Skip to content

Commit 72a11bf

Browse files
Merge pull request #192701 from MicrosoftDocs/repo_sync_working_branch
Confirm merge from repo_sync_working_branch to main to sync with https://github.com/MicrosoftDocs/azure-docs (branch main)
2 parents ed804ef + eb7ccd5 commit 72a11bf

22 files changed

+47
-40
lines changed

articles/active-directory/authentication/active-directory-passwords-faq.yml

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -92,9 +92,10 @@ sections:
9292
answer: |
9393
> Yes, there are security features built into password reset to protect it from misuse.
9494
>
95-
> Users can try only five password reset attempts within a 24 hour period before they're locked out for 24 hours.
9695
>
97-
> Users can try to validate a phone number, send a SMS, or validate security questions and answers only five times within an hour before they're locked out for 24 hours.
96+
> Users can attempt to validate their information (such as their phone number), but if they're unable to prove their identity five times within a 24-hour period, they're locked out for 24 hours.
97+
>
98+
> Users can try to validate a phone number, auth app, send a SMS, or validate security questions and answers only five times within an hour before they're locked out for 24 hours.
9899
>
99100
> Users can send an email a maximum of 10 times within a 10 minute period before they're locked out for 24 hours.
100101
>

articles/active-directory/conditional-access/concept-conditional-access-cloud-apps.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -97,7 +97,6 @@ The following key applications are included in the Office 365 client app:
9797
- Microsoft Whiteboard Services
9898
- Office Delve
9999
- Office Online
100-
- Office.com
101100
- OneDrive
102101
- Power Apps
103102
- Power Automate
@@ -202,4 +201,4 @@ For more information about authentication context use in applications, see the f
202201

203202
- [Conditional Access: Conditions](concept-conditional-access-conditions.md)
204203
- [Conditional Access common policies](concept-conditional-access-policy-common.md)
205-
- [Client application dependencies](service-dependencies.md)
204+
- [Client application dependencies](service-dependencies.md)

articles/azure-sql/managed-instance/doc-changes-updates-known-issues.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ This article lists the currently known issues with [Azure SQL Managed Instance](
2323
|Issue |Date discovered |Status |Date resolved |
2424
|---------|---------|---------|---------|
2525
|[Querying external table fails with 'not supported' error message](#querying-external-table-fails-with-not-supported-error-message)|Jan 2022|Has Workaround||
26-
|[When using SQL Server authentication, usernames with '@' are not supported](#when-using-sql-server-authentication-usernames-with--are-not-supported)|Oct 2021|||
26+
|[When using SQL Server authentication, usernames with '@' are not supported](#when-using-sql-server-authentication-usernames-with--are-not-supported)|Oct 2021|Resolved|Feb 2022|
2727
|[Misleading error message on Azure portal suggesting recreation of the Service Principal](#misleading-error-message-on-azure-portal-suggesting-recreation-of-the-service-principal)|Sep 2021||Oct 2021|
2828
|[Changing the connection type does not affect connections through the failover group endpoint](#changing-the-connection-type-does-not-affect-connections-through-the-failover-group-endpoint)|Jan 2021|Has Workaround||
2929
|[Procedure sp_send_dbmail may transiently fail when @query parameter is used](#procedure-sp_send_dbmail-may-transiently-fail-when--parameter-is-used)|Jan 2021|Has Workaround||
@@ -284,10 +284,6 @@ using (var scope = new TransactionScope())
284284

285285
## No resolution
286286

287-
### When using SQL Server authentication, usernames with '@' are not supported
288-
289-
Usernames that contain the '@' symbol in the middle (e.g. 'abc@xy') are not able to log in using SQL Server authentication.
290-
291287
### Azure AD logins and users are not supported in SSDT
292288

293289
SQL Server Data Tools don't fully support Azure AD logins and users.
@@ -313,6 +309,10 @@ Error logs that are available in SQL Managed Instance aren't persisted, and thei
313309

