Skip to content

Commit 8d3cddc

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into work-fslogix-containers
2 parents 0dbfcbd + 0ec5f78 commit 8d3cddc

File tree

41 files changed

+450
-262
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

41 files changed

+450
-262
lines changed

articles/active-directory/reports-monitoring/concept-provisioning-logs.md

Lines changed: 32 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -86,23 +86,31 @@ Select an item in the list view to get more detailed information.
8686

8787
## Filter provisioning activities
8888

89-
To narrow down the reported data to a level that works for you, you can filter the provisioning data using the following default fields. Note that the values in the filters are dynamically populated based on your tenant. If, for example, you don't have any create events in your tenant, there won't be a filter option for create.
89+
You can filter your provisioning data. Some filter values are dynamically populated based on your tenant. If, for example, you don't have any create events in your tenant, there won't be a filter option for create.
90+
In the default view, you can select the following filters:
9091

9192
- Identity
92-
- Action
93-
- Source system
94-
- Target system
95-
- Status
9693
- Date
94+
- Status
95+
- Action
9796

9897

99-
![Filter](./media/concept-provisioning-logs/filter.png "Filter")
98+
![Filter](./media/concept-provisioning-logs/default-filter.png "Filter")
10099

101100
The **Identity** filter enables you to specify the name or the identity that you care about. This identity could be a user, group, role, or other object. You can search by the name or ID of the object. The ID varies by scenario. For example, when provisioning an object from Azure AD to SalesForce, the Source ID is the object ID of the user in Azure AD while the TargetID is the ID of the user in Salesforce. When provisioning from Workday to Active Directory, the Source ID is the Workday worker employee ID. Note that the Name of the user may not always be present in the Identity column. There will always be one ID.
102101

103-
The **Source System** filter enables you to specify where the identity is getting provisioned from. For example, when provisioning an object from Azure AD to ServiceNow, the Source system is Azure AD.
104102

105-
The **Target System** filter enables you to specify where the identity is getting provisioned to. For example, when provisioning an object from Azure AD to ServiceNow, the Target System is ServiceNow.
103+
The **Date** filter enables to you to define a timeframe for the returned data.
104+
Possible values are:
105+
106+
- 1 month
107+
- 7 days
108+
- 30 days
109+
- 24 hours
110+
- Custom time interval
111+
112+
When you select a custom time frame, you can configure a start date and an end date.
113+
106114

107115
The **Status** filter enables you to select:
108116

@@ -111,6 +119,8 @@ The **Status** filter enables you to select:
111119
- Failure
112120
- Skipped
113121

122+
123+
114124
The **Action** filter enables you to filter the:
115125

116126
- Create
@@ -119,19 +129,18 @@ The **Action** filter enables you to filter the:
119129
- Disable
120130
- Other
121131

122-
The **Date** filter enables to you to define a timeframe for the returned data.
123-
Possible values are:
132+
In addition, to the filters of the default view, you can also set the following filters:
124133

125-
- 1 month
126-
- 7 days
127-
- 30 days
128-
- 24 hours
129-
- Custom time interval
134+
- Job ID
135+
- Cycle ID
136+
- Change ID
137+
- Source ID
138+
- Target ID
139+
- Application
130140

131-
When you select a custom time frame, you can configure a start date and an end date.
132141

142+
![Pick a field](./media/concept-provisioning-logs/add-filter.png "Pick a field")
133143

134-
In addition to the default fields, when selected, you can also include the following fields in your filter:
135144

136145
- **Job ID** - A unique Job ID is associated with each application that you have enabled provisioning for.
137146

@@ -140,8 +149,13 @@ In addition to the default fields, when selected, you can also include the follo
140149
- **Change ID** - Unique identifier for the provisioning event. You can share this ID to support to look up the provisioning event.
141150

142151

152+
- **Source System** - Enables you to specify where the identity is getting provisioned from. For example, when provisioning an object from Azure AD to ServiceNow, the Source system is Azure AD.
153+
154+
- **Target System** - Enables you to specify where the identity is getting provisioned to. For example, when provisioning an object from Azure AD to ServiceNow, the Target System is ServiceNow.
155+
156+
- **Application** - Enables you to show only records of applications with a display name that contains a specific string.
143157

