Skip to content

Commit 99fac2e

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into work-azure-vmportal
2 parents f9768a7 + a500288 commit 99fac2e

File tree

87 files changed

+2468
-809
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

87 files changed

+2468
-809
lines changed

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -64969,6 +64969,11 @@
6496964969
{
6497064970
"source_path": "articles/app-service/quickstart-dotnet-framework.md",
6497164971
"redirect_url": "/azure/app-service/quickstart-dotnetcore?tabs=netframework48"
64972+
},
64973+
{
64974+
"source_path": "articles/virtual-desktop/rd-gateway-role.md",
64975+
"redirect_url": "/windows-server/remote/remote-desktop-services/remote-desktop-gateway-role",
64976+
"redirect_document_id": false
6497264977
}
6497364978
]
6497464979
}

articles/active-directory/authentication/howto-mfa-mfasettings.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -233,7 +233,7 @@ The _Trusted IPs_ feature of Azure AD Multi-Factor Authentication bypasses multi
233233
> [!NOTE]
234234
> The trusted IPs can include private IP ranges only when you use MFA Server. For cloud-based Azure AD Multi-Factor Authentication, you can only use public IP address ranges.
235235
>
236-
> IPv6 ranges are only supported in the [Named location (preview)](../conditional-access/location-condition.md#preview-features) interface.
236+
> IPv6 ranges are only supported in the [Named location (preview)](../conditional-access/location-condition.md) interface.
237237
238238
If your organization deploys the NPS extension to provide MFA to on-premises applications note the source IP address will always appear to be the NPS server the authentication attempt flows through.
239239

articles/active-directory/conditional-access/concept-continuous-access-evaluation.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -139,7 +139,7 @@ From this page, you can optionally limit the users and groups that will be subje
139139
For CAE, we only have insights into named IP-based named locations. We have no insights into other location settings like [MFA trusted IPs](../authentication/howto-mfa-mfasettings.md#trusted-ips) or country-based locations. When user comes from an MFA trusted IP or trusted locations that include MFA Trusted IPs or country location, CAE will not be enforced after user move to a different location. In those cases, we will issue a 1-hour CAE token without instant IP enforcement check.
140140

141141
> [!IMPORTANT]
142-
> When configuring locations for continuous access evaluation, use only the [IP based Conditional Access location condition](../conditional-access/location-condition.md#preview-features) and configure all IP addresses, **including both IPv4 and IPv6**, that can be seen by your identity provider and resources provider. Do not use country location conditions or the trusted ips feature that is available in Azure AD Multi-Factor Authentication's service settings page.
142+
> When configuring locations for continuous access evaluation, use only the [IP based Conditional Access location condition](../conditional-access/location-condition.md) and configure all IP addresses, **including both IPv4 and IPv6**, that can be seen by your identity provider and resources provider. Do not use country location conditions or the trusted ips feature that is available in Azure AD Multi-Factor Authentication's service settings page.
143143
144144
### IP address configuration
145145

articles/active-directory/conditional-access/location-condition.md

Lines changed: 14 additions & 43 deletions
Original file line numberDiff line numberDiff line change
@@ -30,39 +30,37 @@ Organizations can use this network location for common tasks like:
3030

3131
The network location is determined by the public IP address a client provides to Azure Active Directory. Conditional Access policies by default apply to all IPv4 and IPv6 addresses.
3232

33-
> [!TIP]
34-
> IPv6 ranges are only supported in the **[Named location (preview)](#preview-features)** interface.
35-
3633
## Named locations
3734

38-
Locations are designated in the Azure portal under **Azure Active Directory** > **Security** > **Conditional Access** > **Named locations**. These named network locations may include locations like an organization's headquarters network ranges, VPN network ranges, or ranges that you wish to block.
35+
Locations are designated in the Azure portal under **Azure Active Directory** > **Security** > **Conditional Access** > **Named locations**. These named network locations may include locations like an organization's headquarters network ranges, VPN network ranges, or ranges that you wish to block. Named locations can be defined by IPv4/IPv6 address ranges or by countries/regions.
3936

4037
![Named locations in the Azure portal](./media/location-condition/new-named-location.png)
4138

42-
To configure a location, you will need to provide at least a **Name** and the IP range.
43-
44-
The number of named locations you can configure is constrained by the size of the related object in Azure AD. You can configure locations based on of the following limitations:
39+
### IP address ranges
4540

