Skip to content

Commit 65c448f

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into heidist-fresh
2 parents f48ae30 + 0bb2104 commit 65c448f

File tree

9 files changed

+168
-28
lines changed

9 files changed

+168
-28
lines changed

articles/active-directory/hybrid/TOC.yml

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -403,4 +403,6 @@
403403
- name: msExchUserHoldPolicies and cloudMSExchUserHoldPolicies
404404
href: reference-connect-msexchuserholdpolicies.md
405405
- name: Azure AD Connect version history archive
406-
href: reference-connect-version-history-archive.md
406+
href: reference-connect-version-history-archive.md
407+
- name: How to use BypassDirSyncOverrides
408+
href: how-to-bypassdirsyncoverrides.md
Lines changed: 141 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,141 @@
1+
---
2+
title: How to use the BypassDirSyncOverrides feature of an Azure AD tenant
3+
description: Describes how to use bypassdirsyncoverrides tenant feature to restore synchronization of Mobile and OtherMobile attributes from on-premises Active Directory.
4+
services: active-directory
5+
author: billmath
6+
ms.date: 08/11/2022
7+
ms.author: billmath
8+
ms.topic: how-to
9+
ms.service: active-directory
10+
ms.workload: identity
11+
ms.subservice: hybrid
12+
---
13+
14+
# How to use the BypassDirSyncOverrides feature of an Azure AD tenant.
15+
16+
This article describes the _BypassDirsyncOverrides_  feature and how to restore synchronization of Mobile and otherMobile attributes from Azure AD to on-premises Active Directory.
17+
18+
Generally, synchronized users cannot be changed from Azure or Microsoft 365 admin portals, neither through PowerShell using AzureAD or MSOnline modules. The exception to this is the Azure AD user’s attributes called _MobilePhone_ and _AlternateMobilePhones_. These attributes are synchronized from on-premises Active Directory attributes mobile and otherMobile, respectively, but end users can update their own phone number in _MobilePhone_ attribute in Azure AD through their profile page. Admins can also update synchronized user’s _MobilePhone_ and _AlternateMobilePhones_ values in Azure AD using MSOnline PowerShell module.
19+
20+
Giving users and admins the ability to update phone numbers directly in Azure AD enables enterprises to reduce the administrative overhead of managing user’s phone numbers in local Active Directory as these can change more frequently.
21+
22+
The caveat however, is that once a synchronized user's _MobilePhone_ or _AlternateMobilePhones_ number is updated via admin portal or PowerShell, the synchronization API will no longer honor updates to these attributes when they originate from on-premises Active Directory. This is commonly known as a _“DirSyncOverrides”_ feature. Administrators will notice this behavior when updates to Mobile or otherMobile attributes in Active Directory, do not update the correspondent user’s MobilePhone or AlternateMobilePhones in Azure AD accordingly, even though, the object is successfully synchronized through Azure AD Connect's engine.
23+
24+
## Identifying users with different Mobile and otherMobile values
25+
26+
You can export a list of users with different Mobile and otherMobile values between Active Directory and Azure Active Directory using _‘Compare-ADSyncToolsDirSyncOverrides’_ from _ADSyncTools_ PowerShell module. This will allow you to determine the users and respective values that are different between on-premises Active Directory and Azure Active Directory. This is important to know because enabling the _BypassDirSyncOverrides_ feature will overwrite all the different values in Azure Active Directory with the value coming from on-premises Active Directory.
27+
28+
### Using Compare-ADSyncToolsDirSyncOverrides
29+
30+
As a prerequisite you need to be running Azure AD Connect version 2 or later and install the latest ADSyncTools module from PowerShell Gallery with the following command:
31+
32+
```powershell
33+
Install-Module ADSyncTools
34+
```
35+
36+
To compare all the synchronized user’s Mobile and OtherMobile values, run the following command:
37+
38+
```powershell
39+
Compare-ADSyncToolsDirSyncOverrides -Credential $(Get-Credential)
40+
```
41+
42+
>[!NOTE]
43+
> The target API used by this feature does not handle authentication user interactions. MFA or conditional policies will block authentication. When prompted to enter credentials, please use a Global Administrator account that doesn't have MFA enabled or any conditional access policy applied. As a last resort, please create a temporary Global Administrator user account without MFA or Conditional Access that can be deleted after completing the desired operations using the BypassDirSyncOverridees feature.
44+
45+
This function will export a CSV file with a list of users where Mobile or OtherMobile values in on-premises Active Directory are different than the respective MobilePhone or AlternateMobilePhones in Azure AD.
46+
47+
