Skip to content

Commit 707d31e

Browse files
authored
Merge pull request #252721 from MicrosoftGuyJFlo/PortalFixes
[Microsoft Entra] Fixing Azure portal references
2 parents 257525c + 4aa02e5 commit 707d31e

20 files changed

+34
-34
lines changed

articles/active-directory/architecture/4-secure-access-groups.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -154,7 +154,7 @@ Learn more:
154154

155155
* [Overview of Microsoft 365 Groups for administrators](/microsoft-365/admin/create-groups/office-365-groups?view=o365-worldwide&preserve-view=true)
156156
* [Create a group in the Microsoft 365 admin center](/microsoft-365/admin/create-groups/create-groups?view=o365-worldwide&preserve-view=true)
157-
* [Azure portal](https://portal.azure.com/)
157+
* [Microsoft Entra admin center](https://entra.microsoft.com)
158158
* [Microsoft 365 admin center](https://admin.microsoft.com/)
159159

160160
### Microsoft 365 Groups roles

articles/active-directory/conditional-access/policy-migration-mfa.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Migrate a classic Conditional Access policy
3-
description: This article shows how to migrate a classic Conditional Access policy in the Azure portal.
3+
description: This article shows how to migrate a classic Conditional Access policy.
44

55
services: active-directory
66
ms.service: active-directory

articles/active-directory/conditional-access/require-tou.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -87,7 +87,7 @@ The scenario in this quickstart uses:
8787

8888
In the previous section, you created a Conditional Access policy requiring terms of use be accepted.
8989

90-
To test your policy, try to sign in to the [Azure portal](https://portal.azure.com) using your test account. You should see a dialog that requires you to accept your terms of use.
90+
To test your policy, try to sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) using your test account. You should see a dialog that requires you to accept your terms of use.
9191

9292
:::image type="content" source="./media/require-tou/57.png" alt-text="Screenshot of a dialog box titled Identity Security Protection terms of use, with Decline and Accept buttons and a button labeled My TOU." border="false":::
9393

articles/active-directory/devices/assign-local-admin.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -111,5 +111,5 @@ Additionally, you can also add users using the command prompt:
111111

112112
## Next steps
113113

114-
- To get an overview of how to manage devices, see [managing devices using the Azure portal](manage-device-identities.md).
114+
- To get an overview of how to manage devices, see [managing device identities](manage-device-identities.md).
115115
- To learn more about device-based Conditional Access, see [Conditional Access: Require compliant or Microsoft Entra hybrid joined device](../conditional-access/howto-conditional-access-policy-compliant-device.md).

articles/active-directory/devices/concept-device-registration.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -48,7 +48,7 @@ The goal of Microsoft Entra registered - also known as Workplace joined - device
4848

4949
Microsoft Entra registered devices are signed in to using a local account like a Microsoft account on a Windows 10 or newer device. These devices have a Microsoft Entra account for access to organizational resources. Access to resources in the organization can be limited based on that Microsoft Entra account and Conditional Access policies applied to the device identity.
5050

51-
Microsoft Entra Registration is not the same as device enrolment. If Administrators permit users to enrol their devices, organisations can further control these Microsoft Entra registered devices by enrolling the device(s) into Mobile Device Management (MDM) tools like Microsoft Intune. MDM provides a means to enforce organization-required configurations like requiring storage to be encrypted, password complexity, and security software kept updated.
51+
Microsoft Entra Registration is not the same as device enrollment. If Administrators permit users to enroll their devices, organizations can further control these Microsoft Entra registered devices by enrolling the device(s) into Mobile Device Management (MDM) tools like Microsoft Intune. MDM provides a means to enforce organization-required configurations like requiring storage to be encrypted, password complexity, and security software kept updated.
5252

5353
Microsoft Entra registration can be accomplished when accessing a work application for the first time or manually using the Windows 10 or Windows 11 Settings menu.
5454

@@ -60,6 +60,6 @@ Another user wants to access their organizational email on their personal Androi
6060

