Skip to content

Commit 839853a

Browse files
Learn Build Service GitHub AppLearn Build Service GitHub App
authored andcommitted
Merging changes synced from https://github.com/MicrosoftDocs/azure-docs-pr (branch live)
2 parents b0cc509 + e8c5d6e commit 839853a

File tree

281 files changed

+2194
-2992
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

281 files changed

+2194
-2992
lines changed

.openpublishing.redirection.azure-monitor.json

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -35,6 +35,16 @@
3535
"redirect_url": "/azure/azure-monitor/change/change-analysis",
3636
"redirect_document_id": false
3737
},
38+
{
39+
"source_path_from_root": "/articles/azure-monitor/app/resource-manager-web-app.md",
40+
"redirect_url": "/previous-versions/azure/azure-monitor/app/resource-manager-web-app",
41+
"redirect_document_id": false
42+
},
43+
{
44+
"source_path_from_root": "/articles/azure-monitor/app/resource-manager-function-app.md",
45+
"redirect_url": "/previous-versions/azure/azure-monitor/app/resource-manager-function-app",
46+
"redirect_document_id": false
47+
},
3848
{
3949
"source_path_from_root": "/articles/azure-monitor/app/web-app-extension-release-notes.md",
4050
"redirect_url": "/azure/azure-monitor/app/azure-web-apps",

articles/active-directory/app-proxy/active-directory-app-proxy-protect-ndes.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -81,7 +81,7 @@ Azure AD Application Proxy is built on Azure. It gives you a massive amount of n
8181

8282
1. You should see an **HTTP Error 403 – Forbidden** response.
8383

84-
1. Change the NDES URL provided (via Microsoft Intune) to devices. This change could either be in Microsoft Endpoint Configuration Manager or the Microsoft Endpoint Manager admin center.
84+
1. Change the NDES URL provided (via Microsoft Intune) to devices. This change could either be in Microsoft Configuration Manager or the Microsoft Intune admin center.
8585

8686
* For Configuration Manager, go to the certificate registration point and adjust the URL. This URL is what devices call out to and present their challenge.
8787
* For Intune standalone, either edit or create a new SCEP policy and add the new URL.

articles/active-directory/authentication/active-directory-certificate-based-authentication-get-started.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -121,7 +121,7 @@ The EAS profile must contain the following information:
121121

122122
- The EAS endpoint (for example, outlook.office365.com)
123123

124-
An EAS profile can be configured and placed on the device through the utilization of Mobile device management (MDM) such as Microsoft Endpoint Manager or by manually placing the certificate in the EAS profile on the device.
124+
An EAS profile can be configured and placed on the device through the utilization of Mobile device management (MDM) such as Microsoft Intune or by manually placing the certificate in the EAS profile on the device.
125125

126126
### Testing EAS client applications on Android
127127

articles/active-directory/authentication/concept-password-ban-bad-combined-policy.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,7 @@ Password expiration policies are unchanged but they're included in this topic fo
4646
4747
You can also use PowerShell to remove the never-expires configuration, or to see user passwords that are set to never expire.
4848

49-
The following expiration requirements apply to other providers that use Azure AD for identity and directory services, such as Microsoft Endpoint Manager and Microsoft 365.
49+
The following expiration requirements apply to other providers that use Azure AD for identity and directory services, such as Microsoft Intune and Microsoft 365.
5050

5151
| Property | Requirements |
5252
| --- | --- |

articles/active-directory/authentication/concept-resilient-controls.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -61,7 +61,7 @@ Incorporate the following access controls in your existing Conditional Access po
6161