46-
- One named location with up to 1200 IPv4 ranges.
47-
- A maximum of 90 named locations with one IP range assigned to each of them.
41+
To define a named location by IPv4/IPv6 address ranges, you will need to provide a **Name** and an IP range.
4842

49-
> [!TIP]
50-
> IPv6 ranges are only supported in the **[Named location (preview)](#preview-features)** interface.
43+
Named locations defined by IPv4/IPv6 address ranges are subject to the following limitations:
44+
- Configure up to 195 named locations
45+
- Configure up to 2000 IP ranges per named location
46+
- Both IPv4 and IPv6 ranges are supported
47+
- Private IP ranges connot be configured
48+
- The number of IP addresses contained in a range is limited. Only CIDR masks greater than /8 are allowed when defining an IP range.
5149

5250
### Trusted locations
5351

54-
When creating a network location, an administrator has the option to mark a location as a trusted location.
52+
Administrators can designate named locations defined by IP address ranges to be trusted named locations.
5553

5654
![Trusted locations in the Azure portal](./media/location-condition/new-trusted-location.png)
5755

58-
This option can factor in to Conditional Access policies where you may, for example, require registration for multi-factor authentication from a trusted network location. It also factors in to Azure AD Identity Protection's risk calculation, lowering a users' sign-in risk when coming from a location marked as trusted.
56+
Sign-ins from trusted named locations improve the accuracy of Azure AD Identity Protection's risk calculation, lowering a users' sign-in risk when they authenticate from a location marked as trusted. Additionally, trusted named locations can be targeted in Conditional Access policies. For example, you may require restrict multi-factor authentication registration to trusted named locations only.
5957

6058
### Countries and regions
6159

62-
Some organizations may choose to define entire countries or regions IP boundaries as named locations for Conditional Access policies. They may use these locations when blocking unnecessary traffic when they know valid users will never come from a location such as North Korea. These mappings of IP address to country are updated periodically.
60+
Some organizations may choose to restrict access to certain countries or regions using Conditional Access. In addition to defining named locations by IP ranges, admins can define named locations by country or regions. When a user signs in, Azure AD resolves the user's IPv4 address to a country or region, and the mapping is updated periodically. Organizations can use named locations defined by countries to block traffic from countries where they do not do business, such as North Korea.
6361

6462
> [!NOTE]
65-
> IPv6 address ranges cannot be mapped to countries. Only IPv4 addresses map to countries.
63+
> Sign-ins from IPv6 addresses cannot be mapped to countries or regions, and are considered unknown areas. Only IPv4 addresses can be mapped to countries or regions.
6664
6765
![Create a new country or region-based location in the Azure portal](./media/location-condition/new-named-location-country-region.png)
6866

@@ -89,33 +87,6 @@ For mobile and desktop applications, which have long lived session lifetimes, Co
8987

9088
If both steps fail, a user is considered to be no longer on a trusted IP.
9189

92-
## Preview features
93-
94-
In addition to the generally available named location feature, there is also a named location (preview). You can access the named location preview by using the banner at the top of the current named location blade.
95-
96-
![Try the named locations preview](./media/location-condition/preview-features.png)
97-
98-
With the named location preview, you are able to
99-
100-
- Configure up to 195 named locations
101-
- Configure up to 2000 IP Ranges per named location
102-
- Configure IPv6 addresses alongside IPv4 addresses
103-
104-
We’ve also added some additional checks to help reduce the change of misconfiguration.
105-
106-
- Private IP ranges can no longer be configured
107-
- The number of IP addresses that can be included in a range are limited. Only CIDR masks greater than /8 will be allowed when configuring an IP range.
108-
109-
With the preview, there are now two create options:
110-
111-
- **Countries location**
112-
- **IP ranges location**
113-
114-
> [!NOTE]
115-
> IPv6 address ranges cannot be mapped to countries. Only IPv4 addresses map to countries.
116-
117-
![Named locations preview interface](./media/location-condition/named-location-preview.png)
118-
11990
## Location condition in policy
12091

12192
When you configure the location condition, you have the option to distinguish between:
@@ -141,7 +112,7 @@ With this option, you can select one or more named locations. For a policy with
141112

142113
## IPv6 traffic
143114

144-
By default, Conditional Access policies will apply to all IPv6 traffic. With the [named location preview](#preview-features), you can exclude specific IPv6 address ranges from a Conditional Access policy. This option is useful in cases where you don’t want policy to be enforced for specific IPv6 ranges. For example, if you want to not enforce a policy for uses on your corporate network, and your corporate network is hosted on public IPv6 ranges.
115+
By default, Conditional Access policies will apply to all IPv6 traffic. You can exclude specific IPv6 address ranges from a Conditional Access policy if you don’t want policies to be enforced for specific IPv6 ranges. For example, if you want to not enforce a policy for uses on your corporate network, and your corporate network is hosted on public IPv6 ranges.
145116

