Skip to content

Commit 7ba1594

Browse files
authored
Merge pull request #245343 from MicrosoftDocs/repo_sync_working_branch
Confirm merge from repo_sync_working_branch to main to sync with https://github.com/MicrosoftDocs/azure-docs (branch main)
2 parents 91f8fd6 + 17397b8 commit 7ba1594

File tree

10 files changed

+62
-12
lines changed

10 files changed

+62
-12
lines changed

articles/active-directory/authentication/concept-registration-mfa-sspr-combined.md

Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -171,6 +171,13 @@ Or, you can specify a tenant by URL to access security information.
171171

172172
`https://mysignins.microsoft.com/security-info/?tenantId=<Tenant ID>`
173173

174+
> [!NOTE]
175+
> Customers attempting to register or manage security info through combined registration or the My Sign-ins page should use a modern browser such as Microsoft Edge.
176+
>
177+
> IE11 is not officially supported for creating a webview or browser in applications as it will not work as expected in all scenarios.
178+
>
179+
> Applications that have not been updated and are still using Azure AD Authentication Library (ADAL) that rely on legacy webviews can fallback to older versions of IE. In these scenarios, users will experience a blank page when directed to the My Sign-ins page. To resolve this issue, switch to a modern browser.
180+
174181
## Next steps
175182

176183
To get started, see the tutorials to [enable self-service password reset](tutorial-enable-sspr.md) and [enable Azure AD Multi-Factor Authentication](tutorial-enable-azure-mfa.md).

articles/active-directory/fundamentals/users-default-permissions.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -60,7 +60,7 @@ You can restrict default permissions for member users in the following ways:
6060
| **Create Microsoft 365 groups** | Setting this option to **No** prevents users from creating Microsoft 365 groups. Setting this option to **Some** allows a set of users to create Microsoft 365 groups. Global administrators and user administrators can still create Microsoft 365 groups. To learn how, see [Azure Active Directory cmdlets for configuring group settings](../enterprise-users/groups-settings-cmdlets.md). |
6161
| **Restrict access to Azure AD administration portal** | **What does this switch do?** <br>**No** lets non-administrators browse the Azure AD administration portal. <br>**Yes** Restricts non-administrators from browsing the Azure AD administration portal. Non-administrators who are owners of groups or applications are unable to use the Azure portal to manage their owned resources. </p><p></p><p>**What does it not do?** <br> It doesn't restrict access to Azure AD data using PowerShell, Microsoft GraphAPI, or other clients such as Visual Studio. <br>It doesn't restrict access as long as a user is assigned a custom role (or any role). </p><p></p><p>**When should I use this switch?** <br>Use this option to prevent users from misconfiguring the resources that they own. </p><p></p><p>**When should I not use this switch?** <br>Don't use this switch as a security measure. Instead, create a Conditional Access policy that targets Microsoft Azure Management that blocks non-administrators access to [Microsoft Azure Management](../conditional-access/concept-conditional-access-cloud-apps.md#microsoft-azure-management). </p><p></p><p> **How do I grant only a specific non-administrator users the ability to use the Azure AD administration portal?** <br> Set this option to **Yes**, then assign them a role like global reader. </p><p></p><p>**Restrict access to the Entra administration portal** <br>A Conditional Access policy that targets Microsoft Azure Management targets access to all Azure management. |
6262
| **Restrict non-admin users from creating tenants** | Users can create tenants in the Azure AD and Entra administration portal under Manage tenant. The creation of a tenant is recorded in the Audit log as category DirectoryManagement and activity Create Company. Anyone who creates a tenant becomes the Global Administrator of that tenant. The newly created tenant doesn't inherit any settings or configurations. </p><p></p><p>**What does this switch do?** <br> Setting this option to **Yes** restricts creation of Azure AD tenants to the Global Administrator or tenant creator roles. Setting this option to **No** allows non-admin users to create Azure AD tenants. Tenant create will continue to be recorded in the Audit log. </p><p></p><p>**How do I grant only a specific non-administrator users the ability to create new tenants?** <br> Set this option to Yes, then assign them the tenant creator role.|
63-
| **Restrict users from recovering the BitLocker key(s) for their owned devices** | Setting this option to **Yes** restricts users from being able to self-service recover BitLocker key(s) for their owned devices. Users will have to contact their organization's helpdesk to retrieve their BitLocker keys. Setting this option to **No** allows users to recover their BitLocker key(s). |
63+
| **Restrict users from recovering the BitLocker key(s) for their owned devices** | This setting can be found in the Azure AD and Entral portal in the Device Settings. Setting this option to **Yes** restricts users from being able to self-service recover BitLocker key(s) for their owned devices. Users will have to contact their organization's helpdesk to retrieve their BitLocker keys. Setting this option to **No** allows users to recover their BitLocker key(s). |
6464
| **Read other users** | This setting is available in Microsoft Graph and PowerShell only. Setting this flag to `$false` prevents all non-admins from reading user information from the directory. This flag doesn't prevent reading user information in other Microsoft services like Exchange Online.</p><p>This setting is meant for special circumstances, so we don't recommend setting the flag to `$false`. |
6565