6262
- Provision multiple authentication methods for each user that rely on different communication channels, for example the Microsoft Authenticator app (internet-based), OATH token (generated on-device), and SMS (telephonic). The following PowerShell script will help you identify in advance, which additional methods your users should register: [Script for Azure AD MFA authentication method analysis](/samples/azure-samples/azure-mfa-authentication-method-analysis/azure-mfa-authentication-method-analysis/).
6363
- Deploy Windows Hello for Business on Windows 10 devices to satisfy MFA requirements directly from device sign-in.
64-
- Use trusted devices via [Azure AD Hybrid Join](../devices/overview.md) or [Microsoft Endpoint Manager](/intune/planning-guide). Trusted devices will improve user experience because the trusted device itself can satisfy the strong authentication requirements of policy without an MFA challenge to the user. MFA will then be required when enrolling a new device and when accessing apps or resources from untrusted devices.
64+
- Use trusted devices via [Azure AD Hybrid Join](../devices/overview.md) or [Microsoft Intune](/intune/planning-guide). Trusted devices will improve user experience because the trusted device itself can satisfy the strong authentication requirements of policy without an MFA challenge to the user. MFA will then be required when enrolling a new device and when accessing apps or resources from untrusted devices.
6565
- Use Azure AD identity protection risk-based policies that prevent access when the user or sign-in is at risk in place of fixed MFA policies.
6666
- If you are protecting VPN access using Azure AD MFA NPS extension, consider federating your VPN solution as a [SAML app](../manage-apps/view-applications-portal.md) and determine the app category as recommended below.
6767

articles/active-directory/authentication/concept-system-preferred-multifactor-authentication.md

Lines changed: 2 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn how to use system-preferred multifactor authentication
44
ms.service: active-directory
55
ms.subservice: authentication
66
ms.topic: conceptual
7-
ms.date: 02/28/2023
7+
ms.date: 03/02/2023
88
ms.author: justinha
99
author: justinha
1010
manager: amycolannino
@@ -85,7 +85,7 @@ Content-Type: application/json
8585

8686
## Known issues
8787

88-
- [FIDO2 security key isn't supported on iOS mobile devices](../develop/support-fido2-authentication.md#mobile). This issue might surface when system-preferred MFA is enabled. Until a fix is available, we recommend not using FIDO2 security keys on iOS devices.
88+
- [FIDO2 security key isn't supported on mobile devices](../develop/support-fido2-authentication.md#mobile). This issue might surface when system-preferred MFA is enabled. Until a fix is available, we recommend not using FIDO2 security keys on mobile devices.
8989

9090
## Common questions
9191

@@ -115,12 +115,6 @@ When a user signs in, the authentication process checks which authentication met
115115

116116
System-preferred MFA doesn't affect users who sign in by using Active Directory Federation Services (AD FS) or Network Policy Server (NPS) extension. Those users don't see any change to their sign-in experience.
117117

118-
### What if the most secure MFA method isn't available?
119-
120-
If the user doesn't have that have the most secure method available, they can sign in with another method. After sign-in, they're redirected to their Security info page to remove the registration of the authentication method that isn't available.
121-
122-
For example, let's say an end user misplaces their FIDO2 security key. When they try to sign in without their security key, they can click **I can't use my security key right now** and continue to sign in by using another method, like a time-based one-time password (TOTP). After sign-in, their Security info page appears and they need to remove their FIDO2 security key registration. They can register the method again later if they find their FIDO2 security key.
123-
124118
### What happens for users who aren't specified in the Authentication methods policy but enabled in the legacy MFA tenant-wide policy?
125119

126120
The system-preferred MFA also applies for users who are enabled for MFA in the legacy MFA policy.

articles/active-directory/authentication/howto-authentication-passwordless-deployment.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -216,13 +216,13 @@ There are three types of passwordless sign-in deployments available with securit
216216

217217
Enabling Windows 10 sign-in using FIDO2 security keys requires you to enable the credential provider functionality in Windows 10. Choose one of the following:
218218

219-
* [Enable credential provider with Microsoft Endpoint Manager](howto-authentication-passwordless-security-key-windows.md)
219+
* [Enable credential provider with Microsoft Intune](howto-authentication-passwordless-security-key-windows.md)
220220

221-
* We recommend Microsoft Endpoint Manager deployment.
221+
* We recommend Microsoft Intune deployment.
222222

223223
* [Enable credential provider with a provisioning package](howto-authentication-passwordless-security-key-windows.md)
224224

