Skip to content

Commit 7f3f7d4

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into rolyon-mto-configuration-delete-steps
2 parents ac18a6a + cdeaf64 commit 7f3f7d4

File tree

8 files changed

+56
-50
lines changed

8 files changed

+56
-50
lines changed

articles/active-directory/fundamentals/whats-deprecated-azure-ad.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: What's deprecated in Azure Active Directory?
33
description: Learn about features being deprecated in Azure Active Directory
4-
author: jricketts
4+
author: janicericketts
55
manager: martinco
66
ms.service: active-directory
77
ms.subservice: fundamentals

articles/active-directory/reports-monitoring/how-to-view-applied-conditional-access-policies.md

Lines changed: 19 additions & 41 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.topic: how-to
1010
ms.workload: identity
1111
ms.subservice: report-monitor
12-
ms.date: 10/31/2022
12+
ms.date: 02/03/2023
1313
ms.author: sarahlipsey
1414
ms.reviewer: besiler
1515

@@ -32,41 +32,30 @@ As an Azure AD administrator, you can use the sign-in logs to:
3232

3333
Some scenarios require you to get an understanding of how your Conditional Access policies were applied to a sign-in event. Common examples include:
3434

35-
- *Helpdesk administrators* who need to look at applied Conditional Access policies to understand if a policy is the root cause of a ticket that a user opened.
35+
- Helpdesk administrators who need to look at applied Conditional Access policies to understand if a policy is the root cause of a ticket that a user opened.
3636

37-
- *Tenant administrators* who need to verify that Conditional Access policies have the intended effect on the users of a tenant.
37+
- Tenant administrators who need to verify that Conditional Access policies have the intended effect on the users of a tenant.
3838

3939
You can access the sign-in logs by using the Azure portal, Microsoft Graph, and PowerShell.
4040

4141
## Required administrator roles
4242

43-
To see applied Conditional Access policies in the sign-in logs, administrators must have permissions to view both the logs and the policies.
43+
To see applied Conditional Access policies in the sign-in logs, administrators must have permissions to view *both* the logs and the policies. The least privileged built-in role that grants *both* permissions is *Security Reader*. As a best practice, your Global Administrator should add the Security Reader role to the related administrator accounts.
4444

45-
The least privileged built-in role that grants both permissions is *Security Reader*. As a best practice, your global administrator should add the Security Reader role to the related administrator accounts.
46-
47-
The following built-in roles grant permissions to read Conditional Access policies:
45+
The following built-in roles grant permissions to *read Conditional Access policies*:
4846

4947
- Global Administrator
50-
5148
- Global Reader
52-
5349
- Security Administrator
54-
5550
- Security Reader
56-
5751
- Conditional Access Administrator
5852

59-
60-
The following built-in roles grant permission to view sign-in logs:
53+
The following built-in roles grant permission to *view sign-in logs*:
6154

6255
- Global Administrator
63-
6456
- Security Administrator
65-
6657
- Security Reader
67-
6858
- Global Reader
69-
7059
- Reports Reader
7160

7261
## Permissions for client apps
@@ -76,9 +65,7 @@ If you use a client app to pull sign-in logs from Microsoft Graph, your app need
7665
Any of the following permissions is sufficient for a client app to access applied certificate authority (CA) policies in sign-in logs through Microsoft Graph:
7766

7867
- `Policy.Read.ConditionalAccess`
79-
8068
- `Policy.ReadWrite.ConditionalAccess`
81-
8269
- `Policy.Read.All`
8370

8471
## Permissions for PowerShell
@@ -89,37 +76,28 @@ Like any other client app, the Microsoft Graph PowerShell module needs client pe
8976
- `AuditLog.Read.All`
9077
- `Directory.Read.All`
9178

92-
These permissions are the least privileged permissions with the necessary access.
93-
94-
To consent to the necessary permissions, use:
95-
96-
`Connect-MgGraph -Scopes Policy.Read.ConditionalAccess, AuditLog.Read.All, Directory.Read.All`
97-
98-
To view the sign-in logs, use:
79+
The following permissions are the least privileged permissions with the necessary access:
9980

100-
`Get-MgAuditLogSignIn`
81+
- To consent to the necessary permissions: `Connect-MgGraph -Scopes Policy.Read.ConditionalAccess, AuditLog.Read.All, Directory.Read.All`
82+
- To view the sign-in logs: `Get-MgAuditLogSignIn`
10183

10284
For more information about this cmdlet, see [Get-MgAuditLogSignIn](/powershell/module/microsoft.graph.reports/get-mgauditlogsignin).
10385

10486
The Azure AD Graph PowerShell module doesn't support viewing applied Conditional Access policies. Only the Microsoft Graph PowerShell module returns applied Conditional Access policies.
10587

106-
## Confirming access
107-
108-
On the **Conditional Access** tab, you see a list of Conditional Access policies applied to that sign-in event.
109-
110-
To confirm that you have admin access to view applied Conditional Access policies in the sign-in logs:
111-
112-
1. Go to the Azure portal.
113-
114-
2. In the upper-right corner, select your directory, and then select **Azure Active Directory** on the left pane.
88+
## View Conditional Access policies in Azure AD sign-in logs
11589