314310
## Resolved
315311

312+
### When using SQL Server authentication, usernames with '@' are not supported
313+
314+
Usernames that contain the '@' symbol in the middle (e.g. 'abc@xy') are not able to log in using SQL Server authentication.
315+
316316
### Restoring manual backup without CHECKSUM might fail
317317

318318
In certain circumstances manual backup of databases that was made on a managed instance without CHECKSUM might fail to be restored. In such cases, retry restoring the backup until you're successful.

articles/cognitive-services/Face/ReleaseNotes.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -47,7 +47,7 @@ The Azure Face service is updated on an ongoing basis. Use this article to stay
4747
### New detectable Face attributes
4848
* The `faceMask` attribute is available with the latest Detection 03 model, along with the additional attribute `"noseAndMouthCovered"` which detects whether the face mask is worn as intended, covering both the nose and mouth. To use the latest mask detection capability, users need to specify the detection model in the API request: assign the model version with the _detectionModel_ parameter to `detection_03`. See [Specify a face detection model](./face-api-how-to-topics/specify-detection-model.md) for more details.
4949
### New Face API Recognition Model
50-
* The new Recognition 04 model is the most accurate recognition model currently available. If you're a new customer, we recommend using this model for verification and identification. It improves upon the accuracy of Recognition 03, including improved recognition for enrolled users wearing face covers (surgical masks, N95 masks, cloth masks). Now customers can build safe and seamless user experiences that detect whether an enrolled user is wearing a face cover with the latest Detection 03 model, and recognize who they are with the latest Recognition 04 model. See [Specify a face recognition model](./face-api-how-to-topics/specify-recognition-model.md) for more details.
50+
* The new Recognition 04 model is the most accurate recognition model currently available. If you're a new customer, we recommend using this model for verification and identification. It improves upon the accuracy of Recognition 03, including improved recognition for users wearing face covers (surgical masks, N95 masks, cloth masks). Note that we recommend against enrolling images of users wearing face covers as this will lower recognition quality. Now customers can build safe and seamless user experiences that detect whether a user is wearing a face cover with the latest Detection 03 model, and recognize them with the latest Recognition 04 model. See [Specify a face recognition model](./face-api-how-to-topics/specify-recognition-model.md) for more details.
5151

5252

5353
## January 2021
@@ -147,4 +147,4 @@ The Azure Face service is updated on an ongoing basis. Use this article to stay
147147
[Face - Detect](https://westus.dev.cognitive.microsoft.com/docs/services/563879b61984550e40cbbe8d/operations/563879b61984550f30395236), [Face - Identify](https://westus.dev.cognitive.microsoft.com/docs/services/563879b61984550e40cbbe8d/operations/563879b61984550f30395239), [Face - Find Similar](https://westus.dev.cognitive.microsoft.com/docs/services/563879b61984550e40cbbe8d/operations/563879b61984550f30395237) and [Face - Group](https://westus.dev.cognitive.microsoft.com/docs/services/563879b61984550e40cbbe8d/operations/563879b61984550f30395238).
148148
* Updated the minimal detectable face size to 36x36 pixels. Faces smaller than 36x36 pixels will not be detected.
149149
* Deprecated the PersonGroup and Person data in Face V0. Those data cannot be accessed with the Face V1.0 service.
150-
* Deprecated the V0 endpoint of Face API on June 30, 2016.
150+
* Deprecated the V0 endpoint of Face API on June 30, 2016.

articles/cosmos-db/sql/sql-api-java-application.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -250,4 +250,4 @@ Trying to do capacity planning for a migration to Azure Cosmos DB? You can use i
250250
* If you know typical request rates for your current database workload, read about [estimating request units using Azure Cosmos DB capacity planner](estimate-ru-with-capacity-planner.md)
251251