6666
The **Restrict non-admin users from creating tenants** option is shown [below](https://portal.azure.com/#view/Microsoft_AAD_IAM/ActiveDirectoryMenuBlade/~/UserSettings)

articles/active-directory/hybrid/connect/how-to-connect-syncservice-features.md

Lines changed: 42 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -28,9 +28,40 @@ This topic explains how the following features of the **Azure AD Connect sync se
2828

2929
These settings are configured by the [Azure Active Directory Module for Windows PowerShell](/previous-versions/azure/jj151815(v=azure.100)). Download and install it separately from Azure AD Connect. The cmdlets documented in this topic were introduced in the [2016 March release (build 9031.1)](https://social.technet.microsoft.com/wiki/contents/articles/28552.microsoft-azure-active-directory-powershell-module-version-release-history.aspx#Version_9031_1). If you do not have the cmdlets documented in this topic or they do not produce the same result, then make sure you run the latest version.
3030

31-
To see the configuration in your Azure AD directory, run `Get-MsolDirSyncFeatures`.
31+
To see the configuration in your Azure AD directory, run `Get-MsolDirSyncFeatures`.
3232
![Get-MsolDirSyncFeatures result](./media/how-to-connect-syncservice-features/getmsoldirsyncfeatures.png)
3333

34+
To see the configuration in your Azure AD directory using the Graph Powershell, use the following commands:
35+
```powershell
36+
Connect-MgGraph -Scopes OnPremDirectorySynchronization.Read.All, OnPremDirectorySynchronization.ReadWrite.All
37+
38+
Get-MgDirectoryOnPremisSynchronization | Select-Object -ExpandProperty Features | Format-List
39+
```
40+
41+
The output looks similar to `Get-MsolDireSyncFeatures`:
42+
```powershell
43+
BlockCloudObjectTakeoverThroughHardMatchEnabled : False
44+
BlockSoftMatchEnabled : False
45+
BypassDirSyncOverridesEnabled : False
46+
CloudPasswordPolicyForPasswordSyncedUsersEnabled : False
47+
ConcurrentCredentialUpdateEnabled : False
48+
ConcurrentOrgIdProvisioningEnabled : False
49+
DeviceWritebackEnabled : False
50+
DirectoryExtensionsEnabled : True
51+
FopeConflictResolutionEnabled : False
52+
GroupWriteBackEnabled : False
53+
PasswordSyncEnabled : True
54+
PasswordWritebackEnabled : False
55+
QuarantineUponProxyAddressesConflictEnabled : False
56+
QuarantineUponUpnConflictEnabled : False
57+
SoftMatchOnUpnEnabled : True
58+
SynchronizeUpnForManagedUsersEnabled : False
59+
UnifiedGroupWritebackEnabled : True
60+
UserForcePasswordChangeOnLogonEnabled : False
61+
UserWritebackEnabled : True
62+
AdditionalProperties : {}
63+
```
64+
3465
Many of these settings can only be changed by Azure AD Connect.
3566

3667
The following settings can be configured by `Set-MsolDirSyncFeature`:
@@ -72,7 +103,12 @@ If you need to match on-premises AD accounts with existing accounts created in t
72103
This feature is on by default for newly created Azure AD directories. You can see if this feature is enabled for you by running:
73104

