPORTANT]
106106
> You can't delete either the last replica set or the initial replica set in a managed domain.

articles/active-directory/authentication/howto-mfa-reporting.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -143,7 +143,7 @@ The following additional information and reports are available for MFA events, i
143143
| Report | Location | Description |
144144
|:--- |:--- |:--- |
145145
| Blocked User History | Azure AD > Security > MFA > Block/unblock users | Shows the history of requests to block or unblock users. |
146-
| Usage for on-premises components | Azure AD > Security > MFA > Activity Report | Provides information on overall usage for MFA Server through the NPS extension, AD FS, and MFA Server. |
146+
| Usage for on-premises components | Azure AD > Security > MFA > Activity Report | Provides information on overall usage for MFA Server. NPS extension and AD FS logs for cloud MFA activity are now included in the [Sign-in logs](../reports-monitoring/concept-sign-ins.md), and no longer published on this report. |
147147
| Bypassed User History | Azure AD > Security > MFA > One-time bypass | Provides a history of MFA Server requests to bypass MFA for a user. |
148148
| Server status | Azure AD > Security > MFA > Server status | Displays the status of MFA Servers associated with your account. |
149149

articles/active-directory/conditional-access/TOC.yml

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -120,8 +120,6 @@
120120
href: troubleshoot-conditional-access-what-if.md
121121
- name: Troubleshoot continuous access evaluation
122122
href: howto-continuous-access-evaluation-troubleshoot.md
123-
- name: FAQ
124-
href: faqs.md
125123
- name: Custom controls
126124
href: controls.md
127125
- name: Classic policies

articles/active-directory/conditional-access/concept-conditional-access-conditions.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -54,7 +54,7 @@ We don't support selecting macOS or Linux device platforms when selecting **Requ
5454
5555
## Locations
5656

57-
When configuring location as a condition, organizations can choose to include or exclude locations. These named locations may include the public IPv4 network information, country or region, or even unknown areas that don't map to specific countries or regions. Only IP ranges can be marked as a trusted location.
57+
When configuring location as a condition, organizations can choose to include or exclude locations. These named locations may include the public IPv4 or IPv6 network information, country or region, or even unknown areas that don't map to specific countries or regions. Only IP ranges can be marked as a trusted location.
5858

5959
When including **any location**, this option includes any IP address on the internet not just configured named locations. When selecting **any location**, administrators can choose to exclude **all trusted** or **selected locations**.
6060

0 commit comments

Comments
 (0)