Skip to content

Commit 72a4497

Browse files
committed
[AzureADDS] Additional doc and media updates
1 parent d433473 commit 72a4497

18 files changed

+34
-35
lines changed

articles/active-directory-domain-services/create-gmsa.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.service: active-directory
1010
ms.subservice: domain-services
1111
ms.workload: identity
1212
ms.topic: conceptual
13-
ms.date: 11/26/2019
13+
ms.date: 03/30/2020
1414
ms.author: iainfou
1515

1616
---
@@ -27,7 +27,7 @@ This article shows you how to create a gMSA in an Azure AD DS managed domain usi
2727
To complete this article, you need the following resources and privileges:
2828

2929
* An active Azure subscription.
30-
* If you dont have an Azure subscription, [create an account](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
30+
* If you don't have an Azure subscription, [create an account](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
3131
* An Azure Active Directory tenant associated with your subscription, either synchronized with an on-premises directory or a cloud-only directory.
3232
* If needed, [create an Azure Active Directory tenant][create-azure-ad-tenant] or [associate an Azure subscription with your account][associate-azure-ad-tenant].
3333
* An Azure Active Directory Domain Services managed domain enabled and configured in your Azure AD tenant.

articles/active-directory-domain-services/delete-aadds.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.service: active-directory
1010
ms.subservice: domain-services
1111
ms.workload: identity
1212
ms.topic: conceptual
13-
ms.date: 11/26/2019
13+
ms.date: 03/30/2020
1414
ms.author: iainfou
1515

1616
---

articles/active-directory-domain-services/deploy-kcd.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.service: active-directory
1010
ms.subservice: domain-services
1111
ms.workload: identity
1212
ms.topic: conceptual
13-
ms.date: 11/26/2019
13+
ms.date: 03/30/2020
1414
ms.author: iainfou
1515

1616
---
@@ -25,7 +25,7 @@ This article shows you how to configure resource-based Kerberos constrained dele
2525
To complete this article, you need the following resources:
2626

2727
* An active Azure subscription.
28-
* If you dont have an Azure subscription, [create an account](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
28+
* If you don't have an Azure subscription, [create an account](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
2929
* An Azure Active Directory tenant associated with your subscription, either synchronized with an on-premises directory or a cloud-only directory.
3030
* If needed, [create an Azure Active Directory tenant][create-azure-ad-tenant] or [associate an Azure subscription with your account][associate-azure-ad-tenant].
3131
* An Azure Active Directory Domain Services managed domain enabled and configured in your Azure AD tenant.

articles/active-directory-domain-services/join-windows-vm.md

Lines changed: 8 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: domain-services
99
ms.workload: identity
1010
ms.topic: tutorial
11-
ms.date: 02/19/2020
11+
ms.date: 03/30/2020
1212
ms.author: iainfou
1313

1414
#Customer intent: As an server administrator, I want to learn how to join a Windows Server VM to an Azure Active Directory Domain Services managed domain to provide centralized identity and policy.
@@ -24,14 +24,14 @@ In this tutorial, you learn how to:
2424
> * Connect the Windows Server VM to an Azure virtual network
2525
> * Join the VM to the Azure AD DS managed domain
2626
27-
If you dont have an Azure subscription, [create an account](https://azure.microsoft.com/free/?WT.mc_id=A261C142F) before you begin.
27+
If you don't have an Azure subscription, [create an account](https://azure.microsoft.com/free/?WT.mc_id=A261C142F) before you begin.
2828

2929
## Prerequisites
3030

3131
To complete this tutorial, you need the following resources:
3232

3333
* An active Azure subscription.
34-
* If you dont have an Azure subscription, [create an account](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
34+
* If you don't have an Azure subscription, [create an account](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
3535
* An Azure Active Directory tenant associated with your subscription, either synchronized with an on-premises directory or a cloud-only directory.
3636
* If needed, [create an Azure Active Directory tenant][create-azure-ad-tenant] or [associate an Azure subscription with your account][associate-azure-ad-tenant].
3737
* An Azure Active Directory Domain Services managed domain enabled and configured in your Azure AD tenant.
@@ -73,8 +73,6 @@ If you already have a VM that you want to domain-join, skip to the section to [j
7373