At this stage you can use this data to reset the values of the on-premises Active Directory _Mobile_ and _otherMobile_ properties to the values that are present in Azure Active Directory. This way you can capture the most updated phone numbers from Azure AD and persist this data in on-premises Active Directory, before enabling _BypassDirSyncOverrides_ feature. To do this, import the data from the resulting CSV file and then use the _'Set-ADSyncToolsDirSyncOverrides'_ from _ADSyncTools_ module to persist the value in on-premises Active Directory.
48+
49+
For example, to import data from the CSV file and extract the values in Azure AD for a given UserPrincipalName, use the following command:
50+
51+
```powershell
52+
$upn = '<UserPrincipalName>'
53+
$user = Import-Csv 'ADSyncTools-DirSyncOverrides_yyyyMMMdd-HHmmss.csv' |
54+
where UserPrincipalName -eq $upn |
55+
select UserPrincipalName,*InAAD
56+
Set-ADSyncToolsDirSyncOverridesUser -Identity $upn -MobileInAD $user.MobileInAAD
57+
```
58+
59+
## Enabling BypassDirSyncOverrides feature
60+
61+
By default, _BypassDirSyncOverrides_ feature is turned off. Enabling _BypassDirSyncOverrides_ allows your tenant to bypass any changes made in _MobilePhone_ or _AlternateMobilePhones_ by users or admins directly in Azure AD and always honor the values present in on-premises Active Directory _Mobile_ or _OtherMobile_.
62+
63+
If you do not wish to have end users updating their own mobile phone number or there is no requirement to have admins updating mobile or alternative mobile phone numbers using PowerShell, you should leave the feature _BypassDirsyncOverrides_ enabled on the tenant.
64+
65+
With this feature turned on, even if an end user or admin updates either _MobilePhone_ or _AlternateMobilePhones_ in Azure Active Directory, the values synchronized from on-premises Active Directory will persist upon the next sync cycle. This means that any updates to these values only persist when the update is performed in on-premises Active Directory and then synchronized to Azure Active Directory.
66+
67+
### Enable the _BypassDirSyncOverrides_ feature:
68+
69+
To enable BypassDirSyncOverrides  feature use the MSOnline PowerShell module.
70+
71+
```powershell
72+
Set-MsolDirSyncFeature -Feature BypassdirSyncOverrides -Enable $true
73+
```
74+
75+
Once the feature is enabled, start a full synchronization cycle in Azure AD Connect using the following command:
76+
77+
```powershell
78+
Start-ADSyncSyncCycle -PolicyType Initial
79+
```
80+
81+
[!NOTE] Only objects with a different _MobilePhone_ or _AlternateMobilePhones_ value from on-premises Active Directory will be updated.
82+
83+
### Verify the status of the _BypassDirSyncOverrides_ feature:
84+
85+
```powershell
86+
Get-MsolDirSyncFeatures -Feature BypassdirSyncOverrides
87+
```
88+
89+
## Disabling _BypassDirSyncOverrides_ feature
90+
91+
If you desire to restore the ability to update mobile phone numbers from the portal or PowerShell, you can disable _BypassDirSyncOverrides_ feature using the following Microsoft Online PowerShell module command:
92+
93+
```powershell
94+
Set-MsolDirSyncFeature -Feature BypassdirSyncOverrides -Enable $false
95+
```
96+
97+
When this feature is turned off, anytime a user or admin updates the _MobilePhone_ or _AlternateMobilePhones_ directly in Azure AD, a _DirSyncOverrides_ is created which prevents any future updates to these attributes coming from on-premises Active Directory. From this point on, a user or admin can only manage these attributes from Azure AD as any new updates from on-premises _Mobile_ or _OtherMobile_ will be dismissed.
98+
99+
## Managing mobile phone numbers in Azure AD and on-premises Active Directory
100+
101+
To manage the user’s phone numbers, an admin can use the following set of functions from _ADSyncTools_ module to read, write and clear the values in either Azure AD or on-premises Active Directory.
102+
103+
### Get _Mobile_ and _OtherMobile_ properties from on-premises Active Directory:
104+
105+
```powershell
106+
Get-ADSyncToolsDirSyncOverridesUser '[email protected]' -FromAD
107+
```
108+
109+
### Get _MobilePhone_ and _AlternateMobilePhones_ properties from Azure AD:
110+
111+
```powershell
112+
Get-ADSyncToolsDirSyncOverridesUser '[email protected]' -FromAzureAD
113+
```
114+
115+
### Set _MobilePhone_ and _AlternateMobilePhones_ properties in Azure AD:
116+
117+
```powershell
118+
Set-ADSyncToolsDirSyncOverridesUser '[email protected]' -MobileInAD '999888777' -OtherMobileInAD '0987654','1234567'
119+
```
120+
121+
### Set _Mobile_ and _otherMobile_ properties in on-premises Active Directory:
122+
123+
```powershell
124+
Set-ADSyncToolsDirSyncOverridesUser '[email protected]' -MobilePhoneInAAD '999888777' -AlternateMobilePhonesInAAD '0987654','1234567'
125+
```
126+
127+
### Clear _MobilePhone_ and _AlternateMobilePhones_ properties in Azure AD:
128+
129+
```powershell
130+
Clear-ADSyncToolsDirSyncOverridesUser '[email protected]' -MobileInAD -OtherMobileInAD
131+
```
132+
133+
### Clear _Mobile_ and _otherMobile_ properties in on-premises Active Directory:
134+
135+
```powershell
136+
Clear-ADSyncToolsDirSyncOverridesUser '[email protected]' -MobilePhoneInAAD -AlternateMobilePhonesInAAD
137+
```
138+
139+
## Next Steps
140+
141+
Learn more about [Azure AD Connect: ADSyncTools PowerShell Module](reference-connect-adsynctools.md)

