Skip to content

Commit 6cd8696

Browse files
[Microsoft Entra] Fixing Azure portal references
1 parent 65cedfc commit 6cd8696

20 files changed

+30
-30
lines changed

articles/active-directory/architecture/4-secure-access-groups.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -154,7 +154,7 @@ Learn more:
154154

155155
* [Overview of Microsoft 365 Groups for administrators](/microsoft-365/admin/create-groups/office-365-groups?view=o365-worldwide&preserve-view=true)
156156
* [Create a group in the Microsoft 365 admin center](/microsoft-365/admin/create-groups/create-groups?view=o365-worldwide&preserve-view=true)
157-
* [Azure portal](https://portal.azure.com/)
157+
* [Microsoft Entra admin center](https://entra.microsoft.com)
158158
* [Microsoft 365 admin center](https://admin.microsoft.com/)
159159

160160
### Microsoft 365 Groups roles

articles/active-directory/conditional-access/policy-migration-mfa.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Migrate a classic Conditional Access policy
3-
description: This article shows how to migrate a classic Conditional Access policy in the Azure portal.
3+
description: This article shows how to migrate a classic Conditional Access policy.
44

55
services: active-directory
66
ms.service: active-directory

articles/active-directory/conditional-access/require-tou.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -87,7 +87,7 @@ The scenario in this quickstart uses:
8787

8888
In the previous section, you created a Conditional Access policy requiring terms of use be accepted.
8989

90-
To test your policy, try to sign in to the [Azure portal](https://portal.azure.com) using your test account. You should see a dialog that requires you to accept your terms of use.
90+
To test your policy, try to sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) using your test account. You should see a dialog that requires you to accept your terms of use.
9191

9292
:::image type="content" source="./media/require-tou/57.png" alt-text="Screenshot of a dialog box titled Identity Security Protection terms of use, with Decline and Accept buttons and a button labeled My TOU." border="false":::
9393

articles/active-directory/devices/assign-local-admin.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -111,5 +111,5 @@ Additionally, you can also add users using the command prompt:
111111

112112
## Next steps
113113

114-
- To get an overview of how to manage devices, see [managing devices using the Azure portal](manage-device-identities.md).
114+
- To get an overview of how to manage devices, see [managing device identities](manage-device-identities.md).
115115
- To learn more about device-based Conditional Access, see [Conditional Access: Require compliant or Microsoft Entra hybrid joined device](../conditional-access/howto-conditional-access-policy-compliant-device.md).

articles/active-directory/devices/concept-device-registration.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -60,6 +60,6 @@ Another user wants to access their organizational email on their personal Androi
6060

6161
## Next steps
6262

63-
- [Manage device identities using the Azure portal](manage-device-identities.md)
63+
- [Manage device identities](manage-device-identities.md)
6464
- [Manage stale devices in Microsoft Entra ID](manage-stale-devices.md)
6565
- [Register your personal device on your work or school network](https://support.microsoft.com/account-billing/register-your-personal-device-on-your-work-or-school-network-8803dd61-a613-45e3-ae6c-bd1ab25bf8a8)

articles/active-directory/devices/concept-directory-join.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -86,5 +86,5 @@ Microsoft Entra join can be deployed by using any of the following methods:
8686
- [Plan your Microsoft Entra join implementation](device-join-plan.md)
8787
- [Co-management using Configuration Manager and Microsoft Intune](/mem/configmgr/comanage/overview)
8888
- [How to manage the local administrators group on Microsoft Entra joined devices](assign-local-admin.md)
89-
- [Manage device identities using the Azure portal](manage-device-identities.md)
89+
- [Manage device identities](manage-device-identities.md)
9090
- [Manage stale devices in Microsoft Entra ID](manage-stale-devices.md)

articles/active-directory/devices/concept-hybrid-join.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -56,5 +56,5 @@ Use Microsoft Entra hybrid joined devices if:
5656

5757
- [Plan your Microsoft Entra hybrid join implementation](hybrid-join-plan.md)
5858
- [Co-management using Configuration Manager and Microsoft Intune](/mem/configmgr/comanage/overview)
59-
- [Manage device identities using the Azure portal](manage-device-identities.md)
59+
- [Manage device identities](manage-device-identities.md)
6060
- [Manage stale devices in Microsoft Entra ID](manage-stale-devices.md)

articles/active-directory/devices/device-join-out-of-box.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -59,7 +59,7 @@ To verify whether a device is joined to your Microsoft Entra ID, review the **Ac
5959

6060
## Next steps
6161

62-
- For more information about managing devices, see [managing devices using the Azure portal](manage-device-identities.md).
62+
- For more information about managing devices, see [managing device identities](manage-device-identities.md).
6363
- [What is Microsoft Intune?](/mem/intune/fundamentals/what-is-intune)
6464
- [Overview of Windows Autopilot](/mem/autopilot/windows-autopilot)
6565
- [Passwordless authentication options for Microsoft Entra ID](../authentication/concept-authentication-passwordless.md)

articles/active-directory/devices/device-join-plan.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -216,7 +216,7 @@ Choose your deployment approach or approaches by reviewing the previous table an
216216

217217
## Configure your device settings
218218

219-
The Azure portal allows you to control the deployment of Microsoft Entra joined devices in your organization. To configure the related settings, on the **Microsoft Entra ID page**, select `Devices > Device settings`. [Learn more](manage-device-identities.md)
219+
The [Microsoft Entra admin center](https://entra.microsoft.com) allows you to control the deployment of Microsoft Entra joined devices in your organization. To configure the related settings, brose to **Identity** > **Devices** > **All devices** > **Device settings**. [Learn more](manage-device-identities.md)
220220

221221
<a name='users-may-join-devices-to-azure-ad'></a>
222222

articles/active-directory/devices/enterprise-state-roaming-faqs.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -59,7 +59,7 @@ sections:
5959
answer: |
6060
When multiple Microsoft Entra accounts from different Microsoft Entra tenants are on the same device, you must update the device's registry to communicate with the Azure Rights Management service for each Microsoft Entra tenant.
6161
62-
1. Find the GUID for each Microsoft Entra tenant. Open the Azure portal and select a Microsoft Entra tenant. The GUID for the tenant is on the Properties page for the selected tenant (https://portal.azure.com/#blade/Microsoft_AAD_IAM/ActiveDirectoryMenuBlade/Properties), labeled **Directory ID**.
62+
1. Find the GUID for each Microsoft Entra tenant. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com), browse to **Identity** > **Overview** > **Properties** > **Tenant ID**.
6363
2. After you have the GUID, you'll need to add the registry key
6464
**HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\SettingSync\WinMSIPC\<tenant ID GUID>**.
6565
From the **tenant ID GUID** key, create a new Multi-String value (REG-MULTI-SZ) named **AllowedRMSServerUrls**. For its data, specify the licensing distribution point URLs of the other Azure tenants that the device accesses.

0 commit comments

Comments
 (0)