6161
## Next steps
6262

63-
- [Manage device identities using the Azure portal](manage-device-identities.md)
63+
- [Manage device identities](manage-device-identities.md)
6464
- [Manage stale devices in Microsoft Entra ID](manage-stale-devices.md)
6565
- [Register your personal device on your work or school network](https://support.microsoft.com/account-billing/register-your-personal-device-on-your-work-or-school-network-8803dd61-a613-45e3-ae6c-bd1ab25bf8a8)

articles/active-directory/devices/concept-directory-join.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -86,5 +86,5 @@ Microsoft Entra join can be deployed by using any of the following methods:
8686
- [Plan your Microsoft Entra join implementation](device-join-plan.md)
8787
- [Co-management using Configuration Manager and Microsoft Intune](/mem/configmgr/comanage/overview)
8888
- [How to manage the local administrators group on Microsoft Entra joined devices](assign-local-admin.md)
89-
- [Manage device identities using the Azure portal](manage-device-identities.md)
89+
- [Manage device identities](manage-device-identities.md)
9090
- [Manage stale devices in Microsoft Entra ID](manage-stale-devices.md)

articles/active-directory/devices/concept-hybrid-join.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -56,5 +56,5 @@ Use Microsoft Entra hybrid joined devices if:
5656

5757
- [Plan your Microsoft Entra hybrid join implementation](hybrid-join-plan.md)
5858
- [Co-management using Configuration Manager and Microsoft Intune](/mem/configmgr/comanage/overview)
59-
- [Manage device identities using the Azure portal](manage-device-identities.md)
59+
- [Manage device identities](manage-device-identities.md)
6060
- [Manage stale devices in Microsoft Entra ID](manage-stale-devices.md)

articles/active-directory/devices/device-join-out-of-box.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -59,7 +59,7 @@ To verify whether a device is joined to your Microsoft Entra ID, review the **Ac
5959

6060
## Next steps
6161

62-
- For more information about managing devices, see [managing devices using the Azure portal](manage-device-identities.md).
62+
- For more information about managing devices, see [managing device identities](manage-device-identities.md).
6363
- [What is Microsoft Intune?](/mem/intune/fundamentals/what-is-intune)
6464
- [Overview of Windows Autopilot](/mem/autopilot/windows-autopilot)
6565
- [Passwordless authentication options for Microsoft Entra ID](../authentication/concept-authentication-passwordless.md)

articles/active-directory/devices/device-join-plan.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -216,7 +216,7 @@ Choose your deployment approach or approaches by reviewing the previous table an
216216

217217
## Configure your device settings
218218

219-
The Azure portal allows you to control the deployment of Microsoft Entra joined devices in your organization. To configure the related settings, on the **Microsoft Entra ID page**, select `Devices > Device settings`. [Learn more](manage-device-identities.md)
219+
The [Microsoft Entra admin center](https://entra.microsoft.com) allows you to control the deployment of Microsoft Entra joined devices in your organization. To configure the related settings, browse to **Identity** > **Devices** > **All devices** > **Device settings**. [Learn more](manage-device-identities.md)
220220

221221
<a name='users-may-join-devices-to-azure-ad'></a>
222222

articles/active-directory/devices/enterprise-state-roaming-faqs.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -59,7 +59,7 @@ sections:
5959
answer: |
6060
When multiple Microsoft Entra accounts from different Microsoft Entra tenants are on the same device, you must update the device's registry to communicate with the Azure Rights Management service for each Microsoft Entra tenant.
6161
62-
1. Find the GUID for each Microsoft Entra tenant. Open the Azure portal and select a Microsoft Entra tenant. The GUID for the tenant is on the Properties page for the selected tenant (https://portal.azure.com/#blade/Microsoft_AAD_IAM/ActiveDirectoryMenuBlade/Properties), labeled **Directory ID**.
62+
1. Find the GUID for each Microsoft Entra tenant. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com), browse to **Identity** > **Overview** > **Properties** > **Tenant ID**.
6363
2. After you have the GUID, you'll need to add the registry key
6464
**HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\SettingSync\WinMSIPC\<tenant ID GUID>**.
6565
From the **tenant ID GUID** key, create a new Multi-String value (REG-MULTI-SZ) named **AllowedRMSServerUrls**. For its data, specify the licensing distribution point URLs of the other Azure tenants that the device accesses.

0 commit comments

Comments
 (0)