146117
### When will my tenant have IPv6 traffic?
147118

articles/active-directory/managed-identities-azure-resources/services-support-managed-identities.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -285,7 +285,7 @@ Refer to the following list to configure managed identity for Azure Policy (in r
285285
- [PowerShell](../../governance/policy/how-to/remediate-resources.md#create-managed-identity-with-powershell)
286286
- [Azure CLI](/cli/azure/policy/assignment#az-policy-assignment-create)
287287
- [Azure Resource Manager templates](/azure/templates/microsoft.authorization/policyassignments)
288-
- [REST](/rest/api/resources/policyassignments/create)
288+
- [REST](/rest/api/policy/policyassignments/create)
289289

290290

291291
### Azure Service Fabric

articles/azure-monitor/agents/diagnostics-extension-stream-event-hubs.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -173,7 +173,7 @@ You can use a variety of methods to validate that data is being sent to the even
173173

174174
* [Event Hubs overview](../../event-hubs/event-hubs-about.md)
175175
* [Create an event hub](../../event-hubs/event-hubs-create.md)
176-
* [Event Hubs FAQ](../../event-hubs/event-hubs-faq.md)
176+
* [Event Hubs FAQ](../../event-hubs/event-hubs-faq.yml)
177177

178178
<!-- Images. -->
179179
[0]: ../../event-hubs/media/event-hubs-streaming-azure-diags-data/dashboard.png

articles/azure-monitor/logs/data-security.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -99,7 +99,7 @@ Log Analytics has an incident management process that all Microsoft services adh
9999
* Operators working on the Microsoft Azure service have addition training obligations surrounding their access to sensitive systems hosting customer data.
100100
* Microsoft security response personnel receive specialized training for their roles
101101

102-
If loss of any customer data occurs, we notify each customer within one day. However, customer data loss has never occurred with the service.
102+
While very rare, Microsoft will notify each customer within one day if significant loss of any customer data occurs.
103103

104104
For more information about how Microsoft responds to security incidents, see [Microsoft Azure Security Response in the Cloud](https://gallery.technet.microsoft.com/Azure-Security-Response-in-dd18c678/file/150826/4/Microsoft%20Azure%20Security%20Response%20in%20the%20cloud.pdf).
105105

@@ -186,4 +186,4 @@ You can use these additional security features to further secure your Azure Moni
186186
## Next steps
187187
* Learn how to collect data with Log Analytics for your Azure VMs following the [Azure VM quickstart](../vm/quick-collect-azurevm.md).
188188

189-
* If you are looking to collect data from physical or virtual Windows or Linux computers in your environment, see the [Quickstart for Linux computers](../vm/quick-collect-linux-computer.md) or [Quickstart for Windows computers](../vm/quick-collect-windows-computer.md)
189+
* If you are looking to collect data from physical or virtual Windows or Linux computers in your environment, see the [Quickstart for Linux computers](../vm/quick-collect-linux-computer.md) or [Quickstart for Windows computers](../vm/quick-collect-windows-computer.md)

articles/azure-relay/TOC.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -94,7 +94,7 @@
9494
- name: Azure Roadmap
9595
href: https://azure.microsoft.com/roadmap/?category=enterprise-integration
9696
- name: FAQ
97-
href: relay-faq.md
97+
href: relay-faq.yml
9898
- name: Blog
9999
href: /archive/blogs/servicebus/
100100
- name: Pricing

articles/azure-relay/relay-api-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -66,4 +66,4 @@ repository.
6666

6767
To learn more about Azure Relay, visit these links:
6868
* [What is Azure Relay?](relay-what-is-it.md)
69-
* [Relay FAQ](relay-faq.md)
69+
* [Relay FAQ](relay-faq.yml)

articles/azure-relay/relay-create-namespace-portal.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ Congratulations! You have now created a relay namespace.
2020

2121
## Next steps
2222

23-
* [Relay FAQ](relay-faq.md)
23+
* [Relay FAQ](relay-faq.yml)
2424
* [Get started with .NET](relay-hybrid-connections-dotnet-get-started.md)
2525
* [Get started with Node](relay-hybrid-connections-node-get-started.md)
2626

0 commit comments

Comments
 (0)