74105
```powershell
106+
## Using the MSOnline module
75107
Get-MsolDirSyncFeatures -Feature EnableSoftMatchOnUpn
108+
109+
## Using the Graph Powershell module
110+
$Config = Get-MgDirectoryOnPremisSynchronization
111+
$Config.Features.SoftMatchOnUpnEnabled
76112
```
77113

78114
If this feature is not enabled for your Azure AD directory, then you can enable it by running:
@@ -106,7 +142,12 @@ Enabling this feature allows the sync engine to update the userPrincipalName whe
106142
This feature is on by default for newly created Azure AD directories. You can see if this feature is enabled for you by running:
107143

108144
```powershell
145+
## Using the MSOnline module
109146
Get-MsolDirSyncFeatures -Feature SynchronizeUpnForManagedUsers
147+
148+
## Using the Graph Powershell module
149+
$config = Get-MgDirectoryOnPremisSynchronization
150+
$config.Features.SynchronizeUpnForManagedUsersEnabled
110151
```
111152

112153
If this feature is not enabled for your Azure AD directory, then you can enable it by running:

articles/active-directory/hybrid/get-started.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,7 @@ Use these tasks if you're deploying Azure AD Connect to integrate with Active Di
4141

4242
|Task|Description|
4343
|-----|-----|
44-
|[Determine which sync tool is correct for you](https://setup.microsoft.com/azure/add-or-sync-users-to-microsoft-365) |Use the wizard to determine whether cloud sync or Azure AD Connect is the right tool for you.|
44+
|[Determine which sync tool is correct for you](https://setup.microsoft.com/azure/add-or-sync-users-to-azure-ad) |Use the wizard to determine whether cloud sync or Azure AD Connect is the right tool for you.|
4545
|[Review the Azure AD Connect prerequisites](connect/how-to-connect-install-prerequisites.md)|Review the necessary prerequisites before getting started.|
4646
|[Review and choose an installation type](connect/how-to-connect-install-select-installation.md)|Determine whether you'll use express or custom installation.|
4747
|[Download Azure AD Connect](https://www.microsoft.com/download/details.aspx?id=47594)|Download Azure AD Connect.|

articles/active-directory/managed-identities-azure-resources/qs-configure-powershell-windows-vm.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -95,7 +95,7 @@ If you have a Virtual Machine that no longer needs the system-assigned managed i
9595

9696
```azurepowershell-interactive
9797
$vm = Get-AzVM -ResourceGroupName myResourceGroup -Name myVM
98-
Update-AzVm -ResourceGroupName myResourceGroup -VM $vm -IdentityType "UserAssigned"
98+
Update-AzVm -ResourceGroupName myResourceGroup -VM $vm -IdentityType "UserAssigned" -IdentityID "/subscriptions/<SUBSCRIPTION ID>/resourcegroups/<RESROURCE GROUP>/providers/Microsoft.ManagedIdentity/userAssignedIdentities/<USER ASSIGNED IDENTITY NAME>..."
9999
```
100100

101101
If you have a virtual machine that no longer needs system-assigned managed identity and it has no user-assigned managed identities, use the following commands:

articles/azure-resource-manager/custom-providers/overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@ Azure Custom Resource Providers are made by creating a contract between Azure an
3636

3737
## How to build custom resource providers
3838

39-
Custom resource providers are a list of contracts between Azure and endpoints. This contract describes how Azure should interact with an endpoint. The resource provider acts like a proxy and will forward requests and responses to and from the specified **endpoint**. A resource provider can specify two types of contracts: [**resourceTypes**](./custom-providers-resources-endpoint-how-to.md) and [**actions**](./custom-providers-action-endpoint-how-to.md). These are enabled through endpoint definitions. An endpoint definition is comprised of three fields: **name**, **routingType**, and **endpoint**.
39+
Custom resource providers are a list of contracts between Azure and endpoints. These contracts describe how Azure should interact with their endpoints. The resource providers act like a proxy and will forward requests and responses to and from their specified **endpoint**. A resource provider can specify two types of contracts: [**resourceTypes**](./custom-providers-resources-endpoint-how-to.md) and [**actions**](./custom-providers-action-endpoint-how-to.md). These are enabled through endpoint definitions. An endpoint definition is comprised of three fields: **name**, **routingType**, and **endpoint**.
4040

