Skip to content

Commit 818fe02

Browse files
committed
Merging changes synced from https://github.com/MicrosoftDocs/azure-docs-pr (branch live)
2 parents bea19b9 + 78da81b commit 818fe02

File tree

168 files changed

+1592
-1284
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

168 files changed

+1592
-1284
lines changed

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -6813,6 +6813,11 @@
68136813
"redirect_url": "/azure/azure-functions/functions-bindings-error-pages",
68146814
"redirect_document_id": false
68156815
},
6816+
{
6817+
"source_path_from_root": "/articles/azure-functions/functions-debug-event-grid-trigger-local.md",
6818+
"redirect_url": "/azure/azure-functions/functions-event-grid-blob-trigger",
6819+
"redirect_document_id": false
6820+
},
68166821
{
68176822
"source_path_from_root": "/articles/azure-government/documentation-government-k8.md",
68186823
"redirect_url": "/azure/azure-government",

articles/active-directory/governance/entitlement-management-access-package-auto-assignment-policy.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -28,6 +28,10 @@ During this preview, you can have at most one automatic assignment policy in an
2828

2929
This article describes how to create an access package automatic assignment policy for an existing access package.
3030

31+
## Before you begin
32+
33+
You'll need to have attributes populated on the users who will be in scope for being assigned access. The attributes you can use in the rules criteria of an access package assignment policy are those attributes listed in [supported properties](../enterprise-users/groups-dynamic-membership.md#supported-properties), along with [extension attributes and custom extension properties](../enterprise-users/groups-dynamic-membership.md#extension-properties-and-custom-extension-properties). These attributes can be brought into Azure AD from [Graph](/graph/api/resources/user?view=graph-rest-beta), an HR system such as [SuccessFactors](../app-provisioning/sap-successfactors-integration-reference.md), [Azure AD Connect cloud sync](../cloud-sync/how-to-attribute-mapping.md) or [Azure AD Connect sync](../hybrid/how-to-connect-sync-feature-directory-extensions.md).
34+
3135
## Create an automatic assignment policy (Preview)
3236

3337
To create a policy for an access package, you need to start from the access package's policy tab. Follow these steps to create a new policy for an access package.
@@ -45,7 +49,7 @@ To create a policy for an access package, you need to start from the access pack
4549
1. Provide a dynamic membership rule, using the [membership rule builder](../enterprise-users/groups-dynamic-membership.md) or by clicking **Edit** on the rule syntax text box.
4650

4751
> [!NOTE]
48-
> The rule builder might not be able to display some rules constructed in the text box. For more information, see [rule builder in the Azure portal](/enterprise-users/groups-create-rule.md#rule-builder-in-the-azure-portal).
52+
> The rule builder might not be able to display some rules constructed in the text box, and validating a rule currently requires the you to be in the Global administrator role. For more information, see [rule builder in the Azure portal](/enterprise-users/groups-create-rule.md#rule-builder-in-the-azure-portal).
4953
5054
![Screenshot of an access package automatic assignment policy rule configuration.](./media/entitlement-management-access-package-auto-assignment-policy/auto-assignment-rule-configuration.png)
5155

articles/active-directory/governance/manage-guest-access-with-access-reviews.md

Lines changed: 10 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -4,14 +4,14 @@ description: Manage guest users as members of a group or assigned to an applicat
44
services: active-directory
55
documentationcenter: ''
66
author: amsliu
7-
manager: karenhoran
7+
manager: amycolannino
88
editor: markwahl-msft
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.tgt_pltfrm: na
1212
ms.topic: conceptual
1313
ms.subservice: compliance
14-
ms.date: 4/16/2021
14+
ms.date: 08/23/2021
1515
ms.author: amsliu
1616
ms.reviewer: mwahl
1717
ms.collection: M365-identity-device-management
@@ -38,7 +38,7 @@ For more information, [License requirements](access-reviews-overview.md#license-
3838
First, you must be assigned one of the following roles:
3939
- global administrator
4040
- User administrator
41-
- (Preview) M365 or AAD Security Group owner of the group to be reviewed
41+
- (Preview) Microsoft 365 or Azure AD Security Group owner of the group to be reviewed
4242

4343
Then, go to the [Identity Governance page](https://portal.azure.com/#blade/Microsoft_AAD_ERM/DashboardBlade/) to ensure that access reviews is ready for your organization.
4444

@@ -119,7 +119,13 @@ In some organizations, guests might not be aware of their group memberships.
119119

120120
4. After the reviewers give input, stop the access review. For more information, see [Complete an access review of groups or applications](complete-access-review.md).
121121

122-
5. Remove guest access for guests who were denied, didn't complete the review, or didn't previously accept their invitation. If some of the guests are contacts who were selected to participate in the review or they didn't previously accept an invitation, you can disable their accounts by using the Azure portal or PowerShell. If the guest no longer needs access and isn't a contact, you can remove their user object from your directory by using the Azure portal or PowerShell to delete the guest user object.
122+
5. You can automatically delete the guest users Azure AD B2B accounts as part of an access review when you are configuring an Access review for **Select Team + Groups**. This option is not available for **All Microsoft 365 groups with guest users**.
123+
124+
![Screenshot showing page to create access review.](media/manage-guest-access-with-access-reviews/new-access-review.png)
125+
126+
To do so, select **Auto apply results to resource** as this will automatically remove the user from the resource. **If reviewer don't respond** should be set to **Remove access** and **Action to apply on denied guest users** should also be set to **Block from signing in for 30 days then remove user from the tenant**.
127+
128+
This will immediately block sign in to the guest user account and then automatically delete their Azure AD B2B account after 30 days.
123129