7474
RDP should only be enabled when required, and limited to a set of authorized IP ranges. This configuration helps improve the security of the VM and reduces the area for potential attack. Or, create and use an Azure Bastion host that allows access only through the Azure portal over TLS. In the next step of this tutorial, you use an Azure Bastion host to securely connect to the VM.
7575

76-
For now, disable direct RDP connections to the VM.
77-
7876
Under **Public inbound ports**, select *None*.
7977

8078
1. When done, select **Next: Disks**.
@@ -93,22 +91,23 @@ If you already have a VM that you want to domain-join, skip to the section to [j
9391

9492
![Choose to manage the subnet configuration in the Azure portal](./media/join-windows-vm/manage-subnet.png)
9593

96-
1. In the left-hand menu of the virtual network window, select **Address space**. The virtual network is created with a single address space of *10.0.1.0/24*, which is used by the default subnet.
94+
1. In the left-hand menu of the virtual network window, select **Address space**. The virtual network is created with a single address space of *10.0.2.0/24*, which is used by the default subnet. Other subnets, such as for *workloads* or Azure Bastion may also already exist.
9795

9896
Add an additional IP address range to the virtual network. The size of this address range and the actual IP address range to use depends on other network resources already deployed. The IP address range shouldn't overlap with any existing address ranges in your Azure or on-premises environment. Make sure that you size the IP address range large enough for the number of VMs you expect to deploy into the subnet.
9997

100-
In the following example, an additional IP address range of *10.0.2.0/24* is added. When ready, select **Save**.
98+
In the following example, an additional IP address range of *10.0.5.0/24* is added. When ready, select **Save**.
10199

102-
![Add an additional virtual network IP address range in the Azure portal](./media/tutorial-configure-networking/add-vnet-address-range.png)
100+
![Add an additional virtual network IP address range in the Azure portal](./media/join-windows-vm/add-vnet-address-range.png)
103101

104102
1. Next, in the left-hand menu of the virtual network window, select **Subnets**, then choose **+ Subnet** to add a subnet.
105103

106-
1. Select **+ Subnet**, then enter a name for the subnet, such as *management*. Provide an **Address range (CIDR block)**, such as *10.0.2.0/24*. Make sure that this IP address range doesn't overlap with any other existing Azure or on-premises address ranges. Leave the other options as their default values, then select **OK**.
104+
1. Select **+ Subnet**, then enter a name for the subnet, such as *management*. Provide an **Address range (CIDR block)**, such as *10.0.5.0/24*. Make sure that this IP address range doesn't overlap with any other existing Azure or on-premises address ranges. Leave the other options as their default values, then select **OK**.
107105

108106
![Create a subnet configuration in the Azure portal](./media/join-windows-vm/create-subnet.png)
109107

110108
1. It takes a few seconds to create the subnet. Once it's created, select the *X* to close the subnet window.
111109
1. Back in the **Networking** pane to create a VM, choose the subnet you created from the drop-down menu, such as *management*. Again, make sure you choose the correct subnet and don't deploy your VM in the same subnet as your Azure AD DS managed domain.
110+
1. For **Public IP**, select *None* from the drop-down menu, as you use Azure Bastion to connect to the management and don't need a public IP address assigned.
112111
1. Leave the other options as their default values, then select **Management**.
113112
1. Set **Boot diagnostics** to *Off*. Leave the other options as their default values, then select **Review + create**.
114113
1. Review the VM settings, then select **Create**.
27.2 KB
Loading
1.26 KB
Loading
-9.32 KB
Loading
-11.1 KB
Loading
-18.6 KB
Loading

0 commit comments

Comments
 (0)