Skip to content

Commit 93c01df

Browse files
committed
Merge branch 'master' of https://github.com/microsoftdocs/azure-docs-pr into asb-may1
2 parents 91278cf + 5e07238 commit 93c01df

17 files changed

+71
-42
lines changed

articles/active-directory/conditional-access/concept-conditional-access-cloud-apps.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -68,7 +68,7 @@ Administrators can assign a Conditional Access policy to the following cloud app
6868

6969
Office 365 provides cloud-based productivity and collaboration services like Exchange, SharePoint, and Microsoft Teams. Office 365 cloud services are deeply integrated to ensure smooth and collaborative experiences. This integration can cause confusion when creating policies as some apps such as Microsoft Teams have dependencies on others such as SharePoint or Exchange.
7070

71-
The Office 365 (preview) app makes it possible to target these services all at once. We recommend using the new Office 365 (preview) app, instead of targeting individual cloud apps. Targeting this group of applications helps to avoid issues that may arise due to inconsistent policies and dependencies.
71+
The Office 365 (preview) app makes it possible to target these services all at once. We recommend using the new Office 365 (preview) app, instead of targeting individual cloud apps to avoid issues with [service dependencies](service-dependencies.md). Targeting this group of applications helps to avoid issues that may arise due to inconsistent policies and dependencies.
7272

7373
Administrators can choose to exclude specific apps from policy if they wish by including the Office 365 (preview) app and excluding the specific apps of their choice in policy.
7474

articles/active-directory/conditional-access/service-dependencies.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: conditional-access
88
ms.topic: article
9-
ms.date: 11/21/2019
9+
ms.date: 05/04/2020
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -20,7 +20,7 @@ ms.collection: M365-identity-device-management
2020

2121
With Conditional Access policies, you can specify access requirements to websites and services. For example, your access requirements can include requiring multi-factor authentication (MFA) or [managed devices](require-managed-devices.md).
2222

23-
When you access a site or service directly, the impact of a related policy is typically easy to assess. For example, if you have a policy that requires MFA for SharePoint Online configured, MFA is enforced for each sign-in to the SharePoint web portal. However, it is not always straight-forward to assess the impact of a policy because there are cloud apps with dependencies to other cloud apps. For example, Microsoft Teams can provide access to resources in SharePoint Online. So, when you access Microsoft Teams in our current scenario, you are also subject to the SharePoint MFA policy.
23+
When you access a site or service directly, the impact of a related policy is typically easy to assess. For example, if you have a policy that requires multi-factor authentication (MFA) for SharePoint Online configured, MFA is enforced for each sign-in to the SharePoint web portal. However, it is not always straight-forward to assess the impact of a policy because there are cloud apps with dependencies to other cloud apps. For example, Microsoft Teams can provide access to resources in SharePoint Online. So, when you access Microsoft Teams in our current scenario, you are also subject to the SharePoint MFA policy.
2424

2525
## Policy enforcement
2626

@@ -35,6 +35,8 @@ The diagram below illustrates MS Teams service dependencies. Solid arrows indica
3535

3636
As a best practice, you should set common policies across related apps and services whenever possible. Having a consistent security posture provides you with the best user experience. For example, setting a common policy across Exchange Online, SharePoint Online, Microsoft Teams, and Skype for business significantly reduces unexpected prompts that may arise from different policies being applied to downstream services.
3737

38+
A great way to accomplish this with applications in the Office stack is to use the [Office 365 (preview)](concept-conditional-access-cloud-apps.md#office-365-preview) instead of targeting individual applications.
39+
3840
The below table lists additional service dependencies, where the client apps must satisfy
3941

4042
| Client apps | Downstream service | Enforcement |

articles/aks/troubleshooting.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -53,7 +53,7 @@ The reason for the warnings on the dashboard is that the cluster is now enabled
5353

