Skip to content

Commit 6927fc9

Browse files
authored
Merge pull request #139219 from v-rajagt/nov-23-fixes
Nov 23 fixes
2 parents 500f620 + a5402cd commit 6927fc9

File tree

43 files changed

+140
-140
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

43 files changed

+140
-140
lines changed

articles/active-directory/saas-apps/autotaskendpointbackup-tutorial.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -102,7 +102,7 @@ To configure Azure AD single sign-on with Autotask Endpoint Backup, perform the
102102
`https://<subdomain>.backup.autotask.net/singlesignon/saml/SSO`
103103

104104
> [!NOTE]
105-
> These values are not real. Update these values with the actual Identifier and Reply URL. Contact [Autotask Endpoint Backup Client support team](https://backup.autotask.net/help/Content/0_HOME/_AutotaskCustomerSupport.htm) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
105+
> These values are not real. Update these values with the actual Identifier and Reply URL. Contact [Autotask Endpoint Backup Client support team](https://backup.autotask.net/help/Content/0_HOME/Support_for_End_Clients.htm) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
106106
107107
5. On the **Set up Single Sign-On with SAML** page, in the **SAML Signing Certificate** section, click **Download** to download the **Federation Metadata XML** from the given options as per your requirement and save it on your computer.
108108

@@ -120,7 +120,7 @@ To configure Azure AD single sign-on with Autotask Endpoint Backup, perform the
120120

121121
### Configure Autotask Endpoint Backup Single Sign-On
122122

123-
To configure single sign-on on **Autotask Endpoint Backup** side, you need to send the downloaded **Federation Metadata XML** and appropriate copied URLs from Azure portal to [Autotask Endpoint Backup support team](https://backup.autotask.net/help/Content/0_HOME/_AutotaskCustomerSupport.htm). They set this setting to have the SAML SSO connection set properly on both sides.
123+
To configure single sign-on on **Autotask Endpoint Backup** side, you need to send the downloaded **Federation Metadata XML** and appropriate copied URLs from Azure portal to [Autotask Endpoint Backup support team](https://backup.autotask.net/help/Content/0_HOME/Support_for_End_Clients.htm). They set this setting to have the SAML SSO connection set properly on both sides.
124124

125125
### Create an Azure AD test user
126126

@@ -175,7 +175,7 @@ In this section, you enable Britta Simon to use Azure single sign-on by granting
175175

176176
### Create Autotask Endpoint Backup test user
177177

178-
In this section, you create a user called Britta Simon in Autotask Endpoint Backup. Work with [Autotask Endpoint Backup support team](https://backup.autotask.net/help/Content/0_HOME/_AutotaskCustomerSupport.htm) to add the users in the Autotask Endpoint Backup platform. Users must be created and activated before you use single sign-on.
178+
In this section, you create a user called Britta Simon in Autotask Endpoint Backup. Work with [Autotask Endpoint Backup support team](https://backup.autotask.net/help/Content/0_HOME/Support_for_End_Clients.htm) to add the users in the Autotask Endpoint Backup platform. Users must be created and activated before you use single sign-on.
179179

180180
### Test single sign-on
181181

articles/active-directory/saas-apps/carlsonwagonlit-tutorial.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -114,7 +114,7 @@ To configure Azure AD single sign-on with Carlson Wagonlit Travel, perform the f
114114

115115
### Configure Carlson Wagonlit Travel Single Sign-On
116116

117-
To configure single sign-on on **Carlson Wagonlit Travel** side, you need to send the downloaded **Federation Metadata XML** and appropriate copied URLs from Azure portal to [Carlson Wagonlit Travel support team](http://www.carlsonwagonlit.in/content/cwt/in/en/technical-assistance.html). They set this setting to have the SAML SSO connection set properly on both sides.
117+
To configure single sign-on on **Carlson Wagonlit Travel** side, you need to send the downloaded **Federation Metadata XML** and appropriate copied URLs from Azure portal to [Carlson Wagonlit Travel support team](https://www.mycwt.com/traveler-help/). They set this setting to have the SAML SSO connection set properly on both sides.
118118

119119
### Create an Azure AD test user
120120

@@ -169,7 +169,7 @@ In this section, you enable Britta Simon to use Azure single sign-on by granting
169169

