Skip to content

Commit 76c602d

Browse files
authored
Merge pull request #248920 from MicrosoftDocs/main
8/21/2023 PM Publish
2 parents aa67947 + e39a4fa commit 76c602d

File tree

97 files changed

+1268
-322
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

97 files changed

+1268
-322
lines changed

.openpublishing.redirection.azure-monitor.json

Lines changed: 0 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -6310,11 +6310,6 @@
63106310
"redirect_url": "/azure/azure-monitor/agents/solution-agenthealth",
63116311
"redirect_document_id": false
63126312
},
6313-
{
6314-
"source_path_from_root": "/articles/azure-monitor/containers/container-insights-hybrid-setup.md",
6315-
"redirect_url": "/azure/azure-monitor/containers/container-insights-enable-arc-enabled-clusters",
6316-
"redirect_document_id": false
6317-
},
63186313
{
63196314
"source_path_from_root": "/articles/azure-monitor/containers/container-insights-optout-openshift-v3.md",
63206315
"redirect_url": "/azure/azure-monitor/containers/container-insights-optout",
@@ -6324,11 +6319,6 @@
63246319
"source_path_from_root": "/articles/azure-monitor/containers/container-insights-optout-openshift-v4.md",
63256320
"redirect_url": "/azure/azure-monitor/containers/container-insights-optout",
63266321
"redirect_document_id": false
6327-
},
6328-
{
6329-
"source_path_from_root": "/articles/azure-monitor/containers/container-insights-optout-hybrid.md",
6330-
"redirect_url": "/azure/azure-monitor/containers/container-insights-optout",
6331-
"redirect_document_id": false
63326322
}
63336323
]
63346324
}

articles/active-directory/authentication/concept-authentication-oath-tokens.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ OATH TOTP hardware tokens typically come with a secret key, or seed, pre-program
4040

4141
Programmable OATH TOTP hardware tokens that can be reseeded can also be set up with Azure AD in the software token setup flow.
4242

43-
OATH hardware tokens are supported as part of a public preview. For more information about previews, see [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/).
43+
OATH hardware tokens are supported as part of a public preview. For more information about previews, see [Supplemental Terms of Use for Microsoft Azure Previews](https://aka.ms/EntraPreviewsTermsOfUse).
4444

4545
:::image type="content" border="true" source="./media/concept-authentication-methods/oath-tokens.png" alt-text="Screenshot of OATH token management." lightbox="./media/concept-authentication-methods/oath-tokens.png":::
4646

articles/active-directory/authentication/howto-authentication-use-email-signin.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ ms.reviewer: calui
1717
# Sign-in to Azure AD with email as an alternate login ID (Preview)
1818

1919
> [!NOTE]
20-
> Sign-in to Azure AD with email as an alternate login ID is a public preview feature of Azure Active Directory. For more information about previews, see [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/).
20+
> Sign-in to Azure AD with email as an alternate login ID is a public preview feature of Azure Active Directory. For more information about previews, see [Supplemental Terms of Use for Microsoft Azure Previews](https://aka.ms/EntraPreviewsTermsOfUse).
2121
2222
Many organizations want to let users sign in to Azure Active Directory (Azure AD) using the same credentials as their on-premises directory environment. With this approach, known as hybrid authentication, users only need to remember one set of credentials.
2323

articles/active-directory/authentication/howto-mfa-mfasettings.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -139,7 +139,7 @@ OATH TOTP hardware tokens typically come with a secret key, or seed, pre-program
139139

140140
Programmable OATH TOTP hardware tokens that can be reseeded can also be set up with Azure AD in the software token setup flow.
141141

142-
OATH hardware tokens are supported as part of a public preview. For more information about previews, see [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms).
142+
OATH hardware tokens are supported as part of a public preview. For more information about previews, see [Supplemental Terms of Use for Microsoft Azure Previews](https://aka.ms/EntraPreviewsTermsOfUse).
143143

144144
![Screenshot that shows the OATH tokens section.](media/concept-authentication-methods/mfa-server-oath-tokens-azure-ad.png)
145145

articles/active-directory/devices/assign-local-admin.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -44,9 +44,9 @@ To view and update the membership of the [Global Administrator](/azure/active-di
4444

4545
[!INCLUDE [portal updates](~/articles/active-directory/includes/portal-update.md)]
4646

47-
In the Azure portal, you can manage the [Azure AD Joined Device Local Administrator](/azure/active-directory/roles/permissions-reference#azure-ad-joined-device-local-administrator) role from **Device settings**.
47+
You can manage the [Azure AD Joined Device Local Administrator](/azure/active-directory/roles/permissions-reference#azure-ad-joined-device-local-administrator) role from **Device settings**.
4848

