Skip to content

Commit 7806cbf

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into yelevin/advanced-scheduling
2 parents 98047b0 + 2f1cda7 commit 7806cbf

File tree

203 files changed

+2529
-1515
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

203 files changed

+2529
-1515
lines changed

.openpublishing.redirection.active-directory.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4361,6 +4361,11 @@
43614361
"redirect_url": "/azure/active-directory/fundamentals/concept-fundamentals-mfa-get-started",
43624362
"redirect_document_id": true
43634363
},
4364+
{
4365+
"source_path_from_root": "/articles/active-directory/conditional-access/faqs.md",
4366+
"redirect_url": "/azure/active-directory/conditional-access/overview",
4367+
"redirect_document_id": false
4368+
},
43644369
{
43654370
"source_path_from_root": "/articles/active-directory/conditional-access/concept-baseline-protection.md",
43664371
"redirect_url": "/azure/active-directory/fundamentals/concept-fundamentals-security-defaults",

.openpublishing.redirection.azure-monitor.json

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4174,7 +4174,7 @@
41744174
},
41754175
{
41764176
"source_path_from_root": "/articles/azure-monitor/platform/autoscale-resource-log-schema.md",
4177-
"redirect_url": "/azure/azure-monitor/autoscale/autoscale-resource-log-schema",
4177+
"redirect_url": "/azure/azure-monitor/autoscale/autoscale-diagnostics",
41784178
"redirect_document_id": false
41794179
},
41804180
{
@@ -5681,6 +5681,11 @@
56815681
"source_path_from_root": "/articles/azure-monitor/app/windows-desktop.md",
56825682
"redirect_url": "https://github.com/Microsoft/appcenter",
56835683
"redirect_document_id": false
5684+
},
5685+
{
5686+
"source_path_from_root": "/articles/azure-monitor/autoscale/autoscale-resource-log-schema.md",
5687+
"redirect_url": "/azure/azure-monitor/autoscale/autoscale-diagnostics",
5688+
"redirect_document_id": false
56845689
}
56855690
]
56865691
}

articles/active-directory-b2c/azure-monitor.md

Lines changed: 12 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ ms.workload: identity
1111
ms.topic: how-to
1212
ms.author: kengaderdus
1313
ms.subservice: B2C
14-
ms.date: 07/12/2022
14+
ms.date: 01/31/2023
1515
---
1616

1717
# Monitor Azure AD B2C with Azure Monitor
@@ -66,7 +66,7 @@ In summary, you'll use Azure Lighthouse to allow a user or group in your Azure A
6666
First, create, or choose a resource group that contains the destination Log Analytics workspace that will receive data from Azure AD B2C. You'll specify the resource group name when you deploy the Azure Resource Manager template.
6767

6868
1. Sign in to the [Azure portal](https://portal.azure.com).
69-
1. Make sure you're using the directory that contains your Azure AD tenant. Select the **Directories + subscriptions** icon in the portal toolbar.
69+
1. Make sure you're using the directory that contains your *Azure AD* tenant. Select the **Directories + subscriptions** icon in the portal toolbar.
7070
1. On the **Portal settings | Directories + subscriptions** page, find your Azure AD directory in the **Directory name** list, and then select **Switch**.
7171
1. [Create a resource group](../azure-resource-manager/management/manage-resource-groups-portal.md#create-resource-groups) or choose an existing one. This example uses a resource group named _azure-ad-b2c-monitor_.
7272

@@ -75,7 +75,7 @@ First, create, or choose a resource group that contains the destination Log Anal
7575
A **Log Analytics workspace** is a unique environment for Azure Monitor log data. You'll use this Log Analytics workspace to collect data from Azure AD B2C [audit logs](view-audit-logs.md), and then visualize it with queries and workbooks, or create alerts.
7676

7777
1. Sign in to the [Azure portal](https://portal.azure.com).
78-
1. Make sure you're using the directory that contains your Azure AD tenant. Select the **Directories + subscriptions** icon in the portal toolbar.
78+
1. Make sure you're using the directory that contains your *Azure AD* tenant. Select the **Directories + subscriptions** icon in the portal toolbar.
7979
1. On the **Portal settings | Directories + subscriptions** page, find your Azure AD directory in the **Directory name** list, and then select **Switch**.
8080
1. [Create a Log Analytics workspace](../azure-monitor/logs/quick-create-workspace.md). This example uses a Log Analytics workspace named _AzureAdB2C_, in a resource group named _azure-ad-b2c-monitor_.
8181