4141
Sample Endpoint:
4242

articles/machine-learning/how-to-configure-network-isolation-with-v2.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -105,13 +105,13 @@ The Azure CLI [extension v1 for machine learning](./v1/reference-azure-machine-l
105105
> The `v1-legacy-mode` parameter is only available in version 1.41.0 or newer of the Azure CLI extension for machine learning v1 (`azure-cli-ml`). Use the `az version` command to view version information.
106106
107107
```azurecli
108-
az ml workspace update -g <myresourcegroup> -w <myworkspace> --v1-legacy-mode False
108+
az ml workspace update -g <myresourcegroup> -n <myworkspace> --v1-legacy-mode False
109109
```
110110

111111
The return value of the `az ml workspace update` command may not show the updated value. To view the current state of the parameter, use the following command:
112112

113113
```azurecli
114-
az ml workspace show -g <myresourcegroup> -w <myworkspace> --query v1LegacyMode
114+
az ml workspace show -g <myresourcegroup> -n <myworkspace> --query v1LegacyMode
115115
```
116116

117117
---

articles/purview/how-to-managed-attributes.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -97,7 +97,7 @@ Once you have created managed attributes, you can refine your [data catalog sear
9797

9898
Below are the known limitations of the managed attribute feature as it currently exists in Microsoft Purview.
9999

100-
- Managed attributes can only be expired, not deleted.
100+
- Managed attributes can only be deleted if they have not been applied to any assets.
101101
- Managed attributes can't be applied via the bulk edit experience.
102102
- After creating an attribute group, you can't edit the name of the attribute group.
103103
- After creating a managed attribute, you can't update the attribute name, attribute group or the field type.

articles/virtual-machines/linux/azure-hybrid-benefit-linux.md

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,15 +2,15 @@
22
title: Azure Hybrid Benefit for Linux virtual machines
33
description: Learn how Azure Hybrid Benefit can save you money on Linux virtual machines.
44
services: virtual-machines
5-
author: mathapli
5+
author: Dhiraj3030
66
manager: gachandw
77
ms.service: virtual-machines
88
ms.subservice: billing
99
ms.collection: linux
1010
ms.topic: conceptual
1111
ms.workload: infrastructure-services
1212
ms.date: 05/02/2023
13-
ms.author: mattmcinnes
13+
ms.author: dkulkarni
1414
ms.custom: kr2b-contr-experiment
1515
---
1616

@@ -122,13 +122,15 @@ az vm update -g myResourceGroup -n myVmName --license-type SLES_BYOS
122122

123123
#### Convert to PAYG using the Azure CLI
124124

125-
To return a VM to a PAYG model, use a `--license-type` value of `None`:
125+
If the system was originally a PAYG image and you want to return the VM to a PAYG model, use a `--license-type` value of `None`. For example:
126126

127127
```azurecli
128128
# This will enable PAYG on a virtual machine using Azure Hybrid Benefit
129129
az vm update -g myResourceGroup -n myVmName --license-type None
130130
```
131131

132+
If you have a BYOS and want to convert the VM to PAYG, use a `--license-type` value that covers the VM needs as described futher in this article. For example, for RHEL systems you can use any of the following: RHEL_BASE, RHEL_EUS, RHEL_SAPAPPS, RHEL_SAPHA, RHEL_BASEAPAPPS or RHEL_BASESAPHA.
133+
132134
#### Convert multiple VM license models simultaneously using the Azure CLI
133135

134136
To switch the licensing model on a large number of virtual machines, you can use the `--ids` parameter in the Azure CLI:

articles/virtual-network/tutorial-filter-network-traffic.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -100,7 +100,7 @@ An [application security group (ASGs)](application-security-groups.md) enables y
100100

101101
A [network security group (NSG)](network-security-groups-overview.md) secures network traffic in your virtual network.
102102

103-
1. From the Azure portal menu, select **+ Create a resource** > **Networking** > **Network security group**, or search for *Network security group* in the portal search box.
103+
1. From the Azure portal menu, select **+ Create a resource** > **Networking** > **Network security group**, or use the portal search box to search for **Network security group** (not *Network security group (classic)*).
104104

105105
1. Select **Create**.
106106

0 commit comments

Comments
 (0)