170170
### Create Carlson Wagonlit Travel test user
171171

172-
In this section, you create a user called Britta Simon in Carlson Wagonlit Travel. Work with [Carlson Wagonlit Travel support team](http://www.carlsonwagonlit.in/content/cwt/in/en/technical-assistance.html) to add the users in the Carlson Wagonlit Travel platform. Users must be created and activated before you use single sign-on.
172+
In this section, you create a user called Britta Simon in Carlson Wagonlit Travel. Work with [Carlson Wagonlit Travel support team](https://www.mycwt.com/traveler-help/) to add the users in the Carlson Wagonlit Travel platform. Users must be created and activated before you use single sign-on.
173173

174174
### Test single sign-on
175175

articles/active-directory/saas-apps/wikispaces-tutorial.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -102,7 +102,7 @@ To configure Azure AD single sign-on with Wikispaces, perform the following step
102102
`https://session.wikispaces.net/<instancename>`
103103

104104
> [!NOTE]
105-
> These values are not real. Update these values with the actual Sign on URL and Identifier. Contact [Wikispaces Client support team](https://www.wikispaces.com/site/help) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
105+
> These values are not real. Update these values with the actual Sign on URL and Identifier. Contact [Wikispaces Client support team](https://wikispaces.psu.edu/) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
106106

107107
5. On the **Set up Single Sign-On with SAML** page, in the **SAML Signing Certificate** section, click **Download** to download the **Federation Metadata XML** from the given options as per your requirement and save it on your computer.
108108

@@ -120,7 +120,7 @@ To configure Azure AD single sign-on with Wikispaces, perform the following step
120120

121121
### Configure Wikispaces Single Sign-On
122122

123-
To configure single sign-on on **Wikispaces** side, you need to send the downloaded **Federation Metadata XML** and appropriate copied URLs from Azure portal to [Wikispaces support team](https://www.wikispaces.com/site/help). They set this setting to have the SAML SSO connection set properly on both sides.
123+
To configure single sign-on on **Wikispaces** side, you need to send the downloaded **Federation Metadata XML** and appropriate copied URLs from Azure portal to [Wikispaces support team](https://wikispaces.psu.edu/). They set this setting to have the SAML SSO connection set properly on both sides.
124124

125125
### Create an Azure AD test user
126126

articles/advisor/security-baseline.md

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -142,7 +142,7 @@ Note that some Azure services support local users and roles which are not manage
142142

143143
- [Create an access review of Azure resource roles in Privileged Identity Management (PIM)](../active-directory/privileged-identity-management/pim-resource-roles-start-access-review.md)
144144

145-
- [How to use Azure AD identity and access reviews](/azure/active-directory/governance/access-reviews-overvie)
145+
- [How to use Azure AD identity and access reviews](/azure/active-directory/governance/access-reviews-overview)
146146

147147
**Azure Security Center monitoring**: Not applicable
148148

@@ -218,7 +218,7 @@ Use Azure Conditional Access to limit a user's ability to interact with Azure Re
218218

219219
## Logging and Threat Detection
220220

221-
*For more information, see the [Azure Security Benchmark: Logging and Threat Detection](/azure/security/benchmarks/security-controls-v2-logging-threat-protection).*
221+
*For more information, see the [Azure Security Benchmark: Logging and Threat Detection](/azure/security/benchmarks/security-controls-v2-logging-threat-detection).*
222222

223223
### LT-4: Enable logging for Azure resources
224224

@@ -370,7 +370,7 @@ Use workflow automation features in Azure Security Center and Azure Sentinel to
370370

371371
## Posture and Vulnerability Management
372372

373-
*For more information, see the [Azure Security Benchmark: Posture and Vulnerability Management](/azure/security/benchmarks/security-controls-v2-vulnerability-management).*
373+
*For more information, see the [Azure Security Benchmark: Posture and Vulnerability Management](/azure/security/benchmarks/security-controls-v2-posture-vulnerability-management).*
374374

375375
### PV-8: Conduct regular attack simulation
376376

@@ -420,9 +420,9 @@ For more information, see the following references:
420420

421421
- [Cloud Adoption Framework - Azure data security and encryption best practices](../security/fundamentals/data-encryption-best-practices.md?amp;bc=%2fazure%2fcloud-adoption-framework%2f_bread%2ftoc.json&toc=%2fazure%2fcloud-adoption-framework%2ftoc.json)
422422