252252
> [!div class="nextstepaction"]
253-
> [Build a node.js application with Azure Cosmos DB](sql-api-nodejs-application.md)
253+
> [Build a Node.js application with Azure Cosmos DB](sql-api-nodejs-application.md)

articles/cosmos-db/sql/sql-api-sdk-node.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -172,7 +172,7 @@ Add DISTINCT and LIMIT/OFFSET queries (#306)
172172

173173
### Improved browser experience
174174

175-
While it was possible to use the v2 SDK in the browser, it was not an ideal experience. You needed to Polyfill several node.js built-in libraries and use a bundler like webpack or Parcel. The v3 SDK makes the out of the box experience much better for browser users.
175+
While it was possible to use the v2 SDK in the browser, it was not an ideal experience. You needed to Polyfill several Node.js built-in libraries and use a bundler like webpack or Parcel. The v3 SDK makes the out of the box experience much better for browser users.
176176

177177
* Replace request internals with fetch (#245)
178178
* Remove usage of Buffer (#330)

articles/defender-for-iot/organizations/concept-supported-protocols.md

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -16,19 +16,20 @@ Defender for IoT can detect the following protocols when identifying assets and
1616

1717
|Brand |Protocols |
1818
|---------|---------|
19-
|**ABB** | IEC61850 MMS (including ABB extension) |
19+
|**ABB** | ABB 800xA DCS (IEC61850 MMS including ABB extension) |
2020
|**ASHRAE** | BACnet<br> BACnet BACapp<br> BACnet BVLC |
2121
|**Beckhoff** | AMS (ADS)<br> Twincat |
2222
|**Cisco** | CAPWAP Control<br> CAPWAP Data<br> CDP<br> LWAPP |
2323
|**DNP. org** | DNP3 |
2424
|**Emerson** | DeltaV<br> Emerson OpenBSI/BSAP<br> Ovation DCS ADMD<br>Ovation DCS DPUSTAT<br> Ovation DCS SSRPC |
2525
|**Emerson Fischer** | ROC |
2626
|**Eurocontrol** | ASTERIX |
27-
|**GE** | Bentley Nevada (System 1)<br> EGD<br> GSM (GE MarkVI and MarkVIe)<br> SRTP (GE) |
27+
|**GE** | Bentley Nevada (System 1 / BN3500)<br> EGD<br> GSM (GE MarkVI and MarkVIe)<br> SRTP (GE) |
28+
|**Generic Applications** | Active Directory<br> RDP<br> Teamviewer<br> VNC<br> |
2829
|**Honeywell** | ENAP<br> Experion DCS CDA<br> Experion DCS FDA |
2930
|**IEC** | Codesys V3<br> ICCP TASE.2/IEC-60870<br> IEC60870-5 (IEC104/101)<br> IEC60870-5-103 (encapsulated serial)<br> IEC61850 GOOSE<br> IEC61850 MMS<br> IEC61850 SMV (SAMPLED-VALUES)<br> LonTalk (LonWorks) |
3031
|**IEEE** | LLC<br> STP<br> VLAN |
31-
|**IETF** | ARP<br> DCE RPC<br> DNS<br> FTP (FTP_ADAT<br> FTP_DATA)<br> GSSAPI (RFC2743)<br> HTTP<br> ICMP<br> IPv4<br> IPv6<br> LLDP<br> MDNS<br> NBNS<br> NTLM (NTLMSSP Auth Protocol)<br> RPC<br> SMB / Browse / NBDGM<br> SMB / CIFS<br> SNMP<br> SPNEGO (RFC4178)<br> SSH<br> Syslog<br> Telnet<br> TFTP<br> TPKT<br> UDP |
32+
|**IETF** | ARP<br> DHCP<br> DCE RPC<br> DNS<br> FTP (FTP_ADAT<br> FTP_DATA)<br> GSSAPI (RFC2743)<br> HTTP<br> ICMP<br> IPv4<br> IPv6<br> LLDP<br> MDNS<br> NBNS<br> NTLM (NTLMSSP Auth Protocol)<br> RPC<br> SMB / Browse / NBDGM<br> SMB / CIFS<br> SNMP<br> SPNEGO (RFC4178)<br> SSH<br> Syslog<br> TCP<br> Telnet<br> TFTP<br> TPKT<br> UDP |
3233
|**ISO** | CLNP (ISO 8473)<br> COTP (ISO 8073)<br> ISO Industrial Protocol<br> MQTT (IEC 20922) |
3334
|**Medical** |ASTM<br> HL7 |
3435
|**Microsoft** | Horizon community dissectors<br> Horizon proprietary dissectors (developed by customers) |
@@ -40,7 +41,7 @@ Defender for IoT can detect the following protocols when identifying assets and
4041
|**Schneider Electric / Invensys** | Foxboro Evo<br> Foxboro I/A<br> Trident<br> TriGP<br> TriStation |
4142
|**Schneider Electric / Modicon** | Modbus RTU |
4243
|**Schneider Electric / Wonderware** | Wonderware Suitelink |
43-
|**Siemens** | CAMP<br> PCS7<br> PCS7 WinCC – Historian<br> Profinet DCP<br> Profinet Realtime<br> Siemens PHD<br> Siemens S7<br> Siemens S7-Plus<br> Siemens S7-Plus<br> Siemens SICAM<br> Siemens WinCC |
44+
|**Siemens** | CAMP<br> PCS7<br> PCS7 WinCC – Historian<br> Profinet DCP<br> Profinet Realtime<br> Siemens PHD<br> Siemens S7<br> Siemens S7-Plus<br> Siemens SICAM<br> Siemens WinCC |
4445
|**Toshiba** |Toshiba Computer Link |
4546
|**Yokogawa** | Centum ODEQ (Centum / ProSafe DCS)<br> HIS Equalize<br> Vnet/IP |
4647