49-
1. Sign in to the [Azure portal](https://portal.azure.com) as a Global Administrator.
49+
1. Sign in to the [Azure portal](https://portal.azure.com) as at least a [Cloud Device Administrator](../roles/permissions-reference.md#cloud-device-administrator).
5050
1. Browse to **Azure Active Directory** > **Devices** > **Device settings**.
5151
1. Select **Manage Additional local administrators on all Azure AD joined devices**.
5252
1. Select **Add assignments** then choose the other administrators you want to add and select **Add**.
@@ -111,5 +111,5 @@ Additionally, you can also add users using the command prompt:
111111

112112
## Next steps
113113

114-
- To get an overview of how to manage device in the Azure portal, see [managing devices using the Azure portal](manage-device-identities.md).
114+
- To get an overview of how to manage devices, see [managing devices using the Azure portal](manage-device-identities.md).
115115
- To learn more about device-based Conditional Access, see [Conditional Access: Require compliant or hybrid Azure AD joined device](../conditional-access/howto-conditional-access-policy-compliant-device.md).

articles/active-directory/devices/device-join-out-of-box.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,7 @@ Your device may restart several times as part of the setup process. Your device
4343
:::image type="content" source="media/device-join-out-of-box/windows-11-first-run-experience-device-sign-in-info.png" alt-text="Screenshot of Windows 11 out-of-box experience showing the sign-in experience.":::
4444
1. Continue to follow the prompts to set up your device.
4545
1. Azure AD checks if an enrollment in mobile device management is required and starts the process.
46-
1. Windows registers the device in the organization’s directory in Azure AD and enrolls it in mobile device management, if applicable.
46+
1. Windows registers the device in the organization’s directory and enrolls it in mobile device management, if applicable.
4747
1. If you sign in with a managed user account, Windows takes you to the desktop through the automatic sign-in process. Federated users are directed to the Windows sign-in screen to enter your credentials.
4848
:::image type="content" source="media/device-join-out-of-box/windows-11-first-run-experience-complete-automatic-sign-in-desktop.png" alt-text="Screenshot of Windows 11 at the desktop after first run experience Azure AD joined.":::
4949

@@ -57,7 +57,7 @@ To verify whether a device is joined to your Azure AD, review the **Access work
5757

5858
## Next steps
5959

60-
- For more information about managing devices in the Azure portal, see [managing devices using the Azure portal](manage-device-identities.md).
60+
- For more information about managing devices, see [managing devices using the Azure portal](manage-device-identities.md).
6161
- [What is Microsoft Intune?](/mem/intune/fundamentals/what-is-intune)
6262
- [Overview of Windows Autopilot](/mem/autopilot/windows-autopilot)
6363
- [Passwordless authentication options for Azure Active Directory](../authentication/concept-authentication-passwordless.md)

articles/active-directory/devices/enterprise-state-roaming-enable.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ Enterprise State Roaming provides users with a unified experience across their W
2626

2727
[!INCLUDE [portal updates](~/articles/active-directory/includes/portal-update.md)]
2828

29-
1. Sign in to the [Azure portal](https://portal.azure.com).
29+
1. Sign in to the [Azure portal](https://portal.azure.com) as a [Global Administrator](../roles/permissions-reference.md#global-administrator).
3030
1. Browse to **Azure Active Directory** > **Devices** > **Enterprise State Roaming**.
3131
1. Select **Users may sync settings and app data across devices**. For more information, see [how to configure device settings](./manage-device-identities.md).
3232

@@ -49,7 +49,7 @@ The country/region value is set as part of the Azure AD directory creation proce
4949

5050
Follow these steps to view a per-user device sync status report.
5151

52-
1. Sign in to the [Azure portal](https://portal.azure.com).
52+
1. Sign in to the [Azure portal](https://portal.azure.com) as a [Global Administrator](../roles/permissions-reference.md#global-administrator).
5353
1. Browse to **Azure Active Directory** > **Users** > **All users**.
5454
1. Select the user, and then select **Devices**.
5555
1. Select **View devices syncing settings and app data** to show sync status.

articles/active-directory/devices/enterprise-state-roaming-troubleshooting.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -70,7 +70,7 @@ Enterprise State Roaming requires the device to be registered with Azure AD. Alt
7070