124130
## Next steps
125131

744 KB
Loading
240 KB
Loading

articles/active-directory/privileged-identity-management/groups-role-settings.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -29,6 +29,8 @@ Follow these steps to open the settings for an Azure privileged access group rol
2929
1. Open **Azure AD Privileged Identity Management**.
3030

3131
1. Select **Privileged access (Preview)**.
32+
>[!NOTE]
33+
> Approver doesn't have to be member of the group, owner of the group or have Azure AD role assigned.
3234
3335
1. Select the group that you want to manage.
3436

articles/active-directory/privileged-identity-management/pim-resource-roles-configure-role-settings.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -30,6 +30,8 @@ Follow these steps to open the settings for an Azure resource role.
3030
1. Open **Azure AD Privileged Identity Management**.
3131

3232
1. Select **Azure resources**.
33+
>[!NOTE]
34+
> Approver doesn't have to have any Azure or Azure AD role assigned.
3335
3436
1. Select the resource you want to manage, such as a subscription or management group.
3537

articles/advisor/advisor-performance-recommendations.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -48,7 +48,7 @@ Azure Premium Storage delivers high-performance, low-latency disk support for vi
4848

4949
## Remove data skew on your Azure Synapse Analytics tables to increase query performance
5050

51-
Data skew can cause unnecessary data movement or resource bottlenecks when you run your workload. Advisor detects distribution data skew of greater than 15%. It recommends that you redistribute your data and revisit your table distribution key selections. To learn more about identifying and removing skew, see [troubleshooting skew](../synapse-analytics/sql-data-warehouse/sql-data-warehouse-tables-distribute.md#how-to-tell-if-your-distribution-column-is-a-good-choice).
51+
Data skew can cause unnecessary data movement or resource bottlenecks when you run your workload. Advisor detects distribution data skew of greater than 15%. It recommends that you redistribute your data and revisit your table distribution key selections. To learn more about identifying and removing skew, see [troubleshooting skew](../synapse-analytics/sql-data-warehouse/sql-data-warehouse-tables-distribute.md#how-to-tell-if-your-distribution-is-a-good-choice).
5252

5353
## Create or update outdated table statistics in your Azure Synapse Analytics tables to increase query performance
5454

@@ -186,7 +186,7 @@ Learn more about [Azure Communication Services](../communication-services/overvi
186186

187187
1. Sign in to the [Azure portal](https://portal.azure.com), and then open [Advisor](https://aka.ms/azureadvisordashboard).
188188

189-
2. On the Advisor dashboard, select the **Performance** tab.
189+
2. On the Advisor dashboard, select the **Performance** tab.
190190

191191
## Next steps
192192

articles/api-management/api-management-transformation-policies.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -262,7 +262,7 @@ or
262262
```
263263

264264
> [!NOTE]
265-
> Backend entities can be managed via [Azure portal](how-to-configure-service-fabric-backend.md), management [API](/rest/api/apimanagement), and [PowerShell](https://www.powershellgallery.com/packages?q=apimanagement).
265+
> Backend entities can be managed via [Azure portal](how-to-configure-service-fabric-backend.md), management [API](/rest/api/apimanagement), and [PowerShell](https://www.powershellgallery.com/packages?q=apimanagement). Currently, if you define a base `set-backend-service` policy using the `backend-id` attribute and inherit the base policy using `<base />` within the scope, then it can be only overridden with a policy using the `backend-id` attribute, not the `base-url` attribute.
266266
267267
### Example
268268

@@ -844,4 +844,4 @@ OriginalUrl.
844844

845845
- **Policy scopes:** all scopes
846846

847-
[!INCLUDE [api-management-policy-ref-next-steps](../../includes/api-management-policy-ref-next-steps.md)]
847+
[!INCLUDE [api-management-policy-ref-next-steps](../../includes/api-management-policy-ref-next-steps.md)]

articles/app-service/networking/private-endpoint.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Connect privately to a Web App using Azure Private Endpoint
44
author: ericgre
55
ms.assetid: 2dceac28-1ba6-4904-a15d-9e91d5ee162c
66
ms.topic: article
7-
ms.date: 03/04/2022
7+
ms.date: 08/23/2022
88
ms.author: ericg
99
ms.service: app-service
1010
ms.workload: web
@@ -49,7 +49,6 @@ From a security perspective:
4949
- By default, when you enable Private Endpoints to your Web App, you disable all public access.
5050
- You can enable multiple Private Endpoints in others VNets and Subnets, including VNets in other regions.
5151
- The IP address of the Private Endpoint NIC must be dynamic, but will remain the same until you delete the Private Endpoint.
52-
- The NIC of the Private Endpoint can't have an NSG associated.
5352
- The Subnet that hosts the Private Endpoint can have an NSG associated, but you must disable the network policies enforcement for the Private Endpoint: see [Disable network policies for private endpoints][disablesecuritype]. As a result, you can't filter by any NSG the access to your Private Endpoint.
5453
- By default, when you enable Private Endpoint to your Web App, the [access restrictions][accessrestrictions] configuration of the Web App isn't evaluated.
5554
- You can eliminate the data exfiltration risk from the VNet by removing all NSG rules where destination is tag Internet or Azure services. When you deploy a Private Endpoint for a Web App, you can only reach this specific Web App through the Private Endpoint. If you have another Web App, you must deploy another dedicated Private Endpoint for this other Web App.

0 commit comments

Comments
 (0)