articles/azure-arc/data/includes/azure-arc-data-preview-release.md

Lines changed: 8 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -10,26 +10,26 @@ ms.date: 08/02/2022
1010
At this time, a test or preview build is not available for the next release.
1111
-->
1212

13-
The current test release published on September 27, 2022.
13+
The current preview release published on October 4, 2022.
1414

1515
|Component|Value|
1616
|-----------|-----------|
17-
|Container images registry/repository |`mcr.microsoft.com/arcdata/test`|
17+
|Container images registry/repository |`mcr.microsoft.com/arcdata/preview`|
1818
|Container images tag |`v1.12.0_2022-10-11`|
19-
|CRD names and version|`datacontrollers.arcdata.microsoft.com`: v1beta1, v1 through v6<br/>`exporttasks.tasks.arcdata.microsoft.com`: v1beta1, v1, v2<br/>`kafkas.arcdata.microsoft.com`: v1beta1<br/>`monitors.arcdata.microsoft.com`: v1beta1, v1, v2<br/>`sqlmanagedinstances.sql.arcdata.microsoft.com`: v1beta1, v1 through v7<br/>`postgresqls.arcdata.microsoft.com`: v1beta1, v1beta2, v1beta3<br/>`sqlmanagedinstancerestoretasks.tasks.sql.arcdata.microsoft.com`: v1beta1, v1<br/>`failovergroups.sql.arcdata.microsoft.com`: v1beta1, v1beta2, v1 through v2<br/>`activedirectoryconnectors.arcdata.microsoft.com`: v1beta1, v1beta2, v1<br/>`sqlmanagedinstancereprovisionreplicatask.tasks.sql.arcdata.microsoft.com`: v1beta1<br/>`otelcollectors.arcdata.microsoft.com`: v1beta1<br/>`telemetryrouters.arcdata.microsoft.com`: v1beta1<br/>|
19+
|CRD names and version|`datacontrollers.arcdata.microsoft.com`: v1beta1, v1 through v6<br/>`exporttasks.tasks.arcdata.microsoft.com`: v1beta1, v1, v2<br/>`kafkas.arcdata.microsoft.com`: v1beta1, v1beta2<br/>`monitors.arcdata.microsoft.com`: v1beta1, v1, v2<br/>`sqlmanagedinstances.sql.arcdata.microsoft.com`: v1beta1, v1 through v7<br/>`postgresqls.arcdata.microsoft.com`: v1beta1, v1beta2, v1beta3<br/>`sqlmanagedinstancerestoretasks.tasks.sql.arcdata.microsoft.com`: v1beta1, v1<br/>`failovergroups.sql.arcdata.microsoft.com`: v1beta1, v1beta2, v1 through v2<br/>`activedirectoryconnectors.arcdata.microsoft.com`: v1beta1, v1beta2, v1<br/>`sqlmanagedinstancereprovisionreplicatask.tasks.sql.arcdata.microsoft.com`: v1beta1<br/>`otelcollectors.arcdata.microsoft.com`: v1beta1, v1beta2<br/>`telemetryrouters.arcdata.microsoft.com`: v1beta1, v1beta2<br/>|
2020
|Azure Resource Manager (ARM) API version|2022-03-01-preview (No change)|
2121
|`arcdata` Azure CLI extension version|1.4.7 ([Download](https://aka.ms/az-cli-arcdata-ext))|
2222
|Arc enabled Kubernetes helm chart extension version|1.12.0|
2323
|Arc Data extension for Azure Data Studio<br/>`arc`<br/>`azcli`|*No Changes*<br/>1.5.4 ([Download](https://aka.ms/ads-arcdata-ext))</br>1.5.4 ([Download](https://aka.ms/ads-azcli-ext))|
2424