7171
**Potential issue**: **WamDefaultSet** and **AzureAdJoined** both have “NO” in the field value, the device was domain-joined and registered with Azure AD, and the device doesn't sync. If it's showing this, the device may need to wait for policy to be applied or the authentication for the device failed when connecting to Azure AD. The user may have to wait a few hours for the policy to be applied. Other troubleshooting steps may include retrying autoregistration by signing out and back in, or launching the task in Task Scheduler. In some cases, running “*dsregcmd.exe /leave*” in an elevated command prompt window, rebooting, and trying registration again may help with this issue.
7272

73-
**Potential issue**: The field for **SettingsUrl** is empty and the device doesn't sync. The user may have last logged in to the device before Enterprise State Roaming was enabled in the Azure portal. Restart the device and have the user login. Optionally, in the portal, try having the IT Admin navigate to **Azure Active Directory** > **Devices** > **Enterprise State Roaming** disable and re-enable **Users may sync settings and app data across devices**. Once re-enabled, restart the device and have the user login. If this doesn't resolve the issue, **SettingsUrl** may be empty if there's a bad device certificate. In this case, running “*dsregcmd.exe /leave*” in an elevated command prompt window, rebooting, and trying registration again may help with this issue.
73+
**Potential issue**: The field for **SettingsUrl** is empty and the device doesn't sync. The user may have last logged in to the device before Enterprise State Roaming was enabled. Restart the device and have the user login. Optionally, in the portal, try having the IT Admin navigate to **Azure Active Directory** > **Devices** > **Enterprise State Roaming** disable and re-enable **Users may sync settings and app data across devices**. Once re-enabled, restart the device and have the user login. If this doesn't resolve the issue, **SettingsUrl** may be empty if there's a bad device certificate. In this case, running “*dsregcmd.exe /leave*” in an elevated command prompt window, rebooting, and trying registration again may help with this issue.
7474

7575
## Enterprise State Roaming and multifactor authentication
7676

articles/active-directory/devices/faq.yml

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -20,10 +20,10 @@ summary: |
2020
sections:
2121
- name: General FAQ
2222
questions:
23-
- question: I registered the device recently. Why can't I see the device under my user info in the Azure portal? Or why is the device owner marked as N/A for hybrid Azure Active Directory (Azure AD) joined devices?
23+
- question: I registered the device recently. Why can't I see the device under my user info? Or why is the device owner marked as N/A for hybrid Azure Active Directory (Azure AD) joined devices?
2424
answer: |
2525
Windows 10 or newer devices that are hybrid Azure AD joined don't show up under **USER devices**.
26-
Use the **All devices** view in the Azure portal. You can also use a PowerShell [Get-MsolDevice](/powershell/module/msonline/get-msoldevice) cmdlet.
26+
Use the **All devices** view. You can also use a PowerShell [Get-MsolDevice](/powershell/module/msonline/get-msoldevice) cmdlet.
2727
2828
Only the following devices are listed under **USER devices**:
2929
@@ -35,7 +35,7 @@ sections:
3535
3636
- question: How do I know what the device registration state of the client is?
3737
answer: |
38-
In the Azure portal, go to **All devices**. Search for the device by using the device ID. Check the value under the join type column. Sometimes, the device might be reset or reimaged. So it's essential to also check the device registration state on the device:
38+
Go to **All devices**. Search for the device by using the device ID. Check the value under the join type column. Sometimes, the device might be reset or reimaged. So it's essential to also check the device registration state on the device:
3939
4040
- For Windows 10 or newer and Windows Server 2016 or later devices, run `dsregcmd.exe /status`.
4141
- For down-level OS versions, run `%programFiles%\Microsoft Workplace Join\autoworkplace.exe`.
@@ -47,7 +47,7 @@ sections:
4747
4848
4949
50-
- question: I see the device record under the USER info in the Azure portal. And I see the state as registered on the device. Am I set up correctly to use Conditional Access?
50+
- question: I see the device record under the USER info and I see the state as registered. Am I set up correctly to use Conditional Access?
5151
answer: |
5252
The device join state, shown by **deviceID**, must match the state on Azure AD and meet any evaluation criteria for Conditional Access.
5353
For more information, see [Require managed devices for cloud app access with Conditional Access](../conditional-access/concept-conditional-access-grant.md).
@@ -59,15 +59,15 @@ sections:
5959
On Windows 10/11 devices joined or registered with Azure AD, users are issued a [Primary refresh token (PRT)](concept-primary-refresh-token.md) which enables single sign-on. The validity of the PRT is based on the validity of the device itself. Users see this message if the device is either deleted or disabled in Azure AD without initiating the action from the device itself. A device can be deleted or disabled in Azure AD one of the following scenarios:
6060
6161
- User disables the device from the My Apps portal.
62-
- An administrator (or user) deletes or disables the device in the Azure portal or by using PowerShell
63-
- Hybrid Azure AD joined only: An administrator removes the devices OU out of sync scope resulting in the devices being deleted from Azure AD
64-
- Hybrid Azure AD joined only: An administrator disables the computer account on premises, resulting in the device being disabled in Azure AD
62+
- An administrator (or user) deletes or disables the device.
63+
- Hybrid Azure AD joined only: An administrator removes the devices OU out of sync scope resulting in the devices being deleted from Azure AD.
64+
- Hybrid Azure AD joined only: An administrator disables the computer account on premises, resulting in the device being disabled in Azure AD.
6565
- Upgrading Azure AD connect to the version 1.4.xx.x. [Understanding Azure AD Connect 1.4.xx.x and device disappearance](/troubleshoot/azure/active-directory/reference-connect-device-disappearance).
6666
6767
6868
6969
70-
- question: I disabled or deleted my device in the Azure portal or by using Windows PowerShell. But the local state on the device says it's still registered. What should I do?
70+
- question: I disabled or deleted my device, but the local state on the device says it's still registered. What should I do?
7171
answer: |
7272
This operation is by design. In this case, the device doesn't have access to resources in the cloud. Administrators can perform this action for stale, lost, or stolen devices to prevent unauthorized access. If this action was performed unintentionally, you need to re-enable or re-register the device using the steps that follow:
7373
@@ -104,7 +104,7 @@ sections:
104104
105105
106106
107-
- question: Why do I see duplicate device entries in the Azure portal?
107+
- question: Why do I see duplicate device entries?
108108
answer: |
109109
- For Windows 10 or newer and Windows Server 2016 or later, repeated tries to unjoin and rejoin the same device might cause duplicate entries.
110110
- Each Windows user who uses **Add Work or School Account** creates a new device record with the same device name.
@@ -116,7 +116,7 @@ sections:
116116
- question: Does Windows 10/11 device registration in Azure AD support TPMs in FIPS mode?
117117
answer: Windows 10/11 device registration is only supported for FIPS-compliant TPM 2.0 and not supported for TPM 1.2. If your devices have FIPS-compliant TPM 1.2, you must disable them before proceeding with Azure AD join or Hybrid Azure AD join. Microsoft doesn't provide any tools for disabling FIPS mode for TPMs as it is dependent on the TPM manufacturer. Contact your hardware OEM for support.
118118

