Skip to content

Commit 9abd250

Browse files
authored
Merge branch 'main' into patch-1
2 parents ab922dd + bebd454 commit 9abd250

File tree

565 files changed

+6487
-3049
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

565 files changed

+6487
-3049
lines changed

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -18328,6 +18328,11 @@
1832818328
"redirect_url": "/azure/sentinel/enable-monitoring",
1832918329
"redirect_document_id": false
1833018330
},
18331+
{
18332+
"source_path_from_root": "/articles/sentinel/dns-normalization-schema.md",
18333+
"redirect_url": "/azure/sentinel/normalization-schema-dns",
18334+
"redirect_document_id": true
18335+
},
1833118336
{
1833218337
"source_path_from_root": "/articles/service-bus/index.md",
1833318338
"redirect_url": "/azure/service-bus-messaging/index",

articles/active-directory-b2c/billing.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -76,7 +76,7 @@ A subscription linked to an Azure AD B2C tenant can be used for the billing of A
7676
1. Select **Create**.
7777
1. Select **Link an existing Azure AD B2C Tenant to my Azure subscription**.
7878
1. Select an **Azure AD B2C Tenant** from the dropdown. Only tenants for which you're a global administrator and that are not already linked to a subscription are shown. The **Azure AD B2C Resource name** field is populated with the domain name of the Azure AD B2C tenant you select.
79-
1. Select an active Azure **Subscription** of which you're an administrator.
79+
1. Select an active Azure **Subscription** of which you're an owner.
8080
1. Under **Resource group**, select **Create new**, and then specify the **Resource group location**. The resource group settings here have no impact on your Azure AD B2C tenant location, performance, or billing status.
8181
1. Select **Create**.
8282

articles/active-directory-b2c/identity-provider-salesforce.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -45,7 +45,7 @@ To enable sign-in for users with a Salesforce account in Azure Active Directory
4545
1. **Contact Email** - The contact email for Salesforce
4646
1. Under **API (Enable OAuth Settings)**, select **Enable OAuth Settings**
4747
1. For the **Callback URL**, enter `https://your-tenant-name.b2clogin.com/your-tenant-name.onmicrosoft.com/oauth2/authresp`. If you use a [custom domain](custom-domain.md), enter `https://your-domain-name/your-tenant-name.onmicrosoft.com/oauth2/authresp`. Replace `your-tenant-name` with the name of your tenant, and `your-domain-name` with your custom domain. You need to use all lowercase letters when entering your tenant name even if the tenant is defined with uppercase letters in Azure AD B2C.
48-
1. In the **Selected OAuth Scopes**, select **Access your basic information (id, profile, email, address, phone)**, and **Allow access to your unique identifier (openid)**.
48+
1. In the **Selected OAuth Scopes**, select **Access the identity URL service (id, profile, email, address, phone)**, and **Allow access to your unique identifier (openid)**.
4949
1. Select **Require Secret for Web Server Flow**.
5050
1. Select **Configure ID Token**
5151
1. Set the **Token Valid for** 5 minutes.

articles/active-directory-b2c/language-customization.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -472,7 +472,7 @@ Chrome and Firefox both request for their set language. If it's a supported lang
472472

473473
## Supported languages
474474

475-
Azure AD B2C includes support for the following languages. User flow languages are provided by Azure AD B2C. The multi-factor authentication (MFA) notification languages are provided by [Azure AD MFA](../active-directory/authentication/concept-mfa-howitworks.md).
475+
Azure AD B2C includes support for the following languages by using ISO 639-1 codes. User flow languages are provided by Azure AD B2C. The multi-factor authentication (MFA) notification languages are provided by [Azure AD MFA](../active-directory/authentication/concept-mfa-howitworks.md).
476476

477477
| Language | Language code | User flows | MFA notifications |
478478
|-----------------------| :-----------: | :----------------: | :----------------: |
@@ -527,6 +527,7 @@ Azure AD B2C includes support for the following languages. User flow languages a
527527
| Turkish | tr | ![Green check mark.](./media/user-flow-language-customization/yes.png) | ![Green check mark.](./media/user-flow-language-customization/yes.png) |
528528
| Ukrainian | uk | ![X indicating no.](./media/user-flow-language-customization/no.png) | ![Green check mark.](./media/user-flow-language-customization/yes.png) |
529529
| Vietnamese | vi | ![X indicating no.](./media/user-flow-language-customization/no.png) | ![Green check mark.](./media/user-flow-language-customization/yes.png) |
530+
| Welsh | cy | ![X indicating no.](./media/user-flow-language-customization/no.png) | ![X indicating no.](./media/user-flow-language-customization/no.png) |
530531
| Chinese - Simplified | zh-hans | ![Green check mark.](./media/user-flow-language-customization/yes.png) | ![Green check mark.](./media/user-flow-language-customization/yes.png) |
531532
| Chinese - Traditional | zh-hant | ![Green check mark.](./media/user-flow-language-customization/yes.png) | ![Green check mark.](./media/user-flow-language-customization/yes.png) |
532533