144-
158+
145159

146160
## Provisioning details
147161

8.7 KB
Loading
12.6 KB
Loading
14 Bytes
Loading

articles/aks/azure-ad-v2.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -93,12 +93,12 @@ The above command creates a three node AKS cluster, but the user, who created th
9393
Once you've created a group and added yourself (and others) as a member, you can update the cluster with the Azure AD group using the following command
9494

9595
```azurecli-interactive
96-
az aks update -g MyResourceGroup -n MyManagedCluster [--aad-admin-group-object-ids <id1,id2>] [--aad-tenant-id <id>]
96+
az aks update -g MyResourceGroup -n MyManagedCluster [--aad-admin-group-object-ids <id>] [--aad-tenant-id <id>]
9797
```
9898
Alternatively, if you first create a group and add members, you can enable the Azure AD group at create time using the following command,
9999

100100
```azurecli-interactive
101-
az aks create -g MyResourceGroup -n MyManagedCluster --enable-aad [--aad-admin-group-object-ids <id1,id2>] [--aad-tenant-id <id>]
101+
az aks create -g MyResourceGroup -n MyManagedCluster --enable-aad [--aad-admin-group-object-ids <id>] [--aad-tenant-id <id>]
102102
```
103103

104104
A successful creation of an Azure AD v2 cluster has the following section in the response body

articles/azure-databricks/TOC.yml

Lines changed: 51 additions & 25 deletions
Original file line numberDiff line numberDiff line change
@@ -1006,7 +1006,41 @@
10061006
items:
10071007
- name: Security overview
10081008
href: /azure/databricks/security/index
1009-
maintainContext: true
1009+
maintainContext: true
1010+
- name: Access control
1011+
items:
1012+
- name: Access control overview
1013+
href: /azure/databricks/security/access-control/index
1014+
maintainContext: true
1015+
- name: Workspace access control
1016+
href: /azure/databricks/security/access-control/workspace-acl
1017+
maintainContext: true
1018+
- name: Cluster access control
1019+
href: /azure/databricks/security/access-control/cluster-acl
1020+
maintainContext: true
1021+
- name: Pool access control
1022+
href: /azure/databricks/security/access-control/pool-acl
1023+
maintainContext: true
1024+
- name: Jobs access control
1025+
href: /azure/databricks/security/access-control/job-acl
1026+
maintainContext: true
1027+
- name: Table access control
1028+
items:
1029+
- name: Table access control overview
1030+
href: /azure/databricks/security/access-control/table-acls/index
1031+
maintainContext: true
1032+
- name: Enable table access control for a cluster
1033+
href: /azure/databricks/security/access-control/table-acls/table-acl
1034+
maintainContext: true
1035+
- name: Data object privileges
1036+
href: /azure/databricks/security/access-control/table-acls/object-privileges
1037+
maintainContext: true
1038+
- name: Secret access control
1039+
href: /azure/databricks/security/access-control/secret-acl
1040+
maintainContext: true
1041+
- name: Authenticate to Azure Data Lake Storage using Azure Active Directory credentials
1042+
href: /azure/databricks/security/credential-passthrough/adls-passthrough
1043+
maintainContext: true
10101044
- name: Secrets
10111045
items:
10121046
- name: Keep data secure with secrets
@@ -1018,21 +1052,18 @@
10181052
- name: Secrets
10191053
href: /azure/databricks/security/secrets/secrets
10201054
maintainContext: true
1021-
- name: Secret access control
1022-
href: /azure/databricks/security/secrets/secret-acl
1023-
maintainContext: true
10241055
- name: Secret redaction
10251056
href: /azure/databricks/security/secrets/redaction
10261057
maintainContext: true
10271058
- name: Secret workflow example
10281059
href: /azure/databricks/security/secrets/example-secret-workflow
10291060
maintainContext: true
10301061
- name: Encrypt traffic between cluster worker nodes
1031-
href: /azure/databricks/security/encrypt-otw
1062+
href: /azure/databricks/security/encryption/encrypt-otw
10321063
- name: Enable customer-managed keys for notebooks
1033-
href: /azure/databricks/security/customer-managed-key-notebook
1064+
href: /azure/databricks/security/keys/customer-managed-key-notebook
10341065
- name: Enable customer-managed keys for DBFS
1035-
href: /azure/databricks/security/customer-managed-keys-dbfs
1066+
href: /azure/databricks/security/keys/customer-managed-keys-dbfs
10361067
- name: Administration
10371068
items:
10381069
- name: Administration overview
@@ -1054,7 +1085,7 @@
10541085
maintainContext: true
10551086
- name: Monitor usage using tags
10561087
href: /azure/databricks/administration-guide/account-settings/usage-detail-tags-azure
1057-
maintainContext: true
1088+
maintainContext: true
10581089
- name: Manage users and groups
10591090
items:
10601091
- name: Users and groups overview
@@ -1080,30 +1111,22 @@
10801111
- name: Access control overview
10811112
href: /azure/databricks/administration-guide/access-control/index
10821113
maintainContext: true
1083-
- name: Cluster access control
1114+
- name: Enable workspace access control
1115+
href: /azure/databricks/administration-guide/access-control/workspace-acl
1116+
maintainContext: true
1117+
- name: Enable cluster access control
10841118
href: /azure/databricks/administration-guide/access-control/cluster-acl
10851119
maintainContext: true
1086-
- name: Pool access control
1120+
- name: Enable pool access control
10871121
href: /azure/databricks/administration-guide/access-control/pool-acl
10881122
maintainContext: true
1089-
- name: Jobs access control
1123+
- name: Enable jobs access control
10901124
href: /azure/databricks/administration-guide/access-control/jobs-acl
10911125
maintainContext: true
1092-
- name: Table access control
1093-
items:
1094-
- name: Table access control overview
1095-
href: /azure/databricks/administration-guide/access-control/table-acls/index
1096-
maintainContext: true
1097-
- name: Enable Table access control
1098-
href: /azure/databricks/administration-guide/access-control/table-acls/table-acl
1099-
maintainContext: true
1100-
- name: Set Privileges on a Data Object
1101-
href: /azure/databricks/administration-guide/access-control/table-acls/object-privileges
1102-
maintainContext: true
1103-
- name: Workspace access control
1104-
href: /azure/databricks/administration-guide/access-control/workspace-acl
1126+
- name: Enable table access control
1127+
href: /azure/databricks/administration-guide/access-control/table-acl
11051128
maintainContext: true
1106-
- name: Enable Token-based authentication
1129+
- name: Enable token-based authentication
11071130
href: /azure/databricks/administration-guide/access-control/tokens
11081131
maintainContext: true
11091132
- name: Conditional access
@@ -1689,6 +1712,9 @@
16891712
- name: Platform release notes
16901713
href: /azure/databricks/release-notes/product/index
16911714
maintainContext: true
1715+
- name: April 2020
1716+
href: /azure/databricks/release-notes/product/2020/april
1717+
maintainContext: true
16921718
- name: March 2020
16931719
href: /azure/databricks/release-notes/product/2020/march
16941720
maintainContext: true