2525
New for this release:
26-
<!--
2726
- Arc data controller
28-
-
29-
-->
27+
- Updates to TelemetryRouter implementation to include inbound and outbound TelemetryCollector layers alongside Kafka as a persistent buffer
28+
- AD connector will now be upgraded when data controller is upgraded
3029

3130
- Arc-enabled SQL managed instance
3231
- New reprovision replica task lets you rebuild a broken sql instance replica. For more information, see [Reprovision replica](#reprovision-replica).
32+
- Edit Active Directory settings from the Azure portal
3333

3434
<!--
3535
- Arc-enabled PostgreSQL server
@@ -38,6 +38,8 @@ New for this release:
3838
- `arcdata` Azure CLI extension
3939
- Columns for release information added to the following commands: `az sql mi-arc list` this makes it easy to see what instance may need to be updated.
4040
- Alternately you can run `az arcdata dc list-upgrades'
41+
- New command to list AD Connectors `az arcdata ad-connector list --k8s-namespace <namespace> --use-k8s`
42+
- Az CLI Polling for AD Connector create/update/delete: This feature changes the default behavior of `az arcdata ad-connector create/update/delete` to hang and wait until the operation finishes. To override this behavior, the user has to use the `--no-wait` flag when invoking the command.
4143

4244
### Reprovision replica
4345

-1.52 KB
Loading

articles/dms/tutorial-sql-server-azure-sql-database-offline-ads.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -15,6 +15,9 @@ ms.date: 09/28/2022
1515
---
1616
# Tutorial: Migrate SQL Server to an Azure SQL Database offline using Azure Data Studio with DMS (Preview)
1717

18+
> [!NOTE]
19+
> Azure SQL Database targets are only available using the [Azure Data Studio Insiders](/sql/azure-data-studio/download-azure-data-studio#download-the-insiders-build-of-azure-data-studio) version of the Azure SQL Migration extension.
20+
1821
You can use the Azure SQL migration extension in Azure Data Studio to migrate the database(s) from a SQL Server instance to Azure SQL Database (Preview).
1922

2023
In this tutorial, you'll learn how to migrate the **AdventureWorks2019** database from an on-premises instance of SQL Server to Azure SQL Database (Preview) by using the Azure SQL Migration extension for Azure Data Studio. This tutorial focuses on the offline migration mode that considers an acceptable downtime during the migration process.