articles/defender-for-iot/organizations/connect-sensors.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -342,7 +342,7 @@ This procedure describes how to install and configure a connection between your
342342
> [!IMPORTANT]
343343
> Some organizations must define firewall rules by IP addresses. If this is true for your organization, it's important to know that the Azure public IP ranges are updated weekly.
344344
>
345-
> Make sure to download the new JSON file each week and make the required changes on your site to correctly identify services running in Azure. You'll need the updated IP ranges for **AzureIoTHub**, **Storage**, and **EventHub**.
345+
> Make sure to download the new JSON file each week and make the required changes on your site to correctly identify services running in Azure. You'll need the updated IP ranges for **AzureIoTHub**, **Storage**, and **EventHub**. See the [latest IP ranges](https://www.microsoft.com/en-us/download/details.aspx?id=56519).
346346
>
347347
348348
## Connect directly
@@ -355,7 +355,7 @@ This section describes what you need to configure a direct sensor connection to
355355
- **Threat Intelligence**: `*.blob.core.windows.net`
356356
- **Eventhub**: `*.servicebus.windows.net`
357357
358-
1. Azure public IP addresses are updated weekly. If you must define firewall rules based on IP addresses, make sure to download the new JSON file each week and make the required changes on your site to correctly identify services running in Azure. You'll need the updated IP ranges for **AzureIoTHub**, **Storage**, and **EventHub**.
358+
1. Azure public IP addresses are updated weekly. If you must define firewall rules based on IP addresses, make sure to download the new JSON file each week and make the required changes on your site to correctly identify services running in Azure. You'll need the updated IP ranges for **AzureIoTHub**, **Storage**, and **EventHub**. See the [latest IP ranges](https://www.microsoft.com/en-us/download/details.aspx?id=56519).
359359
360360
## Connect via multi-cloud vendors
361361

articles/defender-for-iot/organizations/how-to-set-up-snmp-mib-monitoring.md

Lines changed: 11 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -7,9 +7,9 @@ ms.topic: how-to
77