423-
- [Azure Security Benchmark - Asset management](/azure/security/benchmarks/security-benchmark-v2-asset-management)
423+
- [Azure Security Benchmark - Asset management](/azure/security/benchmarks/security-controls-v2-asset-management)
424424

425-
- [Azure Security Benchmark - Data Protection](/azure/security/benchmarks/security-benchmark-v2-data-protection)
425+
- [Azure Security Benchmark - Data Protection](/azure/security/benchmarks/security-controls-v2-data-protection)
426426

427427
**Azure Security Center monitoring**: Not applicable
428428

@@ -450,7 +450,7 @@ Ensure that the segmentation strategy is implemented consistently across control
450450

451451
**Guidance**: Continuously measure and mitigate risks to your individual assets and the environment they are hosted in. Prioritize high value assets and highly-exposed attack surfaces, such as published applications, network ingress and egress points, user and administrator endpoints, etc.
452452

453-
- [Azure Security Benchmark - Posture and vulnerability management](/azure/security/benchmarks/security-benchmark-v2-posture-vulnerability-management)
453+
- [Azure Security Benchmark - Posture and vulnerability management](/azure/security/benchmarks/security-controls-v2-posture-vulnerability-management)
454454

455455
**Azure Security Center monitoring**: Not applicable
456456

@@ -491,7 +491,7 @@ This strategy should include documented guidance, policy, and standards for the
491491
For more information, see the following references:
492492
- [Azure Security Best Practice 11 - Architecture. Single unified security strategy](/azure/cloud-adoption-framework/security/security-top-10#11-architecture-establish-a-single-unified-security-strategy)
493493

494-
- [Azure Security Benchmark - Network Security](/azure/security/benchmarks/security-benchmark-v2-network-security)
494+
- [Azure Security Benchmark - Network Security](/azure/security/benchmarks/security-controls-v2-network-security)
495495

496496
- [Azure network security overview](../security/fundamentals/network-overview.md)
497497

@@ -519,9 +519,9 @@ This strategy should include documented guidance, policy, and standards for the
519519

520520
Review the referenced links for more information.
521521

522-
- [Azure Security Benchmark - Identity management](/azure/security/benchmarks/security-benchmark-v2-identity-management)
522+
- [Azure Security Benchmark - Identity management](/azure/security/benchmarks/security-controls-v2-identity-management)
523523

524-
- [Azure Security Benchmark - Privileged access](/azure/security/benchmarks/security-benchmark-v2-privileged-access)
524+
- [Azure Security Benchmark - Privileged access](/azure/security/benchmarks/security-controls-v2-privileged-access)
525525

526526
- [Azure Security Best Practice 11 - Architecture. Single unified security strategy](/azure/cloud-adoption-framework/security/security-top-10#11-architecture-establish-a-single-unified-security-strategy)
527527

@@ -553,9 +553,9 @@ This strategy should include documented guidance, policy, and standards for the
553553

554554
For more information, see the following references:
555555

556-
- [Azure Security Benchmark - Logging and threat detection](/azure/security/benchmarks/security-benchmark-v2-logging-threat-detection)
556+
- [Azure Security Benchmark - Logging and threat detection](/azure/security/benchmarks/security-controls-v2-logging-threat-detection)
557557

558-
- [Azure Security Benchmark - Incident response](/azure/security/benchmarks/security-benchmark-v2-incident-response)
558+
- [Azure Security Benchmark - Incident response](/azure/security/benchmarks/security-controls-v2-incident-response)
559559

560560
- [Azure Security Best Practice 4 - Process. Update Incident Response Processes for Cloud](/azure/cloud-adoption-framework/security/security-top-10#4-process-update-incident-response-ir-processes-for-cloud)
561561

articles/app-service/app-service-authentication-how-to.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -167,7 +167,7 @@ When your provider's access token (not the [session token](#extend-session-token
167167