@@ -88,7 +88,7 @@ In this step, you choose your Azure AD B2C tenant as a **service provider**. You
8888
First, get the **Tenant ID** of your Azure AD B2C directory (also known as the directory ID).
8989

9090
1. Sign in to the [Azure portal](https://portal.azure.com/).
91-
1. Make sure you're using the directory that contains your Azure AD B2C tenant. Select the **Directories + subscriptions** icon in the portal toolbar.
91+
1. Make sure you're using the directory that contains your *Azure AD B2C* tenant. Select the **Directories + subscriptions** icon in the portal toolbar.
9292
1. On the **Portal settings | Directories + subscriptions** page, find your Azure AD B2C directory in the **Directory name** list, and then select **Switch**.
9393
1. Select **Azure Active Directory**, select **Overview**.
9494
1. Record the **Tenant ID**.
@@ -110,7 +110,7 @@ To make management easier, we recommend using Azure AD user _groups_ for each ro
110110
To create the custom authorization and delegation in Azure Lighthouse, we use an Azure Resource Manager template. This template grants Azure AD B2C access to the Azure AD resource group, which you created earlier, for example, _azure-ad-b2c-monitor_. Deploy the template from the GitHub sample by using the **Deploy to Azure** button, which opens the Azure portal and lets you configure and deploy the template directly in the portal. For these steps, make sure you're signed in to your Azure AD tenant (not the Azure AD B2C tenant).
111111

112112
1. Sign in to the [Azure portal](https://portal.azure.com).
113-
1. Make sure you're using the directory that contains your Azure AD tenant. Select the **Directories + subscriptions** icon in the portal toolbar.
113+
1. Make sure you're using the directory that contains your *Azure AD tenant*. Select the **Directories + subscriptions** icon in the portal toolbar.
114114
1. On the **Portal settings | Directories + subscriptions** page, find your Azure AD directory in the **Directory name** list, and then select **Switch**.
115115
1. Use the **Deploy to Azure** button to open the Azure portal and deploy the template directly in the portal. For more information, see [create an Azure Resource Manager template](../lighthouse/how-to/onboard-customer.md#create-an-azure-resource-manager-template).
116116

@@ -172,7 +172,7 @@ You're ready to [create diagnostic settings](../active-directory/reports-monitor
172172

173173
To configure monitoring settings for Azure AD B2C activity logs:
174174

175-
1. Sign in to the [Azure portal](https://portal.azure.com/) with your Azure AD B2C administrative account. This account must be a member of the security group you specified in the [Select a security group](#32-select-a-security-group) step.
175+
1. Sign in to the [Azure portal](https://portal.azure.com/) with your *Azure AD B2C* administrative account. This account must be a member of the security group you specified in the [Select a security group](#32-select-a-security-group) step.
176176
1. Make sure you're using the directory that contains your Azure AD B2C tenant:
177177
1. Select the **Directories + subscriptions** icon in the portal toolbar.
178178
2. On the **Portal settings | Directories + subscriptions** page, find your Azure AD B2C directory in the **Directory name** list, and then select **Switch**.
@@ -207,6 +207,8 @@ Now you can configure your Log Analytics workspace to visualize your data and co
207207

208208
Log queries help you to fully use the value of the data collected in Azure Monitor Logs. A powerful query language allows you to join data from multiple tables, aggregate large sets of data, and perform complex operations with minimal code. Virtually any question can be answered and analysis performed as long as the supporting data has been collected, and you understand how to construct the right query. For more information, see [Get started with log queries in Azure Monitor](../azure-monitor/logs/get-started-queries.md).
209209

210+
1. Sign in to the [Azure portal](https://portal.azure.com).
211+
1. Make sure you're using the directory that contains your *Azure AD* tenant. Select the **Directories + subscriptions** icon in the portal toolbar.
210212
1. From **Log Analytics workspace** window, select **Logs**
211213
1. In the query editor, paste the following [Kusto Query Language](/azure/data-explorer/kusto/query/) query. This query shows policy usage by operation over the past x days. The default duration is set to 90 days (90d). Notice that the query is focused only on the operation where a token/code is issued by policy.
212214

@@ -256,6 +258,8 @@ Workbooks provide a flexible canvas for data analysis and the creation of rich v
256258

257259
Follow the instructions below to create a new workbook using a JSON Gallery Template. This workbook provides a **User Insights** and **Authentication** dashboard for Azure AD B2C tenant.
258260