articles/cloud-services/cloud-services-troubleshoot-common-issues-which-cause-roles-recycle.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -52,7 +52,7 @@ To ensure that your `DiagnosticsConnectionString` setting is correct before you
5252
If you are developing your application by using Azure Tools for Microsoft Visual Studio, you can use the property pages to set this value.
5353

5454
## Exported certificate does not include private key
55-
To run a web role under SSL, you must ensure that your exported management certificate includes the private key. If you use the *Windows Certificate Manager* to export the certificate, be sure to select **Yes** for the **Export the private key** option. The certificate must be exported in the PFX format, which is the only format currently supported.
55+
To run a web role under TLS, you must ensure that your exported management certificate includes the private key. If you use the *Windows Certificate Manager* to export the certificate, be sure to select **Yes** for the **Export the private key** option. The certificate must be exported in the PFX format, which is the only format currently supported.
5656

5757
## Next steps
5858
View more [troubleshooting articles](https://azure.microsoft.com/documentation/articles/?tag=top-support-issue&product=cloud-services) for cloud services.

articles/firewall/firewall-faq.md

Lines changed: 4 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: firewall
55
author: vhorne
66
ms.service: firewall
77
ms.topic: conceptual
8-
ms.date: 03/31/2020
8+
ms.date: 04/10/2020
99
ms.author: victorh
1010
---
1111

@@ -167,17 +167,11 @@ No. Azure Firewall doesn't need a subnet bigger than /26.
167167

168168
## How can I increase my firewall throughput?
169169

170-
Azure Firewall's initial throughput capacity is 2.5 - 3 Gbps and it scales out to 30 Gbps. It scales out based on CPU usage and throughput. Contact Support to increase your firewall's throughput capacity.
170+
Azure Firewall's initial throughput capacity is 2.5 - 3 Gbps and it scales out to 30 Gbps. It scales out automatically based on CPU usage and throughput.
171171