116-
3. In the **Monitoring** section, select **Sign-in logs**.
90+
The activity details of sign-in logs contain several tabs. The **Conditional Access** tab lists the Conditional Access policies applied to that sign-in event.
11791

118-
4. Select an item in the sign-in table to open the **Activity Details: Sign-ins context** pane.
92+
1. Sign in to the [Azure portal](https://portal.azure.com) using the Security Reader role.
93+
1. In the **Monitoring** section, select **Sign-in logs**.
94+
1. Select a sign-in item from the table to open the **Activity Details: Sign-ins context** pane.
95+
1. Select the **Conditional Access** tab.
11996

120-
5. Select the **Conditional Access** tab on the context pane. If your screen is small, you might need to select the ellipsis (**...**) to see all tabs on the context pane.
97+
If you don't see the Conditional Access policies, confirm you're using a role that provides access to both the sign-in logs and the Conditional Access policies.
12198

12299
## Next steps
123100

124-
* [Sign-in error code reference](./concept-sign-ins.md)
125-
* [Sign-in report overview](concept-sign-ins.md)
101+
* [Troubleshoot sign-in problems](../conditional-access/troubleshoot-conditional-access.md#azure-ad-sign-in-events)
102+
* [Review the Conditional Access sign-in logs FAQs](reports-faq.yml#conditional-access)
103+
* [Learn about the sign-in logs](concept-sign-ins.md)

articles/active-directory/reports-monitoring/overview-reports.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.topic: overview
1010
ms.workload: identity
1111
ms.subservice: report-monitor
12-
ms.date: 11/01/2022
12+
ms.date: 02/03/2023
1313
ms.author: sarahlipsey
1414
ms.reviewer: sarbar
1515

@@ -70,6 +70,6 @@ In addition to the user interface, Azure AD also provides you with [programmatic
7070

7171
## Next steps
7272

73-
- [Risky sign-ins report](../identity-protection/overview-identity-protection.md)
73+
- [Risky sign-ins report](../identity-protection/howto-identity-protection-investigate-risk.md#risky-sign-ins)
7474
- [Audit logs report](concept-audit-logs.md)
7575
- [Sign-ins logs report](concept-sign-ins.md)

articles/cosmos-db/index-policy.md

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ Azure Cosmos DB supports two indexing modes:
3131
> [!NOTE]
3232
> Azure Cosmos DB also supports a Lazy indexing mode. Lazy indexing performs updates to the index at a much lower priority level when the engine is not doing any other work. This can result in **inconsistent or incomplete** query results. If you plan to query an Azure Cosmos DB container, you should not select lazy indexing. New containers cannot select lazy indexing. You can request an exemption by contacting [email protected] (except if you are using an Azure Cosmos DB account in [serverless](serverless.md) mode which doesn't support lazy indexing).
3333
34-
By default, indexing policy is set to `automatic`. It's achieved by setting the `automatic` property in the indexing policy to `true`. Setting this property to `true` allows Azure Cosmos DB to automatically index documents as they're written.
34+
By default, indexing policy is set to `automatic`. It's achieved by setting the `automatic` property in the indexing policy to `true`. Setting this property to `true` allows Azure Cosmos DB to automatically index items as they're written.
3535

3636
## <a id="index-size"></a>Index size
3737

@@ -87,6 +87,10 @@ Any indexing policy has to include the root path `/*` as either an included or a
8787

8888
- If the indexing mode is set to **consistent**, the system properties `id` and `_ts` are automatically indexed.
8989

90+
- If an explicitly indexed path doesn't exist in an item, a value will be added to the index to indicate that the path is undefined.
91+
92+
All explicitly included paths will have values added to the index for each item in the container, even if the path is undefined for a given item.
93+
9094
See [this section](how-to-manage-indexing-policy.md#indexing-policy-examples) for indexing policy examples for including and excluding paths.
9195

9296
## Include/exclude precedence
@@ -127,7 +131,7 @@ Azure Cosmos DB, by default, won't create any spatial indexes. If you would like
127131

128132
Queries that have an `ORDER BY` clause with two or more properties require a composite index. You can also define a composite index to improve the performance of many equality and range queries. By default, no composite indexes are defined so you should [add composite indexes](how-to-manage-indexing-policy.md#composite-index) as needed.
129133

130-
Unlike with included or excluded paths, you can't create a path with the `/*` wildcard. Every composite path has an implicit `/?` at the end of the path that you don't need to specify. Composite paths lead to a scalar value that is the only value included in the composite index.
134+
Unlike with included or excluded paths, you can't create a path with the `/*` wildcard. Every composite path has an implicit `/?` at the end of the path that you don't need to specify. Composite paths lead to a scalar value that is the only value included in the composite index. If a path in a composite index doesn't exist in an item, a value will be added to the index to indicate that the path is undefined.
131135