225-
* If Microsoft Endpoint Manager deployment isn't possible, administrators must deploy a package on each machine to enable the credential provider functionality. The package installation can be carried out by one of the following options:
225+
* If Microsoft Intune deployment isn't possible, administrators must deploy a package on each machine to enable the credential provider functionality. The package installation can be carried out by one of the following options:
226226
* Group Policy or Configuration Manager
227227
* Local installation on a Windows 10 machine
228228

articles/active-directory/authentication/howto-authentication-passwordless-security-key-windows.md

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ This document focuses on enabling FIDO2 security key based passwordless authenti
3131
| [Hybrid Azure AD joined devices](../devices/concept-azure-ad-join-hybrid.md) require Windows 10 version 2004 or higher | | X |
3232
| Fully patched Windows Server 2016/2019 Domain Controllers. | | X |
3333
| [Azure AD Hybrid Authentication Management module](https://www.powershellgallery.com/packages/AzureADHybridAuthenticationManagement/2.1.1.0) | | X |
34-
| [Microsoft Endpoint Manager](/intune/fundamentals/what-is-intune) (Optional) | X | X |
34+
| [Microsoft Intune](/intune/fundamentals/what-is-intune) (Optional) | X | X |
3535
| Provisioning package (Optional) | X | X |
3636
| Group Policy (Optional) | | X |
3737

@@ -58,8 +58,8 @@ Hybrid Azure AD joined devices must run Windows 10 version 2004 or newer.
5858

5959
Organizations may choose to use one or more of the following methods to enable the use of security keys for Windows sign-in based on their organization's requirements:
6060

61-
- [Enable with Endpoint Manager](#enable-with-endpoint-manager)
62-
- [Targeted Endpoint Manager deployment](#targeted-endpoint-manager-deployment)
61+
- [Enable with Microsoft Intune](#enable-with-microsoft-intune)
62+
- [Targeted Microsoft Intune deployment](#targeted-intune-deployment)
6363
- [Enable with a provisioning package](#enable-with-a-provisioning-package)
6464
- [Enable with Group Policy (Hybrid Azure AD joined devices only)](#enable-with-group-policy)
6565

@@ -68,21 +68,21 @@ Organizations may choose to use one or more of the following methods to enable t
6868
>
6969
> Organizations with **Azure AD joined devices** must do this before their devices can authenticate to on-premises resources with FIDO2 security keys.
7070
71-
### Enable with Endpoint Manager
71+
### Enable with Microsoft Intune
7272

73-
To enable the use of security keys using Endpoint Manager, complete the following steps:
73+
To enable the use of security keys using Intune, complete the following steps:
7474

75-
1. Sign in to the [Microsoft Endpoint Manager admin center](https://endpoint.microsoft.com).
75+
1. Sign in to the [Microsoft Intune admin center](https://endpoint.microsoft.com).
7676
1. Browse to **Devices** > **Enroll Devices** > **Windows enrollment** > **Windows Hello for Business**.
7777
1. Set **Use security keys for sign-in** to **Enabled**.
7878

7979
Configuration of security keys for sign-in isn't dependent on configuring Windows Hello for Business.
8080

81-
### Targeted Endpoint Manager deployment
81+
### Targeted Intune deployment
8282

83-
To target specific device groups to enable the credential provider, use the following custom settings via Endpoint Manager:
83+
To target specific device groups to enable the credential provider, use the following custom settings via Intune:
8484

85-
1. Sign in to the [Microsoft Endpoint Manager admin center](https://endpoint.microsoft.com).
85+
1. Sign in to the [Microsoft Intune admin center](https://endpoint.microsoft.com).
8686
1. Browse to **Devices** > **Windows** > **Configuration profiles** > **Create profile**.
8787
1. Configure the new profile with the following settings:
8888
- Platform: Windows 10 and later
@@ -95,11 +95,11 @@ To target specific device groups to enable the credential provider, use the foll
9595
- OMA-URI: ./Device/Vendor/MSFT/PassportForWork/SecurityKey/UseSecurityKeyForSignin
9696
- Data Type: Integer
9797
- Value: 1
98-
1. The remainder of the policy settings include assigning to specific users, devices, or groups. For more information, see [Assign user and device profiles in Microsoft Endpoint Manager](/intune/device-profile-assign).
98+
1. The remainder of the policy settings include assigning to specific users, devices, or groups. For more information, see [Assign user and device profiles in Microsoft Intune](/intune/device-profile-assign).
9999