172172
## How long does it take for Azure Firewall to scale out?
173173

174-
It takes from five to seven minutes for Azure Firewall to scale out. Contact Support to increase your firewall's initial throughput capacity if you have bursts that require a faster autoscale.
175-
176-
The following points should be taken into account when you test the firewall autoscale:
177-
178-
- Single TCP flow performance is limited to 1.4 Gbps. So, a performance test needs to establish multiple TCP flows.
179-
- Performance tools must continuously establish new connections for them to connect with the scaled-up backend Firewall instances. If the test establishes connections once at the start, then those will only connect with the initial backend instances. Even though the firewall scales up, you won't see any increased performance because the connections are associated with the initial instances.
180-
174+
Azure Firewall gradually scales when average throughput or CPU consumption is at 60%. Scale out takes five to seven minutes. When performance testing, make sure you test for at least 10 to 15 minutes, and initiate new connections to take advantage of newly created Firewall nodes.
181175

182176
## Does Azure Firewall allow access to Active Directory by default?
183177

@@ -207,7 +201,7 @@ Set-AzFirewall -AzureFirewall $fw
207201

208202
## Why can a TCP ping and similar tools successfully connect to a target FQDN even when no rule on Azure Firewall allows that traffic?
209203

210-
A TCP ping is not actually connecting to the target FQDN. This happens because Azure Firewall's transparent proxy listens on port 80/443 for outbound traffic. The TCP ping establishes a connection with the firewall, which then drops the packet and logs the connection. This behavior doesn't have any security impact. However, to avoid confusion we're investigating potential changes to this behavior.
204+
A TCP ping isn't actually connecting to the target FQDN. This happens because Azure Firewall's transparent proxy listens on port 80/443 for outbound traffic. The TCP ping establishes a connection with the firewall, which then drops the packet and logs the connection. This behavior doesn't have any security impact. However, to avoid confusion we're investigating potential changes to this behavior.
211205

212206
## Are there limits for the number of IP addresses supported by IP Groups?
213207

articles/firewall/rule-processing.md

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -5,23 +5,25 @@ services: firewall
55
author: vhorne
66
ms.service: firewall
77
ms.topic: article
8-
ms.date: 03/10/2020
8+
ms.date: 04/10/2020
99
ms.author: victorh
1010
---
1111

1212
# Azure Firewall rule processing logic
13-
You can configure NAT rules, network rules, and applications rules on Azure Firewall. The rules are processed according to the rule type.
13+
You can configure NAT rules, network rules, and applications rules on Azure Firewall. Rule collections are processed according to the rule type in priority order, lower numbers to higher numbers from 100 to 65,000. A rule collection name can have only letters, numbers, underscores, periods, or hyphens. It must begin with a letter or number, and end with a letter, number or underscore. The maximum name length is 80 characters.
14+
15+
It's best to initially space your rule collection priority numbers in 100 increments (100, 200, 300, and so on) so you have room to add more rule collections if needed.
1416

1517
> [!NOTE]
1618
> If you enable threat intelligence-based filtering, those rules are highest priority and are always processed first. Threat-intelligence filtering may deny traffic before any configured rules are processed. For more information, see [Azure Firewall threat intelligence-based filtering](threat-intel.md).
1719
18-
## Outbound
20+
## Outbound connectivity
1921

2022
### Network rules and applications rules
2123

2224
If you configure network rules and application rules, then network rules are applied in priority order before application rules. The rules are terminating. So if a match is found in a network rule, no other rules are processed. If there is no network rule match, and if the protocol is HTTP, HTTPS, or MSSQL, then the packet is then evaluated by the application rules in priority order. If still no match is found, then the packet is evaluated against the [infrastructure rule collection](infrastructure-fqdns.md). If there is still no match, then the packet is denied by default.
2325

24-
## Inbound
26+
## Inbound connectivity
2527

2628
### NAT rules
2729

articles/governance/policy/concepts/guest-configuration.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -222,6 +222,7 @@ locations:
222222

223223
## Next steps
224224

225+
- Learn how to view the details each setting from the [Guest Configuration compliance view](../how-to/determine-non-compliance.md#compliance-details-for-guest-configuration)
225226
- Review examples at [Azure Policy samples](../samples/index.md).
226227
- Review the [Azure Policy definition structure](definition-structure.md).
227228
- Review [Understanding policy effects](effects.md).

0 commit comments

Comments
 (0)