articles/active-directory/app-provisioning/use-scim-to-build-users-and-groups-endpoints.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -75,7 +75,7 @@ Go to the [reference code](https://github.com/AzureAD/SCIMReferenceCode) from Gi
7575
7676
1. If not installed, add [Azure App Service for Visual Studio Code](https://marketplace.visualstudio.com/items?itemName=ms-azuretools.vscode-azureappservice) extension.
7777
78-
1. To deploy the Microsoft.SCIM.WebHostSample app to Azure App Services, [create a new App Services](../../app-service/tutorial-dotnetcore-sqldb-app.md#2---create-the-app-service).
78+
1. To deploy the Microsoft.SCIM.WebHostSample app to Azure App Services, [create a new App Services](../../app-service/quickstart-dotnetcore.md?tabs=net60&pivots=development-environment-vscode#publish-your-web-app).
7979
8080
1. In the Visual Studio Code terminal, run the .NET CLI command below. This command generates a deployable publish folder for the app in the bin/debug/publish directory.
8181

articles/active-directory/conditional-access/location-condition.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -87,7 +87,8 @@ For the next 24 hours, if the user is still accessing the resource and granted t
8787

8888
Every time the user shares their GPS location, the app does jailbreak detection (Using the same logic as the Intune MAM SDK). If the device is jailbroken, the location isn't considered valid, and the user isn't granted access.
8989

90-
A Conditional Access policy with GPS-based named locations in report-only mode prompts users to share their GPS location, even though they aren't blocked from signing in.
90+
> [!NOTE]
91+
>A Conditional Access policy with GPS-based named locations in report-only mode prompts users to share their GPS location, even though they aren't blocked from signing in.
9192
9293
GPS location doesn't work with [passwordless authentication methods](../authentication/concept-authentication-passwordless.md).
9394

articles/active-directory/conditional-access/workload-identity.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ A [workload identity](../develop/workload-identities-overview.md) is an identity
2828
These differences make workload identities harder to manage and put them at higher risk for compromise.
2929

3030
> [!IMPORTANT]
31-
> Conditional Access policies can be scoped to to service principals in Azure AD with Workload Identities Premium licenses.
31+
> Conditional Access policies can be scoped to service principals in Azure AD with Workload Identities Premium licenses.
3232
3333
> [!NOTE]
3434
> Policy can be applied to single tenant service principals that have been registered in your tenant. Third party SaaS and multi-tenanted apps are out of scope. Managed identities are not covered by policy.

articles/active-directory/devices/enterprise-state-roaming-windows-settings-reference.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ The following is a list of the settings that will be roamed or backed up in Wind
2121

2222
## Windows Settings details
2323

24-
List of settings that can be configured to sync in recent Windows versions. These can be found in Windows 11 under **Settings** > **Accounts** > **Sync your settings** or **Settings** > **Accounts** > **Windows backup** > **Remember my preferences**.
24+
List of settings that can be configured to sync in recent Windows versions.
2525

2626
| Settings | Windows 10 (21H1 or newer) |
2727
| --- | --- |
@@ -36,6 +36,8 @@ List of settings that can be configured to sync in recent Windows versions. Thes
3636
| Touchpad: Scrolling Direction | sync |
3737
| Wi-Fi: Wi-Fi profiles (only WPA) | sync |
3838

39+
Control over these settings can be found in Windows 10 under **Settings** > **Accounts** > **Sync your settings** or in Windows 11 under **Settings** > **Accounts** > **Windows backup** > **Remember my preferences**.
40+
3941
## Browser settings
4042

4143
For more information on the Sync behavior for the new Microsoft Edge, see the article [Microsoft Edge Sync](/deployedge/microsoft-edge-enterprise-sync).

articles/active-directory/fundamentals/security-operations-infrastructure.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -212,7 +212,7 @@ For information on what and how to monitor configuration information refer to:
212212
| What to monitor| Risk level| Where| Filter/sub-filter| Notes |
213213
| - | - | - | - | - |
214214
| Scheduler changes|High | PowerShell| Set-ADSyncScheduler| Look for modifications to schedule |
215-
| Changes to scheduled tasks| High | Azure AD Audit logs| Activity = 4699(S): A scheduled task was deleted<br>-or-<br>Activity = 4701(s): A scheduled task was disabled<br>-or-<br>Activity = 4701(s): A scheduled task was updated| Monitor all |
215+
| Changes to scheduled tasks| High | Azure AD Audit logs| Activity = 4699(S): A scheduled task was deleted<br>-or-<br>Activity = 4701(s): A scheduled task was disabled<br>-or-<br>Activity = 4702(s): A scheduled task was updated| Monitor all |
216216

217217
* For more information on logging PowerShell script operations, see [Enabling Script Block Logging](/powershell/module/microsoft.powershell.core/about/about_logging_windows), which is part of the PowerShell reference documentation.
218218

0 commit comments

Comments
 (0)