Skip to content

Commit 68ee42d

Browse files
authored
Merge pull request #218607 from MicrosoftDocs/main
11/16 AM Publish
2 parents 38c9476 + 11adcbe commit 68ee42d

File tree

77 files changed

+990
-275
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

77 files changed

+990
-275
lines changed

articles/active-directory/authentication/concept-authentication-authenticator-app.md

Lines changed: 17 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 06/23/2022
9+
ms.date: 11/16/2022
1010

1111
ms.author: justinha
1212
author: justinha
@@ -57,8 +57,24 @@ Users may have a combination of up to five OATH hardware tokens or authenticator
5757
>
5858
> When two methods are required, users can reset using either a notification or verification code in addition to any other enabled methods.
5959
60+
61+
## FIPS 140 compliant for Azure AD authentication
62+
63+
Beginning with version 6.6.8, Microsoft Authenticator for iOS is compliant with [Federal Information Processing Standard (FIPS) 140](https://csrc.nist.gov/publications/detail/fips/140/3/final?azure-portal=true) for all Azure AD authentications using push multi-factor authentications (MFA), passwordless Phone Sign-In (PSI), and time-based one-time passcodes (TOTP).  
64+
65+
Consistent with the guidelines outlined in [NIST SP 800-63B](https://pages.nist.gov/800-63-3/sp800-63b.html?azure-portal=true), authenticators are required to use FIPS 140 validated cryptography. This helps federal agencies meet the requirements of [Executive Order (EO) 14028](https://www.whitehouse.gov/briefing-room/presidential-actions/2021/05/12/executive-order-on-improving-the-nations-cybersecurity/?azure-portal=true) and healthcare organizations working with [Electronic Prescriptions for Controlled Substances (EPCS)](/azure/compliance/offerings/offering-epcs-us)
66+
67+
FIPS 140 is a US government standard that defines minimum security requirements for cryptographic modules in information technology products and systems. Testing against the FIPS 140 standard is maintained by the [Cryptographic Module Validation Program (CMVP)](https://csrc.nist.gov/Projects/cryptographic-module-validation-program?azure-portal=true).
68+
69+
No changes in configurations are required in Microsoft Authenticator or the Azure portal to enable FIPS 140 compliance. Beginning with Microsoft Authenticator for iOS version 6.6.8, Azure AD authentications will be FIPS 140 compliant by default.
70+
71+
Authenticator leverages the native Apple cryptography to achieve FIPS 140, Security Level 1 compliance on Apple iOS devices beginning with Microsoft Authenticator version 6.6.8. For more information about the certifications being used, see the [Apple CoreCrypto module](https://support.apple.com/guide/sccc/security-certifications-for-ios-scccfa917cb49/web?azure-portal=true)
72+
73+
FIPS 140 compliance for Microsoft Authenticator on Android is in progress and will follow soon.
74+
6075
## Next steps
6176

6277
- To get started with passwordless sign-in, see [Enable passwordless sign-in with the Microsoft Authenticator](howto-authentication-passwordless-phone.md).
6378

6479
- Learn more about configuring authentication methods using the [Microsoft Graph REST API](/graph/api/resources/authenticationmethods-overview).
80+

articles/active-directory/hybrid/plan-connect-topologies.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,7 @@ The most common topology is a single on-premises forest, with one or multiple do
4646
### Single forest, multiple sync servers to one Azure AD tenant
4747
![Unsupported, filtered topology for a single forest](./media/plan-connect-topologies/singleforestfilteredunsupported.png)
4848

49-
Having multiple Azure AD Connect sync servers connected to the same Azure AD tenant is not supported, except for a [staging server](#staging-server). It's unsupported even if these servers are configured to synchronize with a mutually exclusive set of objects. You might have considered this topology if you can't reach all domains in the forest from a single server, or if you want to distribute load across several servers.
49+
Having multiple Azure AD Connect sync servers connected to the same Azure AD tenant is not supported, except for a [staging server](#staging-server). It's unsupported even if these servers are configured to synchronize with a mutually exclusive set of objects. You might have considered this topology if you can't reach all domains in the forest from a single server, or if you want to distribute load across several servers. (No errors occur when a new Azure AD Sync Server is configured for a new Azure AD forest and a new verified child domain.)
5050