5454
## I can't connect to the dashboard. What should I do?
5555

56-
The easiest way to access your service outside the cluster is to run `kubectl proxy`, which proxies requests sent to your localhost port 8001 to the Kubernetes API server. From there, the API server can proxy to your service: `http://localhost:8001/api/v1/namespaces/kube-system/services/kubernetes-dashboard/proxy/#!/node?namespace=default`.
56+
The easiest way to access your service outside the cluster is to run `kubectl proxy`, which proxies requests sent to your localhost port 8001 to the Kubernetes API server. From there, the API server can proxy to your service: `http://localhost:8001/api/v1/namespaces/kube-system/services/kubernetes-dashboard/proxy/`.
5757

5858
If you don't see the Kubernetes dashboard, check whether the `kube-proxy` pod is running in the `kube-system` namespace. If it isn't in a running state, delete the pod and it will restart.
5959

articles/azure-functions/functions-reference-python.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ Azure Functions expects a function to be a stateless method in your Python scrip
1717

1818
Data from triggers and bindings is bound to the function via method attributes using the `name` property defined in the *function.json* file. For example, the _function.json_ below describes a simple function triggered by an HTTP request named `req`:
1919

20-
:::code language="son" source="~/functions-quickstart-templates/Functions.Templates/Templates/HttpTrigger-Python/function.json":::
20+
:::code language="json" source="~/functions-quickstart-templates/Functions.Templates/Templates/HttpTrigger-Python/function.json":::
2121

2222
Based on this definition, the `__init__.py` file that contains the function code might look like the following example:
2323

articles/azure-monitor/app/powershell.md

Lines changed: 32 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Automate Azure Application Insights with PowerShell | Microsoft Docs
33
description: Automate creating and managing resources, alerts, and availability tests in PowerShell using an Azure Resource Manager template.
44
ms.topic: conceptual
5-
ms.date: 10/17/2019
5+
ms.date: 05/02/2020
66

77
---
88

@@ -17,10 +17,10 @@ The key to creating these resources is JSON templates for [Azure Resource Manage
1717
## One-time setup
1818
If you haven't used PowerShell with your Azure subscription before:
1919

20-
Install the Azure Powershell module on the machine where you want to run the scripts:
20+
Install the Azure PowerShell module on the machine where you want to run the scripts:
2121

2222
1. Install [Microsoft Web Platform Installer (v5 or higher)](https://www.microsoft.com/web/downloads/platform.aspx).
23-
2. Use it to install Microsoft Azure Powershell.
23+
2. Use it to install Microsoft Azure PowerShell.
2424

2525
In addition to using Resource Manager templates, there is a rich set of [Application Insights PowerShell cmdlets](https://docs.microsoft.com/powershell/module/az.applicationinsights), which make it easy to configure Application Insights resources programatically. The capabilities enabled by the cmdlets include:
2626

@@ -83,20 +83,20 @@ Create a new .json file - let's call it `template1.json` in this example. Copy t
8383
"defaultValue": 90,
8484
"allowedValues": [
8585
30,
86-
60,
87-
90,
88-
120,
89-
180,
90-
270,
91-
365,
92-
550,
93-
730
86+
60,
87+
90,
88+
120,
89+
180,
90+
270,
91+
365,
92+
550,
93+
730
9494
],
9595
"metadata": {
9696
"description": "Data retention in days"
9797
}
9898
},
99-
"ImmediatePurgeDataOn30Days": {
99+
"ImmediatePurgeDataOn30Days": {
100100
"type": "bool",
101101
"defaultValue": false,
102102
"metadata": {
@@ -225,7 +225,21 @@ Additional properties are available via the cmdlets:
225225

226226
Refer to the [detailed documentation](https://docs.microsoft.com/powershell/module/az.applicationinsights) for the parameters for these cmdlets.
227227

228-
## Set the data retention
228+
## Set the data retention
229+
230+
Below are three methods to programmatically set the data retention on an Application Insights resource.
231+
232+
### Setting data retention using a PowerShell commands
233+
234+
Here's a simple set of PowerShell commands to set the data retention for your Application Insights resource:
235+
236+
```PS
237+
$Resource = Get-AzResource -ResourceType Microsoft.Insights/components -ResourceGroupName MyResourceGroupName -ResourceName MyResourceName
238+
$Resource.Properties.RetentionInDays = 365
239+
$Resource | Set-AzResource -Force
240+
```
241+
242+
### Setting data retention using REST
229243