132136
When defining a composite index, you specify:
133137

articles/load-balancer/basic/quickstart-basic-public-load-balancer-powershell.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ titleSuffix: Azure Load Balancer
44
description: This quickstart shows how to create a basic internal load balancer using Azure PowerShell
55
author: mbender-ms
66
ms.author: mbender
7-
ms.date: 03/22/2022
7+
ms.date: 02/03/2023
88
ms.topic: quickstart
99
ms.service: load-balancer
1010
ms.custom: devx-track-azurepowershell, mode-api
@@ -106,6 +106,7 @@ $lbrule = @{
106106
IdleTimeoutInMinutes = '15'
107107
FrontendIpConfiguration = $feip
108108
BackendAddressPool = $bePool
109+
Probe = $probe
109110
}
110111
$rule = New-AzLoadBalancerRuleConfig @lbrule
111112

articles/virtual-machines/dedicated-host-retirement.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -66,9 +66,9 @@ A:
6666

6767
A: You'll need to [exchange your reservation](../cost-management-billing/reservations/exchange-and-refund-azure-reservations.md#how-to-exchange-or-refund-an-existing-reservation) through the Azure portal to match the new Dedicated Host SKU.
6868

69-
### Q: What would happen if I do not migrate by March 31, 2023?
69+
### Q: What would happen to my host if I do not migrate by March 31, 2023?
7070

71-
A: After March 31, 2023 any dedicated hosts running the SKUs that are marked for retirement will be pushed to 'Host Pending Deallocate' before eventually deallocating the host. For additional assistance please reach out to Azure support.
71+
A: After March 31, 2023 any dedicated host running on the SKUs that are marked for retirement will be set to 'Host Pending Deallocate' state before eventually deallocating the host. For additional assistance please reach out to Azure support.
7272

7373
### Q: What will happen to my VMs if a Host is automatically deallocated?
7474

articles/virtual-machines/dedicated-hosts-how-to.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -178,6 +178,7 @@ If you set a fault domain count for your host group, you'll need to specify the
178178
1. Select *myDedicatedHostsRG* as the **Resource group**.
179179
1. In **Instance details**, type *myHost* for the **Name** and select *East US* for the location.
180180
1. In **Hardware profile**, select *Standard Es3 family - Type 1* for the **Size family**, select *myHostGroup* for the **Host group** and then select *1* for the **Fault domain**. Leave the defaults for the rest of the fields.
181+
1. Leave the **Automatically replace host on failure** setting *Enabled* to automatically service heal the host in case of any host level failure.
181182
1. When you're done, select **Review + create** and wait for validation.
182183
1. Once you see the **Validation passed** message, select **Create** to create the host.
183184

@@ -191,6 +192,7 @@ az vm host create \
191192
--name myHost \
192193
--sku DSv3-Type1 \
193194
--platform-fault-domain 1 \
195+
--auto-replace true \
194196
-g myDHResourceGroup
195197
```
196198

@@ -205,7 +207,7 @@ $dHost = New-AzHost `
205207
-Location $location -Name myHost `
206208
-ResourceGroupName $rgName `
207209
-Sku DSv3-Type1 `
208-
-AutoReplaceOnFailure 1 `
210+
-AutoReplaceOnFailure True `
209211
-PlatformFaultDomain 1
210212
```
211213

articles/virtual-machines/dedicated-hosts.md

Lines changed: 21 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -88,6 +88,27 @@ Known issues and limitations when using automatic VM placement:
8888
- You won't be able to redeploy your VM.
8989
- You won't be able to use DCv2, Lsv2, NVasv4, NVsv3, Msv2, or M-series VMs with dedicated hosts.
9090

91+
## Host Service Healing
92+
93+
In case of any failure relating to the underlying node, network connectivity or software issues can push the host and VMs on the host to a non-healthy state causing disruption and downtime to your workloads. The default action is for Azure to automatically service heal the impacted host to a healthy node and move all VMs to the healthy host. Once the VMs are service healed and restarted the impacted host will be deallocated. During the service healing process the host and VMs would become unavailable incurring a slight downtime.
94+
95+
The newly created host would have all the same constraints as the old host:
96+
- Resource group
97+
- Region
98+
- Fault Domain
99+
- Host Group
100+
- ADH SKU
101+
- Auto replace on failure setting
102+
103+
Users with compliance requirements might need a strong affinity between the host and underlying node and would not like to be automatically service healed, in such scenarios users can choose to opt out of auto service healing at host level by disabling the 'Automatically replace host on failure setting'.
104+
105+
### Implications
106+
107+
If you decide to disable auto service healing and if the underlying node encounters a failure your host state will change to 'Host Pending Deallocate' and will eventually be deallocated.
108+
109+
To avoid deallocation, you would need to manually redeploy the host by creating a new dedicated host and moving all the VMs from the old host to the new host.
110+
111+
The auto replace host setting is a create time setting and cannot be changed once the host is created. VMs that are manually stopped/deallocated from the impacted host are not moved as part of the automatic service healing.
91112

92113
## Virtual Machine Scale Set support
93114

0 commit comments

Comments
 (0)