100100
### Enable with a provisioning package
101101

102-
For devices not managed by Microsoft Endpoint Manager, a provisioning package can be installed to enable the functionality. The Windows Configuration Designer app can be installed from the [Microsoft Store](https://www.microsoft.com/p/windows-configuration-designer/9nblggh4tx22). Complete the following steps to create a provisioning package:
102+
For devices not managed by Microsoft Intune, a provisioning package can be installed to enable the functionality. The Windows Configuration Designer app can be installed from the [Microsoft Store](https://www.microsoft.com/p/windows-configuration-designer/9nblggh4tx22). Complete the following steps to create a provisioning package:
103103

104104
1. Launch the Windows Configuration Designer.
105105
1. Select **File** > **New project**.

articles/active-directory/authentication/howto-sspr-deployment.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -264,7 +264,7 @@ To enable your support team's success, you can create a FAQ based on questions y
264264
| User isn't receiving a text or call on their office or cell phone| A user is trying to verify their identity via text or call but isn't receiving a text/call. |
265265
| User can't access the password reset portal| A user wants to reset their password but isn't enabled for password reset and can't access the page to update passwords. |
266266
| User can't set a new password| A user completes verification during the password reset flow but can't set a new password. |
267-
| User doesn't see a Reset Password link on a Windows 10 device| A user is trying to reset password from the Windows 10 lock screen, but the device is either not joined to Azure AD, or the Microsoft Endpoint Manager device policy isn't enabled |
267+
| User doesn't see a Reset Password link on a Windows 10 device| A user is trying to reset password from the Windows 10 lock screen, but the device is either not joined to Azure AD, or the Microsoft Intune device policy isn't enabled |
268268

269269
### Plan rollback
270270

articles/active-directory/authentication/howto-sspr-windows.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -70,13 +70,13 @@ To configure a Windows 11 or 10 device for SSPR at the sign-in screen, review th
7070
- Azure AD joined
7171
- Hybrid Azure AD joined
7272

73-
### Enable for Windows 11 and 10 using Microsoft Endpoint Manager
73+
### Enable for Windows 11 and 10 using Microsoft Intune
7474

75-
Deploying the configuration change to enable SSPR from the login screen using Microsoft Endpoint Manager is the most flexible method. Microsoft Endpoint Manager allows you to deploy the configuration change to a specific group of machines you define. This method requires Microsoft Endpoint Manager enrollment of the device.
75+
Deploying the configuration change to enable SSPR from the login screen using Microsoft Intune is the most flexible method. Microsoft Intune allows you to deploy the configuration change to a specific group of machines you define. This method requires Microsoft Intune enrollment of the device.
7676

77-
#### Create a device configuration policy in Microsoft Endpoint Manager
77+
#### Create a device configuration policy in Microsoft Intune
7878

79-
1. Sign in to the [Azure portal](https://portal.azure.com) and select **Endpoint Manager**.
79+
1. Sign in to the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431).
8080
1. Create a new device configuration profile by going to **Device configuration** > **Profiles**, then select **+ Create Profile**
8181
- For **Platform** choose *Windows 10 and later*
8282
- For **Profile type**, choose Templates then select the Custom template below
@@ -93,7 +93,7 @@ Deploying the configuration change to enable SSPR from the login screen using Mi
9393
Select **Add**, then **Next**.
9494
1. The policy can be assigned to specific users, devices, or groups. Assign the profile as desired for your environment, ideally to a test group of devices first, then select **Next**.
9595

96-
For more information, see [Assign user and device profiles in Microsoft Microsoft Endpoint Manager](/mem/intune/configuration/device-profile-assign).
96+
For more information, see [Assign user and device profiles in Microsoft Microsoft Intune](/mem/intune/configuration/device-profile-assign).
9797

9898
1. Configure applicability rules as desired for your environment, such as to *Assign profile if OS edition is Windows 10 Enterprise*, then select **Next**.
9999
1. Review your profile, then select **Create**.

0 commit comments

Comments
 (0)