168168
- **Google**: Append an `access_type=offline` query string parameter to your `/.auth/login/google` API call. If using the Mobile Apps SDK, you can add the parameter to one of the `LogicAsync` overloads (see [Google Refresh Tokens](https://developers.google.com/identity/protocols/OpenIDConnect#refresh-tokens)).
169169
- **Facebook**: Doesn't provide refresh tokens. Long-lived tokens expire in 60 days (see [Facebook Expiration and Extension of Access Tokens](https://developers.facebook.com/docs/facebook-login/access-tokens/expiration-and-extension)).
170-
- **Twitter**: Access tokens don't expire (see [Twitter OAuth FAQ](https://developer.twitter.com/en/docs/basics/authentication/FAQ)).
170+
- **Twitter**: Access tokens don't expire (see [Twitter OAuth FAQ](https://developer.twitter.com/en/docs/authentication/faq)).
171171
- **Microsoft Account**: When [configuring Microsoft Account Authentication Settings](configure-authentication-provider-microsoft.md), select the `wl.offline_access` scope.
172172
- **Azure Active Directory**: In [https://resources.azure.com](https://resources.azure.com), do the following steps:
173173
1. At the top of the page, select **Read/Write**.

articles/app-service/security-baseline.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -167,7 +167,7 @@ Review the referenced links for additional information.
167167

168168
- [How to configure end-to-end TLS by using Application Gateway with the portal](../application-gateway/end-to-end-ssl-portal.md)
169169

170-
- [Secure the ASE as described in Locking down an App Service](https://review.docs.microsoft.com/azure/app-service/environment/firewall-integrationEnvironment:)
170+
- [Secure the ASE as described in Locking down an App Service](/azure/app-service/environment/firewall-integration)
171171

172172
**Azure Security Center monitoring**: Yes
173173

@@ -204,7 +204,7 @@ Review the referenced links for additional information.
204204

205205
- [How to configure end-to-end TLS by using Application Gateway with the portal](../application-gateway/end-to-end-ssl-portal.md)
206206

207-
- [Secure the ASE as described in Locking down an App Service](https://review.docs.microsoft.com/azure/app-service/environment/firewall-integrationEnvironment:)
207+
- [Secure the ASE as described in Locking down an App Service](/azure/app-service/environment/firewall-integration)
208208

209209
**Azure Security Center monitoring**: Not applicable
210210

@@ -220,7 +220,7 @@ Apply any of the built-in Azure Policy definitions related to tagging effects, s
220220

221221
- [How to create and use tags](../azure-resource-manager/management/tag-resources.md)
222222

223-
- [Azure App Service Access Restrictions](/azure/app-service/app-service-ip-restriction)
223+
- [Azure App Service Access Restrictions](/azure/app-service/app-service-ip-restrictions)
224224

225225
**Azure Security Center monitoring**: Not applicable
226226

articles/automation/automation-hrw-run-runbooks.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ When you author a runbook to run on a Hybrid Runbook Worker, you should edit and
1717

1818
Azure Automation handles jobs on Hybrid Runbook Workers differently from jobs run in Azure sandboxes. If you have a long-running runbook, make sure that it's resilient to possible restart. For details of the job behavior, see [Hybrid Runbook Worker jobs](automation-hybrid-runbook-worker.md#hybrid-runbook-worker-jobs).
1919

20-
Jobs for Hybrid Runbook Workers run under the local **System** account on Windows, or the **nxautomation** account on Linux. For Linux, verify the **nxautomation** account has access to the location where the runbook modules are stored. When you use the [Install-Module](/powershell/module/powershellget/install-module) cmdlet, be sure to specify AllUsers for the `Scope` parameter to ensure that the **nxautomation** account has access. For more information on PowerShell on Linux, see [Known Issues for PowerShell on Non-Windows Platforms](/powershell/scripting/whats-new/known-issues-ps6#known-issues-for-powershell-on-non-windows-platforms).
20+
Jobs for Hybrid Runbook Workers run under the local **System** account on Windows, or the **nxautomation** account on Linux. For Linux, verify the **nxautomation** account has access to the location where the runbook modules are stored. When you use the [Install-Module](/powershell/module/powershellget/install-module) cmdlet, be sure to specify AllUsers for the `Scope` parameter to ensure that the **nxautomation** account has access. For more information on PowerShell on Linux, see [Known Issues for PowerShell on Non-Windows Platforms](/powershell/scripting/whats-new/what-s-new-in-powershell-70?view=powershell-7.1).
2121

2222
## Configure runbook permissions
2323

0 commit comments

Comments
 (0)