5151
## Multiple forests, single Azure AD tenant
5252
![Topology for multiple forests and a single tenant](./media/plan-connect-topologies/multiforestsingledirectory.png)
@@ -78,7 +78,7 @@ You can find more details in [Understanding the default configuration](concept-a
7878

7979
Having more than one Azure AD Connect sync server connected to a single Azure AD tenant is not supported. The exception is the use of a [staging server](#staging-server).
8080

81-
This topology differs from the one below in that **multiple sync servers** connected to a single Azure AD tenant is not supported.
81+
This topology differs from the one below in that **multiple sync servers** connected to a single Azure AD tenant is not supported. (While not supported, this still works.)
8282

8383
### Multiple forests, single sync server, users are represented in only one directory
8484
![Option for representing users only once across all directories](./media/plan-connect-topologies/multiforestusersonce.png)
@@ -142,8 +142,8 @@ We recommend having a single tenant in Azure AD for an organization. Before you
142142

143143
This topology implements the following use cases:
144144

145-
* AADConnect can synchronize the same users, groups, and contacts from a single Active Directory to multiple Azure AD tenants. These tenants can be in different Azure environments, such as the Azure China environment or the Azure Government environment, but they could also be in the same Azure environment, such as two tenants that are both in Azure Commercial.
146-
* The same Source Anchor can be used for a single object in separate tenants (but not for multiple objects in the same tenant)
145+
* AADConnect can synchronize the users, groups, and contacts from a single Active Directory to multiple Azure AD tenants. These tenants can be in different Azure environments, such as the Azure China environment or the Azure Government environment, but they could also be in the same Azure environment, such as two tenants that are both in Azure Commercial. For more details on options, see https://docs.microsoft.com/azure/azure-government/documentation-government-plan-identity.
146+
* The same Source Anchor can be used for a single object in separate tenants (but not for multiple objects in the same tenant). (The verified domain can't be the same in two tenants. More details are needed to enable the same object to have two UPNs.)
147147
* You will need to deploy an AADConnect server for every Azure AD tenant you want to synchronize to - one AADConnect server cannot synchronize to more than one Azure AD tenant.
148148
* It is supported to have different sync scopes and different sync rules for different tenants.
149149
* Only one Azure AD tenant sync can be configured to write back to Active Directory for the same object. This includes device and group writeback as well as Hybrid Exchange configurations – these features can only be configured in one tenant. The only exception here is Password Writeback – see below.

articles/active-directory/saas-apps/timetabling-solutions-tutorial.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: saas-app-tutorial
1010
ms.workload: identity
1111
ms.topic: tutorial
12-
ms.date: 06/04/2022
12+
ms.date: 11/16/2022
1313
ms.author: jeedes
1414
---
1515

@@ -147,7 +147,7 @@ In this section, you create a user called Britta Simon in the Timetabling Soluti
147147

148148

149149
> [!NOTE]
150-
> Work with [Timetabling Solutions support team](https://www.timetabling.com.au/contact-us/) to add the users in the Timetabling Solutions platform. Users must be created and activated before you use single sign-on.
150+
> To add the users in the Timetabling Solutions platform. Users must be created and activated before you use single sign-on.
151151
152152
## Test SSO
153153

articles/azure-functions/functions-how-to-github-actions.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -50,7 +50,7 @@ To download the publishing profile of your function app:
5050

5151
1. In [GitHub](https://github.com/), go to your repository.
5252

53-
1. Select **Security > Secrets and variables > Actions**.
53+
1. Select **Settings > Secrets > Actions**.
5454

5555
1. Select **New repository secret**.
5656

articles/azure-monitor/agents/azure-monitor-agent-migration-tools.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -45,7 +45,7 @@ To install DCR Config Generator, you need:
4545
1. PowerShell version 5.1 or higher. We recommend using PowerShell version 7.1.3 or higher.
4646
1. Read access for the specified workspace resources.
4747
1. The `Az Powershell` module to pull workspace agent configuration information.
48-
1. The Azure credentials for running `Connect-AzAccount` and `Select-AzSubscription`, which set the context for the script to run.
48+
1. The Azure credentials for running `Connect-AzAccount` and `Select-AzContext`, which set the context for the script to run.
4949