articles/expressroute/expressroute-howto-linkvnet-arm.md

Lines changed: 9 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -198,6 +198,15 @@ $connection = Get-AzVirtualNetworkGatewayConnection -Name "MyConnection" -Resour
198198
$connection.ExpressRouteGatewayBypass = $True
199199
Set-AzVirtualNetworkGatewayConnection -VirtualNetworkGatewayConnection $connection
200200
```
201+
### FastPath virtual network peering and user defined routes (UDRs).
202+
203+
With FastPath and virtual network peering, you can enable ExpressRoute connectivity directly to VMs in a local or peered virtual network, bypassing the ExpressRoute virtual network gateway in the data path.
204+
205+
With FastPath and UDR, you can configure a UDR on the GatewaySubnet to direct ExpressRoute traffic to an Azure Firewall or third party NVA. FastPath will honor the UDR and send traffic directly to the target Azure Firewall or NVA, bypassing the ExpressRoute virtual network gateway in the data path.
206+
207+
> [!NOTE]
208+
> * Virtual network peering and UDR support is enabled by default for all new FastPath connections
209+
> * To enable virtual network peering and UDR support for FastPath connections configured before 9/19/2022, disable and enable FastPath on the target connection.
201210
202211
### FastPath and Private Link for 100 Gbps ExpressRoute Direct
203212

@@ -220,22 +229,6 @@ Register-AzProviderFeature -FeatureName ExpressRoutePrivateEndpointGatewayBypass
220229
221230
## Enroll in ExpressRoute FastPath features (preview)
222231

223-
FastPath support for virtual network peering is now in Public preview, both IPv4 and IPv6 scenarios are supported. IPv4 FastPath and VNet peering can be enabled on connections associated to both ExpressRoute Direct and ExpressRoute Partner circuits. IPv6 FastPath support for VNet peering is limited to connections associated to ExpressRoute Direct.
224-
225-
### FastPath virtual network peering and user defined routes (UDRs).
226-
227-
With FastPath and virtual network peering, you can enable ExpressRoute connectivity directly to VMs in a local or peered virtual network, bypassing the ExpressRoute virtual network gateway in the data path.
228-
229-
With FastPath and UDR, you can configure a UDR on the GatewaySubnet to direct ExpressRoute traffic to an Azure Firewall or third party NVA. FastPath will honor the UDR and send traffic directly to the target Azure Firewall or NVA, bypassing the ExpressRoute virtual network gateway in the data path.
230-
231-
> [!NOTE]
232-
> The previews for virtual network peering and user defined routes (UDRs) are offered together. You cannot enable only one scenario.
233-
>
234-
235-
To enroll in these previews, send an email to [email protected] and include the following information:
236-
* Subscription ID
237-
* Service key of the target ExpressRoute circuit
238-
* Name and Resource Group/ARM resource ID of the target virtual network(s)
239232
### FastPath and Private Link for 10 Gbps ExpressRoute Direct
240233

241234
With FastPath and Private Link, Private Link traffic sent over ExpressRoute bypasses the ExpressRoute virtual network gateway in the data path. This preview supports connections associated to 10 Gbps ExpressRoute Direct circuits. This preview doesn't support ExpressRoute circuits managed by an ExpressRoute partner.

articles/storage/common/storage-network-security.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -121,7 +121,7 @@ By default, storage accounts accept connections from clients on any network. You
121121
---
122122
123123
> [!CAUTION]
124-
> If you set **Public network access** to **Disabled** after previously setting it to **Enabled from selected virtual networks and IP addresses**, any [Resource instances](#grant-access-from-azure-resource-instances) and [Exceptions](#manage-exceptions) you previously configured, including [Allow Azure services on the trusted services list to access this storage account](#grant-access-to-trusted-azure-services), will remain in effect. For this reason, those resources and services may still have access to the storage account.
124+
> By design, access to a storage account from trusted services takes the highest precedence over other network access restrictions. For this reason, if you set **Public network access** to **Disabled** after previously setting it to **Enabled from selected virtual networks and IP addresses**, any [resource instances](#grant-access-from-azure-resource-instances) and [exceptions](#manage-exceptions) you had previously configured, including [Allow Azure services on the trusted services list to access this storage account](#grant-access-to-trusted-azure-services), will remain in effect. As a result, those resources and services may still have access to the storage account after setting **Public network access** to **Disabled**.
125125
126126
## Grant access from a virtual network
127127

articles/virtual-machines/disks-cross-tenant-customer-managed-keys.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn how to use customer-managed keys with your Azure disks in dif
44
author: roygara
55
ms.service: storage
66
ms.topic: how-to
7-
ms.date: 09/23/2022
7+
ms.date: 10/04/2022
88
ms.author: rogarana
99
ms.subservice: disks
1010
---
@@ -37,7 +37,7 @@ If you have questions about cross-tenant customer-managed keys with managed disk
3737
3838
## Limitations
3939
40-
- Currently this feature is only available in the North Central US, West Central US, and West US regions.
40+
- Currently this feature is only available in the North Central US, West Central US, West US, East US 2, and North Europe regions.
4141
- Managed Disks and the customer's Key Vault must be in the same Azure region, but they can be in different subscriptions.
4242
- This feature doesn't support Ultra Disks or Azure Premium SSD v2 managed disks.
4343

0 commit comments

Comments
 (0)