119-
- question: Why can a user still access resources from a device I disabled in the Azure portal?
119+
- question: Why can a user still access resources from a device I disabled?
120120
answer: |
121121
It takes up to an hour for a revoke to be applied from the time the Azure AD device is marked as disabled.
122122
@@ -161,7 +161,7 @@ sections:
161161
162162
- question: Can a guest user sign in to an Azure AD joined device?
163163
answer: |
164-
No, currently, guest users can not sign in to an Azure AD joined device.
164+
No, currently, guest users can't sign in to an Azure AD joined device.
165165
166166
167167

articles/active-directory/devices/how-to-hybrid-join-verify.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -31,10 +31,10 @@ For downlevel devices, see the article [Troubleshooting hybrid Azure Active Dire
3131

3232
## Using the Azure portal
3333

34-
1. Go to the devices page using a [direct link](https://portal.azure.com/#blade/Microsoft_AAD_IAM/DevicesMenuBlade/Devices).
35-
2. Information on how to locate a device can be found in [How to manage device identities using the Azure portal](./manage-device-identities.md).
36-
3. If the **Registered** column says **Pending**, then hybrid Azure AD join hasn't completed. In federated environments, this state happens only if it failed to register and Azure AD Connect is configured to sync the devices. Wait for Azure AD Connect to complete a sync cycle.
37-
4. If the **Registered** column contains a **date/time**, then hybrid Azure AD join has completed.
34+
1. Sign in to the [Azure portal](https://portal.azure.com) as at least a [Cloud Device Administrator](../roles/permissions-reference.md#cloud-device-administrator).
35+
1. Browse to **Azure Active Directory** > **Devices** > **All devices**.
36+
1. If the **Registered** column says **Pending**, then hybrid Azure AD join hasn't completed. In federated environments, this state happens only if it failed to register and Azure AD Connect is configured to sync the devices. Wait for Azure AD Connect to complete a sync cycle.
37+
1. If the **Registered** column contains a **date/time**, then hybrid Azure AD join has completed.
3838

3939
## Using PowerShell
4040

0 commit comments

Comments
 (0)