5050
To install DCR Config Generator:
5151

articles/azure-monitor/alerts/alerts-create-new-alert-rule.md

Lines changed: 52 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -176,14 +176,34 @@ And then defining these elements for the resulting alert actions using:
176176

177177
1. In the **Conditions** pane, select the **Chart period**.
178178
1. The **Preview** chart shows you the results of your selection.
179-
1. In the **Alert logic** section:
179+
1. Select values for each of these fields in the **Alert logic** section:
180180

181181
|Field |Description |
182182
|---------|---------|
183-
|Event level| Select the level of the events that this alert rule monitors. Values are: **Critical**, **Error**, **Warning**, **Informational**, **Verbose** and **All**.|
184-
|Status|Select the status levels for which the alert is evaluated.|
183+
|Event level| Select the level of the events for this alert rule. Values are: **Critical**, **Error**, **Warning**, **Informational**, **Verbose** and **All**.|
184+
|Status|Select the status levels for the alert.|
185185
|Event initiated by|Select the user or service principal that initiated the event.|
186186

187+
### [Resource Health alert](#tab/resource-health)
188+
189+
1. In the **Conditions** pane, select values for each of these fields:
190+
191+
|Field |Description |
192+
|---------|---------|
193+
|Event status| Select the statuses of Resource Health events. Values are: **Active**, **In Progress**, **Resolved**, and **Updated**.|
194+
|Current resource status|Select the current resource status. Values are: **Available**, **Degraded**, and **Unavailable**.|
195+
|Previous resource status|Select the previous resource status. Values are: **Available**, **Degraded**, **Unavailable**, and **Unknown**.|
196+
|Reason type|Select the cause(s) of the Resource Health events. Values are: **Platform Initiated**, **Unknown**, and **User Initiated**.|
197+
### [Service Health alert](#tab/service-health)
198+
199+
1. In the **Conditions** pane, select values for each of these fields:
200+
201+
|Field |Description |
202+
|---------|---------|
203+
|Services| Select the Azure services.|
204+
|Regions|Select the Azure regions.|
205+
|Event types|Select the type(s) of Service Health events. Values are: **Service issue**, **Planned maintenance**, **Health advisories**, and **Security advisories**.|
206+
187207
---
188208

189209
From this point on, you can select the **Review + create** button at any time.
@@ -253,6 +273,14 @@ And then defining these elements for the resulting alert actions using:
253273
1. (Optional) If you have configured action groups for this alert rule, you can add custom properties to the alert payload to add additional information to the payload. In the **Custom properties** section, add the property **Name** and **Value** for the custom property you want included in the payload.
254274

255275
:::image type="content" source="media/alerts-create-new-alert-rule/alerts-activity-log-rule-details-tab.png" alt-text="Screenshot of the actions tab when creating a new activity log alert rule.":::
276+
### [Resource Health alert](#tab/resource-health)
277+
278+
1. Enter values for the **Alert rule name** and the **Alert rule description**.
279+
1. (Optional) In the **Advanced options** section, select **Enable upon creation** for the alert rule to start running as soon as you're done creating it.
280+
### [Service Health alert](#tab/service-health)
281+
282+
1. Enter values for the **Alert rule name** and the **Alert rule description**.
283+
1. (Optional) In the **Advanced options** section, select **Enable upon creation** for the alert rule to start running as soon as you're done creating it.
256284