88
# Set up SNMP MIB monitoring
99

10-
You can perform sensor health monitoring by using Simple Network Management Protocol (SNMP). The sensor responds to SNMP queries sent from an authorized monitoring server. The SNMP monitor polls the sensor OIDs periodically (up to 50 times a second).
10+
Monitoring sensor health is possible through the Simple Network Management Protocol (SNMP). The sensor responds to SNMP requests sent by an authorized monitoring server. The SNMP monitor polls sensor OIDs periodically (up to 50 times a second).
1111

12-
The SNMP supported versions are SNMP v2 or SNMP v3. SNMP uses UDP as its transport protocol with port 161 (SNMP).
12+
Supported SNMP versions are SNMP version 2 and version 3. The SNMP protocol utilizes UDP as its transport protocol with port 161.
1313

1414
## Sensor OIDs
1515

@@ -33,11 +33,14 @@ Note that:
3333
- Hardware-related MIBs (CPU usage, CPU temperature, memory usage, disk usage) should be tested on all architectures and physical sensors. CPU temperature on virtual machines is expected to be not applicable.
3434
- You can download the log that contains all the SNMP queries that the sensor receives, including the connection data and raw data.
3535

36+
## Prerequisites for AES and 3-DES Encryption Support for SNMP Version 3
37+
- The network management station (NMS) must support Simple Network Management Protocol (SNMP) Version 3 to be able to use this feature.
38+
- It is important to understand the SNMP architecture and the terminology of the architecture to understand the security model used and how the security model interacts with the other subsystems in the architecture.
39+
- Before you begin configuring SNMP monitoring, you need to open the port UDP 161 in the firewall.
3640

3741

3842
## Set up SNMP monitoring
3943

40-
1. Before you begin configuring SNMP monitoring, you need to open the port UDP 161 in the firewall.
4144
1. On the side menu, select **System Settings**.
4245
2. Expand **Sensor Management**, and select **SNMP MIB Monitoring** :
4346
3. Select **Add host** and enter the IP address of the server that performs the system health monitoring. You can add multiple servers.
@@ -49,9 +52,12 @@ Note that:
4952
|--|--|
5053
| **Username** | The SNMP username can contain up to 32 characters and include any combination of alphanumeric characters (uppercase letters, lowercase letters, and numbers). Spaces are not allowed. <br /> <br />The username for the SNMP v3 authentication must be configured on the system and on the SNMP server. |
5154
| **Password** | Enter a case-sensitive authentication password. The authentication password can contain 8 to 12 characters and include any combination of alphanumeric characters (uppercase letters, lowercase letters, and numbers). <br /> <br/>The username for the SNMP v3 authentication must be configured on the system and on the SNMP server. |
52-
| **Auth Type** | Select MD5 or SHA. |
53-
| **Encryption** | Select DES or AES. |
55+
| **Auth Type** | Select MD5 or SHA-1. |
56+
| **Encryption** | Select DES (56 bit key size)[^1] or AES (AES 128 bits supported)[^2]. |
5457
| **Secret Key** | The key must contain exactly eight characters and include any combination of alphanumeric characters (uppercase letters, lowercase letters, and numbers). |
58+
59+
[^1] RFC3414 User-based Security Model (USM) for version 3 of the Simple Network Management Protocol (SNMPv3)
60+
[^2] RFC3826 The Advanced Encryption Standard (AES) Cipher Algorithm in the SNMP User-based Security Model
5561

5662
5. Select **Save**.
5763

articles/iot-central/core/howto-migrate.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ The steps to migrate an application from V2 to V3 are:
2424

2525
1. Create a new V3 application from the V2 application.
2626
1. Configure the V3 application.
27-
1. Delete to V2 application.
27+
1. Delete the V2 application.
2828

2929
## Create a new V3 application
3030

0 commit comments

Comments
 (0)