230244
To get the current data retention for your Application Insights resource, you can use the OSS tool [ARMClient](https://github.com/projectkudu/ARMClient). (Learn more about ARMClient from articles by [David Ebbo](http://blog.davidebbo.com/2015/01/azure-resource-manager-client.html) and [Daniel Bowbyes](https://blog.bowbyes.co.nz/2016/11/02/using-armclient-to-directly-access-azure-arm-rest-apis-and-list-arm-policy-details/).) Here's an example using `ARMClient`, to get the current retention:
231245

@@ -248,6 +262,8 @@ New-AzResourceGroupDeployment -ResourceGroupName "<resource group>" `
248262
-appName myApp
249263
```
250264

265+
### Setting data retention using a PowerShell script
266+
251267
The following script can also be used to change retention. Copy this script to save as `Set-ApplicationInsightsRetention.ps1`.
252268

253269
```PS
@@ -303,9 +319,9 @@ This script can then be used as:
303319
```PS
304320
Set-ApplicationInsightsRetention `
305321
[-SubscriptionId] <String> `
306-
[-ResourceGroupName] <String> `
307-
[-Name] <String> `
308-
[-RetentionInDays <Int>]
322+
[-ResourceGroupName] <String> `
323+
[-Name] <String> `
324+
[-RetentionInDays <Int>]
309325
```
310326

311327
## Set the daily cap

articles/azure-resource-manager/management/resources-without-resource-group-limit.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,9 @@
22
title: Resources without 800 count limit
33
description: Lists the Azure resource types that can have more than 800 instances in a resource group.
44
ms.topic: conceptual
5-
ms.date: 04/06/2020
5+
author: davidsmatlak
6+
ms.author: v-dasmat
7+
ms.date: 05/04/2020
68
---
79

810
# Resources not limited to 800 instances per resource group
@@ -11,7 +13,6 @@ By default, you can deploy up to 800 instances of a resource type in each resour
1113

1214
For some resource types, you need to contact support to have the 800 instance limit removed. Those resource types are noted in this article.
1315

14-
1516
## Microsoft.Automation
1617

1718
* automationAccounts

articles/cosmos-db/monitor-cosmos-db.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -104,15 +104,15 @@ Following are queries that you can use to help you monitor your Azure Cosmos dat
104104

105105
```Kusto
106106
AzureDiagnostics
107-
| where ResourceProvider=="MICROSOFT.DOCUMENTDB" and Category=="DataPlaneRequests"
107+
| where ResourceProvider=="Microsoft.DocumentDb" and Category=="DataPlaneRequests"
108108
109109
```
110110
111111
* To query for all operations, grouped by resource:
112112
113113
```Kusto
114114
AzureActivity
115-
| where ResourceProvider=="MICROSOFT.DOCUMENTDB" and Category=="DataPlaneRequests"
115+
| where ResourceProvider=="Microsoft.DocumentDb" and Category=="DataPlaneRequests"
116116
| summarize count() by Resource
117117
118118
```
@@ -121,7 +121,7 @@ Following are queries that you can use to help you monitor your Azure Cosmos dat
121121
122122
```Kusto
123123
AzureActivity
124-
| where Caller == "[email protected]" and ResourceProvider=="MICROSOFT.DOCUMENTDB" and Category=="DataPlaneRequests"
124+
| where Caller == "[email protected]" and ResourceProvider=="Microsoft.DocumentDb" and Category=="DataPlaneRequests"
125125
| summarize count() by Resource
126126
```
127127

articles/firewall/remote-work-support.md

Lines changed: 10 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -5,17 +5,23 @@ services: firewall
55
author: vhorne
66
ms.service: firewall
77
ms.topic: conceptual
8-
ms.date: 04/29/2020
8+
ms.date: 05/04/2020
99
ms.author: victorh
1010
---
1111

1212
# Azure Firewall remote work support
1313

14-
Azure Firewall is a managed, cloud-based network security service that protects your Azure virtual network resources. It's a fully stateful firewall as a service with built-in high availability and unrestricted cloud scalability.
14+
Azure Firewall is a managed, cloud-based network security service that protects your Azure virtual network resources. It's a fully stateful firewall as a service with built-in high availability and unrestricted cloud scalability.
1515