261+
1. Sign in to the [Azure portal](https://portal.azure.com).
262+
1. Make sure you're using the directory that contains your *Azure AD* tenant. Select the **Directories + subscriptions** icon in the portal toolbar.
259263
1. From the **Log Analytics workspace** window, select **Workbooks**.
260264
1. From the toolbar, select **+ New** option to create a new workbook.
261265
1. On the **New workbook** page, select the **Advanced Editor** using the **</>** option on the toolbar.
@@ -286,6 +290,8 @@ Alerts are created by alert rules in Azure Monitor and can automatically run sav
286290

287291
Use the following instructions to create a new Azure Alert, which will send an [email notification](../azure-monitor/alerts/action-groups.md#configure-notifications) whenever there's a 25% drop in the **Total Requests** compared to previous period. Alert will run every 5 minutes and look for the drop in the last hour compared to the hour before it. The alerts are created using Kusto query language.
288292

293+
1. Sign in to the [Azure portal](https://portal.azure.com).
294+
1. Make sure you're using the directory that contains your *Azure AD* tenant. Select the **Directories + subscriptions** icon in the portal toolbar.
289295
1. From **Log Analytics workspace**, select **Logs**.
290296
1. Create a new **Kusto query** by using the query below.
291297

articles/active-directory-domain-services/tutorial-create-replica-set.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -100,7 +100,7 @@ The replica set reports as *Provisioning* as deployment continues, as shown in t
100100

101101
## Delete a replica set
102102

103-
A managed domain is currently limited to four replicas - the initial replica set, and three additional replica sets. If you don't need a replica set anymore, or if you want to create a replica set in another region, you can delete unneeded replica sets.
103+
A managed domain is currently limited to five replicas - the initial replica set, and four additional replica sets. If you don't need a replica set anymore, or if you want to create a replica set in another region, you can delete unneeded replica sets.
104104

105105
> [!IMPORTANT]
106106
> You can't delete either the last replica set or the initial replica set in a managed domain.

articles/active-directory/authentication/howto-mfa-reporting.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -143,7 +143,7 @@ The following additional information and reports are available for MFA events, i
143143
| Report | Location | Description |
144144
|:--- |:--- |:--- |
145145
| Blocked User History | Azure AD > Security > MFA > Block/unblock users | Shows the history of requests to block or unblock users. |
146-
| Usage for on-premises components | Azure AD > Security > MFA > Activity Report | Provides information on overall usage for MFA Server through the NPS extension, AD FS, and MFA Server. |
146+
| Usage for on-premises components | Azure AD > Security > MFA > Activity Report | Provides information on overall usage for MFA Server. NPS extension and AD FS logs for cloud MFA activity are now included in the [Sign-in logs](../reports-monitoring/concept-sign-ins.md), and no longer published on this report. |
147147
| Bypassed User History | Azure AD > Security > MFA > One-time bypass | Provides a history of MFA Server requests to bypass MFA for a user. |
148148
| Server status | Azure AD > Security > MFA > Server status | Displays the status of MFA Servers associated with your account. |
149149

articles/active-directory/conditional-access/TOC.yml

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -120,8 +120,6 @@
120120
href: troubleshoot-conditional-access-what-if.md
121121
- name: Troubleshoot continuous access evaluation
122122
href: howto-continuous-access-evaluation-troubleshoot.md
123-
- name: FAQ
124-
href: faqs.md
125123
- name: Custom controls
126124
href: controls.md
127125
- name: Classic policies

articles/active-directory/conditional-access/faqs.md

Lines changed: 0 additions & 63 deletions
This file was deleted.

articles/active-directory/develop/v2-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -51,7 +51,7 @@ Choose your preferred [application scenario](authentication-flows-app-scenarios.
5151

5252
As you work with the Microsoft identity platform to integrate authentication and authorization in your apps, you can refer to this image that outlines the most common app scenarios and their identity components. Select the image to view it full-size.
5353

54-
[![Metro map showing several application scenarios in Microsoft identity platform](./media/v2-overview/application-scenarios-identity-platform.png)](./media/v2-overview/application-scenarios-identity-platform.svg#lightbox)
54+
[![Metro map showing several application scenarios in Microsoft identity platform](./media/v2-overview/application-scenarios-identity-platform.png)](./media/v2-overview/application-scenarios-identity-platform.png#lightbox)
5555

5656
## Learn authentication concepts
5757

0 commit comments

Comments
 (0)