Skip to content

Commit 609fbd5

Browse files
authored
Merge pull request #206669 from MicrosoftDocs/main
8/02 AM Publish
2 parents 6a68836 + 45e21ff commit 609fbd5

File tree

111 files changed

+1664
-991
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

111 files changed

+1664
-991
lines changed

.openpublishing.redirection.azure-monitor.json

Lines changed: 11 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -233,27 +233,27 @@
233233
},
234234
{
235235
"source_path_from_root": "/articles/azure-monitor/visualize/view-designer-conversion-examples.md",
236-
"redirect_url": "/azure/azure-monitor/visualize/workbooks-overview",
236+
"redirect_url": "/azure/azure-monitor/visualize/workbooks-view-designer-conversion-overview",
237237
"redirect_document_id": false
238238
},
239239
{
240240
"source_path_from_root": "/articles/azure-monitor/visualize/view-designer-conversion-options.md",
241-
"redirect_url": "/azure/azure-monitor/visualize/workbooks-overview",
241+
"redirect_url": "/azure/azure-monitor/visualize/workbooks-view-designer-conversion-overview",
242242
"redirect_document_id": false
243243
},
244244
{
245245
"source_path_from_root": "/articles/azure-monitor/visualize/view-designer-conversion-overview.md",
246-
"redirect_url": "/azure/azure-monitor/visualize/workbooks-overview",
246+
"redirect_url": "/azure/azure-monitor/visualize/workbooks-view-designer-conversion-overview",
247247
"redirect_document_id": false
248248
},
249249
{
250250
"source_path_from_root": "/articles/azure-monitor/visualize/view-designer-conversion-tasks.md",
251-
"redirect_url": "/azure/azure-monitor/visualize/workbooks-overview",
251+
"redirect_url": "/azure/azure-monitor/visualize/workbooks-view-designer-conversion-overview",
252252
"redirect_document_id": false
253253
},
254254
{
255255
"source_path_from_root": "/articles/azure-monitor/visualize/view-designer-conversion-tiles.md",
256-
"redirect_url": "/azure/azure-monitor/visualize/workbooks-overview",
256+
"redirect_url": "/azure/azure-monitor/visualize/workbooks-view-designer-conversion-overview",
257257
"redirect_document_id": false
258258
},
259259
{
@@ -268,7 +268,7 @@
268268
},
269269
{
270270
"source_path_from_root": "/articles/azure-monitor/visualize/workbooks-add-text.md",
271-
"redirect_url": "/azure/azure-monitor/visualize/workbooks-add-workbook-elements",
271+
"redirect_url": "/azure/azure-monitor/visualize/workbooks-create-workbook",
272272
"redirect_document_id": false
273273
},
274274
{
@@ -341,6 +341,11 @@
341341
"redirect_url": "/azure/data-explorer/data-explorer-insights",
342342
"redirect_document_id": false
343343
},
344+
{
345+
"source_path_from_root": "/articles/azure-monitor/insights/troubleshoot-workbooks.md" ,
346+
"redirect_url": "/azure/azure-monitor/visualize/workbooks-overview",
347+
"redirect_document_id": false
348+
},
344349
{
345350
"source_path_from_root": "/articles/azure-monitor/vm/vminsights-ga-release-faq.md" ,
346351
"redirect_url": "/azure/azure-monitor/faq#vm-insights",

articles/active-directory/devices/concept-azure-ad-join-hybrid.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -27,12 +27,12 @@ Hybrid Azure AD joined devices require network line of sight to your on-premises
2727
| **Primary audience** | Suitable for hybrid organizations with existing on-premises AD infrastructure |
2828
| | Applicable to all users in an organization |
2929
| **Device ownership** | Organization |
30-
| **Operating Systems** | Windows 10 or newer, 8.1 and 7 |
31-
| | Windows Server 2008/R2, 2012/R2, 2016 and 2019 |
32-
| **Provisioning** | Windows 10 or newer, Windows Server 2016/2019 |
30+
| **Operating Systems** | Windows 11, Windows 10 or 8.1 |
31+
| | Windows Server 2008/R2, 2012/R2, 2016, 2019 and 2022 |
32+
| **Provisioning** | Windows 11, Windows 10, Windows Server 2016/2019/2022 |
3333
| | Domain join by IT and autojoin via Azure AD Connect or ADFS config |
3434
| | Domain join by Windows Autopilot and autojoin via Azure AD Connect or ADFS config |
35-
| | Windows 8.1, Windows 7, Windows Server 2012 R2, Windows Server 2012, and Windows Server 2008 R2 - Require MSI |
35+
| | Windows 8.1, Windows Server 2012 R2, Windows Server 2012, and Windows Server 2008 R2 - Require MSI |
3636
| **Device sign in options** | Organizational accounts using: |
3737
| | Password |
3838
| | Windows Hello for Business for Win10 and above |
@@ -48,7 +48,7 @@ Hybrid Azure AD joined devices require network line of sight to your on-premises
4848