16-
## Firewall rules
1716

18-
You can use Azure Firewall to secure your virtual desktop infrastructure (VDI) inbound RDP access to your Azure virtual network using Azure Firewall [DNAT rules](rule-processing.md). Windows Virtual Desktop (WVD) doesn't require you to open any inbound access to your virtual network. However, you must allow a set of outbound network connections for the WVD virtual machines that run in your virtual network. For more information, see [Use Azure Firewall to protect Window Virtual Desktop deployments](protect-windows-virtual-desktop.md).
17+
18+
## Virtual Desktop Infrastructure (VDI) deployment support
19+
20+
Work from home policies requires many IT organizations to address fundamental changes in capacity, network, security, and governance. Employees aren't protected by the layered security policies associated with on-premises services while working from home. Virtual Desktop Infrastructure (VDI) deployments on Azure can help organizations rapidly respond to this changing environment. However, you need a way to protect inbound/outbound Internet access to and from these VDI deployments. You can use Azure Firewall [DNAT rules](rule-processing.md) along with its [threat intelligence](threat-intel.md) based filtering capabilities to protect your VDI deployments.
21+
22+
## Azure Windows Virtual Desktop (WVD) support
23+
24+
Windows Virtual Desktop is a comprehensive desktop and app virtualization service running in Azure. It’s the only virtual desktop infrastructure (VDI) that delivers simplified management, multi-session Windows 10, optimizations for Office 365 ProPlus, and support for Remote Desktop Services (RDS) environments. You can deploy and scale your Windows desktops and apps on Azure in minutes, and get built-in security and compliance features. WVD doesn't require you to open any inbound access to your virtual network. However, you must allow a set of outbound network connections for the WVD virtual machines that run in your virtual network. For more information, see [Use Azure Firewall to protect Window Virtual Desktop deployments](protect-windows-virtual-desktop.md).
1925

2026
## Next steps
2127

articles/media-services/azure-media-player/azure-media-player-localization.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -39,12 +39,12 @@ Azure Media Player currently supports the following languages with their corresp
3939
| French | fr | Norwegian - Nynorsk | nn | Chinese - simplified | zh-hans |
4040
| Galician | gl | Polish | pl | Chinese - traditional | zh-hant |
4141
| Hebrew | he | Portuguese - Brazil | pt-br | | |
42-
| Hindi | hu | Portuguese - Portugal | pt-pt | | |
42+
| Hindi | hi | Portuguese - Portugal | pt-pt | | |
4343

4444

4545
> [!NOTE]
4646
> If you do not want any localization to occur you must force the language to English
4747
4848
## Next steps ##
4949

50-
- [Azure Media Player Quickstart](azure-media-player-quickstart.md)
50+
- [Azure Media Player Quickstart](azure-media-player-quickstart.md)

articles/migrate/migrate-support-matrix-vmware.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.date: 05/04/2020
77

88
# Support matrix for VMware assessment
99

10-
This article summarizes prerequisites and support requirements when you assess VMware VMs for migration to Azure, using the Azure Migrate:Server Assessment](migrate-services-overview.md#azure-migrate-server-assessment-tool) tool. If you want to migrate VMware VMs to Azure, review the [migration support matrix](migrate-support-matrix-vmware-migration.md).
10+
This article summarizes prerequisites and support requirements when you assess VMware VMs for migration to Azure, using the [Azure Migrate:Server Assessment](migrate-services-overview.md#azure-migrate-server-assessment-tool) tool. If you want to migrate VMware VMs to Azure, review the [migration support matrix](migrate-support-matrix-vmware-migration.md).
1111

1212
To assess VMware VMs, you create an Azure Migrate project, and then add the Server Assessment tool to the project. After the tool is added, you deploy the [Azure Migrate appliance](migrate-appliance.md). The appliance continuously discovers on-premises machines, and sends machine metadata and performance data to Azure. After discovery is complete, you gather discovered machines into groups, and run an assessment for a group.
1313

0 commit comments

Comments
 (0)