257285
---
258286

@@ -292,14 +320,32 @@ You can create a new alert rule using the [Azure CLI](/cli/azure/get-started-wit
292320
293321
### [Activity log alert](#tab/activity-log)
294322
295-
To create an activity log alert rule, use the **az monitor activity-log alert create** command. You can see detailed documentation on the metric alert rule create command in the **az monitor activity-log alert create** section of the [CLI reference documentation for activity log alerts](/cli/azure/monitor/activity-log/alert).
296-
297323
To create a new activity log alert rule, use the following commands:
298324
- [az monitor activity-log alert create](/cli/azure/monitor/activity-log/alert#az-monitor-activity-log-alert-create): Create a new activity log alert rule resource.
299325
- [az monitor activity-log alert scope](/cli/azure/monitor/activity-log/alert/scope): Add scope for the created activity log alert rule.
300326
- [az monitor activity-log alert action-group](/cli/azure/monitor/activity-log/alert/action-group): Add an action group to the activity log alert rule.
301327
302-
---
328+
You can find detailed documentation on the activity log alert rule create command in the **az monitor activity-log alert create** section of the [CLI reference documentation for activity log alerts](/cli/azure/monitor/activity-log/alert).
329+
### [Resource Health alert](#tab/resource-health)
330+
331+
To create a new activity log alert rule, use the following commands using the `Resource Health` category:
332+
- [az monitor activity-log alert create](/cli/azure/monitor/activity-log/alert#az-monitor-activity-log-alert-create): Create a new activity log alert rule resource.
333+
- [az monitor activity-log alert scope](/cli/azure/monitor/activity-log/alert/scope): Add scope for the created activity log alert rule.
334+
- [az monitor activity-log alert action-group](/cli/azure/monitor/activity-log/alert/action-group): Add an action group to the activity log alert rule.
335+
336+
You can find detailed documentation on the alert rule create command in the **az monitor activity-log alert create** section of the [CLI reference documentation for activity log alerts](/cli/azure/monitor/activity-log/alert).
337+
338+
### [Service Health alert](#tab/service-health)
339+
340+
To create a new activity log alert rule, use the following commands using the `Service Health` category:
341+
- [az monitor activity-log alert create](/cli/azure/monitor/activity-log/alert#az-monitor-activity-log-alert-create): Create a new activity log alert rule resource .
342+
- [az monitor activity-log alert scope](/cli/azure/monitor/activity-log/alert/scope): Add scope for the created activity log alert rule.
343+
- [az monitor activity-log alert action-group](/cli/azure/monitor/activity-log/alert/action-group): Add an action group to the activity log alert rule.
344+
345+
You can find detailed documentation on the alert rule create command in the **az monitor activity-log alert create** section of the [CLI reference documentation for activity log alerts](/cli/azure/monitor/activity-log/alert).
346+
347+
---
348+
303349
## Create a new alert rule using PowerShell
304350
305351
- To create a metric alert rule using PowerShell, use this cmdlet: [Add-AzMetricAlertRuleV2](/powershell/module/az.monitor/add-azmetricalertrulev2)

articles/azure-monitor/alerts/alerts-overview.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -45,15 +45,16 @@ You can see all alert instances in all your Azure resources generated in the las
4545

4646
## Types of alerts
4747

48-
There are four types of alerts. This table provides a brief description of each alert type.
48+
This table provides a brief description of each alert type.
4949
See [this article](alerts-types.md) for detailed information about each alert type and how to choose which alert type best suits your needs.
5050

5151
|Alert type|Description|
5252
|:---------|:---------|
5353
|[Metric alerts](alerts-types.md#metric-alerts)|Metric alerts evaluate resource metrics at regular intervals. Metrics can be platform metrics, custom metrics, logs from Azure Monitor converted to metrics or Application Insights metrics. Metric alerts have several additional features, such as the ability to apply multiple conditions and dynamic thresholds.|
5454
|[Log alerts](alerts-types.md#log-alerts)|Log alerts allow users to use a Log Analytics query to evaluate resource logs at a predefined frequency.|
55-
|[Activity log alerts](alerts-types.md#activity-log-alerts)|Activity log alerts are triggered when a new activity log event occurs that matches the defined conditions.|
55+
|[Activity log alerts](alerts-types.md#activity-log-alerts)|Activity log alerts are triggered when a new activity log event occurs that matches defined conditions. **Resource Health** alerts and **Service Health** alerts are activity log alerts that report on your service and resource health.|
5656
|[Smart detection alerts](alerts-types.md#smart-detection-alerts)|Smart detection on an Application Insights resource automatically warns you of potential performance problems and failure anomalies in your web application. You can migrate smart detection on your Application Insights resource to create alert rules for the different smart detection modules.|
57+
|[Prometheus alerts (preview)](alerts-types.md#prometheus-alerts-preview)|Prometheus alerts are used for alerting on performance and health of Kubernetes clusters (including AKS). The alert rules are based on PromQL, which is an open source query language.|
5758

5859
## Out-of-the-box alert rules (preview)
5960

0 commit comments

Comments
 (0)