4949
Use Azure AD hybrid joined devices if:
5050

51-
- You support down-level devices running Windows 7 and 8.1.
51+
- You support down-level devices running 8.1.
5252
- You want to continue to use [Group Policy](/mem/configmgr/comanage/faq#my-environment-has-too-many-group-policy-objects-and-legacy-authenticated-apps--do-i-have-to-use-hybrid-azure-ad-) to manage device configuration.
5353
- You want to continue to use existing imaging solutions to deploy and configure devices.
5454
- You have Win32 apps deployed to these devices that rely on Active Directory machine authentication.

articles/active-directory/hybrid/reference-connect-version-history.md

Lines changed: 9 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -77,6 +77,14 @@ If you want all the latest features and updates, check this page and install wha
7777

7878
To read more about auto-upgrade, see [Azure AD Connect: Automatic upgrade](how-to-connect-install-automatic-upgrade.md).
7979

80+
## 2.1.16.0
81+
82+
### Release status
83+
8/2/2022: Released for download and auto-upgrade.
84+
85+
### Bug fixes
86+
- We fixed a bug where auto-upgrade fails when the service account is in "UPN" format.
87+
8088
## 2.1.15.0
8189

8290
### Release status
@@ -563,4 +571,4 @@ This is a bug fix release. There are no functional changes in this release.
563571

564572
## Next steps
565573

566-
Learn more about how to [integrate your on-premises identities with Azure AD](whatis-hybrid-identity.md).
574+
Learn more about how to [integrate your on-premises identities with Azure AD](whatis-hybrid-identity.md).

articles/active-directory/identity-protection/concept-workload-identity-risk.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -113,3 +113,4 @@ The [Azure AD Toolkit](https://github.com/microsoft/AzureADToolkit) is a PowerSh
113113
- [Microsoft Graph API](/graph/use-the-api)
114114
- [Azure AD audit logs](../reports-monitoring/concept-audit-logs.md)
115115
- [Azure AD sign-in logs](../reports-monitoring/concept-sign-ins.md)
116+
- [Simulate risk detections](howto-identity-protection-simulate-risk.md)

articles/active-directory/identity-protection/howto-identity-protection-simulate-risk.md

Lines changed: 28 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,10 +27,11 @@ This article provides you with steps for simulating the following risk detection
2727
- Anonymous IP address (easy)
2828
- Unfamiliar sign-in properties (moderate)
2929
- Atypical travel (difficult)
30+
- Leaked credentials in GitHub for workload identities (moderate)
3031

3132
Other risk detections cannot be simulated in a secure manner.
3233

33-
More information about each risk detection can be found in the article, [What is risk](concept-identity-protection-risks.md).
34+
More information about each risk detection can be found in the article, What is risk for [user](concept-identity-protection-risks.md) and [workload identity](concept-workload-identity-risk.md).
3435

3536
## Anonymous IP address
3637

@@ -81,6 +82,30 @@ Simulating the atypical travel condition is difficult because the algorithm uses
8182

8283
The sign-in shows up in the Identity Protection dashboard within 2-4 hours.
8384

85+
## Leaked Credentials for Workload Identities
86+
87+
This risk detection indicates that the application's valid credentials have been leaked. This leak can occur when someone checks in the credentials in a public code artifact on GitHub. Therefore, to simulate this detection, you need a GitHub account and can [sign up a GitHub account](https://docs.github.com/get-started/signing-up-for-github) if you don't have one already.
88+
89+
**To simulate Leaked Credentials in GitHub for Workload Identities, perform the following steps**:
90+
1. Navigate to the [Azure portal](https://portal.azure.com).
91+
2. Browse to **Azure Active Directory** > **App registrations**.
92+
3. Select **New registration** to register a new application or reuse an exsiting stale application.
93+
4. Select **Certificates & Secrets** > **New client Secret** , add a description of your client secret and set an expiration for the secret or specify a custom lifetime and click **Add**. Record the secret's value for later use for your GitHub Commit.
94+
95+
> [!Note]
96+
> **You can not retrieve the secret again after you leave this page**.
97+
98+
5. Get the TenantID and Application(Client)ID in the **Overview** page.
99+
6. Ensure you disable the application via **Azure Active Directory** > **Enterprise Application** > **Properties** > Set **Enabled for users to sign-in** to **No**.
100+
7. Create a **public** GitHub Repository, add the following config and commit the change.
101+
```GitHub file
102+
"AadClientId": "XXXX-2dd4-4645-98c2-960cf76a4357",
103+
"AadSecret": "p3n7Q~XXXX",
104+
"AadTenantDomain": "XXXX.onmicrosoft.com",
105+
"AadTenantId": "99d4947b-XXX-XXXX-9ace-abceab54bcd4",
106+
```
107+
7. In about 8 hours, you will be able to view a leaked credentail detection under **Azure Active Directory** > **Security** > **Risk Detection** > **Workload identity detections** where the additional info will contain your the URL of your GitHub commit.
108+
84109
## Testing risk policies
85110

86111
This section provides you with steps for testing the user and the sign-in risk policies created in the article, [How To: Configure and enable risk policies](howto-identity-protection-configure-risk-policies.md).
@@ -126,6 +151,8 @@ To test a sign in risk policy, perform the following steps:
126151

127152
- [What is risk?](concept-identity-protection-risks.md)
128153

154+
- [Securing workload identities with Identity](concept-workload-identity-risk.md)
155+
129156
- [How To: Configure and enable risk policies](howto-identity-protection-configure-risk-policies.md)
130157

131158
- [Azure Active Directory Identity Protection](overview-identity-protection.md)

articles/aks/use-azure-dedicated-hosts.md

Lines changed: 5 additions & 41 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,12 @@
11
---
2-
title: Use Azure Dedicated Hosts in Azure Kubernetes Service (AKS) (Preview)
2+
title: Use Azure Dedicated Hosts in Azure Kubernetes Service (AKS)
33
description: Learn how to create an Azure Dedicated Hosts Group and associate it with Azure Kubernetes Service (AKS)
44
services: container-service
55
ms.topic: article
6-
ms.date: 02/11/2021
7-
6+
ms.date: 08/01/2022
87
---
98

10-
# Add Azure Dedicated Host to an Azure Kubernetes Service (AKS) cluster (Preview)
9+
# Add Azure Dedicated Host to an Azure Kubernetes Service (AKS) cluster
1110

1211
Azure Dedicated Host is a service that provides physical servers - able to host one or more virtual machines - dedicated to one Azure subscription. Dedicated hosts are the same physical servers used in our data centers, provided as a resource. You can provision dedicated hosts within a region, availability zone, and fault domain. Then, you can place VMs directly into your provisioned hosts, in whatever configuration best meets your needs.
1312

@@ -16,45 +15,10 @@ Using Azure Dedicated Hosts for nodes with your AKS cluster has the following be
1615
* Hardware isolation at the physical server level. No other VMs will be placed on your hosts. Dedicated hosts are deployed in the same data centers and share the same network and underlying storage infrastructure as other, non-isolated hosts.
1716
* Control over maintenance events initiated by the Azure platform. While most maintenance events have little to no impact on your virtual machines, there are some sensitive workloads where each second of pause can have an impact. With dedicated hosts, you can opt in to a maintenance window to reduce the impact to your service.
1817

19-
[!INCLUDE [preview features callout](./includes/preview/preview-callout.md)]
20-
2118
## Before you begin
2219

2320
* An Azure subscription. If you don't have an Azure subscription, you can create a [free account](https://azure.microsoft.com/free).
24-
* [Azure CLI installed](/cli/azure/install-azure-cli).
25-
26-
### Install the `aks-preview` Azure CLI
27-
28-
You also need the *aks-preview* Azure CLI extension version 0.5.54 or later. Install the *aks-preview* Azure CLI extension by using the [az extension add][az-extension-add] command. Or install any available updates by using the [az extension update][az-extension-update] command.
29-
30-
```azurecli-interactive
31-
# Install the aks-preview extension
32-
az extension add --name aks-preview
33-
# Update the extension to make sure you have the latest version installed
34-
az extension update --name aks-preview
35-
```
36-
37-
### Register the `DedicatedHostGroupPreview` preview feature
38-
39-
To use the feature, you must also enable the `DedicatedHostGroupPreview` feature flag on your subscription.
40-
41-
Register the `DedicatedHostGroupPreview` feature flag by using the [az feature register][az-feature-register] command, as shown in the following example:
42-
43-
```azurecli-interactive
44-
az feature register --namespace "Microsoft.ContainerService" --name "DedicatedHostGroupPreview"
45-
```
46-
47-
It takes a few minutes for the status to show *Registered*. Verify the registration status by using the [az feature list][az-feature-list] command:
48-
49-
```azurecli-interactive
50-
az feature list -o table --query "[?contains(name, 'Microsoft.ContainerService/DedicatedHostGroupPreview')].{Name:name,State:properties.state}"
51-
```
52-
53-
When ready, refresh the registration of the *Microsoft.ContainerService* resource provider by using the [az provider register][az-provider-register] command:
54-
55-
```azurecli-interactive
56-
az provider register --namespace Microsoft.ContainerService
57-
```
21+
* Before you start, ensure that your version of the Azure CLI is 2.39.0 or later. If it's an earlier version, [install the latest version](/cli/azure/install-azure-cli).
5822

5923
## Limitations
6024

@@ -142,7 +106,7 @@ az role assignment create --assignee <id> --role "Contributor" --scope <Resource
142106
Create an AKS cluster, and add the Host Group you just configured.
143107

144108
```azurecli-interactive
145-
az aks create -g MyResourceGroup -n MyManagedCluster --location eastus --kubernetes-version 1.20.13 --nodepool-name agentpool1 --node-count 1 --host-group-id <id> --node-vm-size Standard_D2s_v3 --enable-managed-identity --assign-identity <id>
109+
az aks create -g MyResourceGroup -n MyManagedCluster --location eastus --nodepool-name agentpool1 --node-count 1 --host-group-id <id> --node-vm-size Standard_D2s_v3 --enable-managed-identity --assign-identity <id>
146110
```
147111

148112
## Add a Dedicated Host Node Pool to an existing AKS cluster

0 commit comments

Comments
 (0)