Skip to content

Commit a3f383f

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into fixScreens
2 parents 2f58c48 + f36a8e0 commit a3f383f

File tree

776 files changed

+12113
-7526
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

776 files changed

+12113
-7526
lines changed

.openpublishing.redirection.active-directory.json

Lines changed: 35 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -255,6 +255,41 @@
255255
"redirect_url": "/azure/active-directory/workload-identities/workload-identity-federation-create-trust",
256256
"redirect_document_id": true
257257
},
258+
{
259+
"source_path_from_root": "/articles/active-directory/fundamentals/concept-fundamentals-security-defaults.md",
260+
"redirect_url": "/azure/active-directory/fundamentals/security-defaults",
261+
"redirect_document_id": true
262+
},
263+
{
264+
"source_path_from_root": "/articles/active-directory/devices/hybrid-azuread-join-control.md",
265+
"redirect_url": "/azure/active-directory/devices/hybrid-join-control",
266+
"redirect_document_id": true
267+
},
268+
{
269+
"source_path_from_root": "/articles/active-directory/devices/hybrid-azuread-join-manual.md",
270+
"redirect_url": "/azure/active-directory/devices/hybrid-join-manual",
271+
"redirect_document_id": true
272+
},
273+
{
274+
"source_path_from_root": "/articles/active-directory/devices/hybrid-azuread-join-plan.md",
275+
"redirect_url": "/azure/active-directory/devices/hybrid-join-plan",
276+
"redirect_document_id": true
277+
},
278+
{
279+
"source_path_from_root": "/articles/active-directory/devices/device-management-azure-portal.md",
280+
"redirect_url": "/azure/active-directory/devices/manage-device-identities",
281+
"redirect_document_id": true
282+
},
283+
{
284+
"source_path_from_root": "/articles/active-directory/devices/concept-azure-ad-register.md",
285+
"redirect_url": "/azure/active-directory/devices/concept-device-registration",
286+
"redirect_document_id": true
287+
},
288+
{
289+
"source_path_from_root": "/articles/active-directory/devices/concept-azure-ad-join.md",
290+
"redirect_url": "/azure/active-directory/devices/concept-directory-join",
291+
"redirect_document_id": true
292+
},
258293
{
259294
"source_path_from_root": "/articles/active-directory/fundamentals/10-secure-local-guest.md",
260295
"redirect_url": "/azure/active-directory/architecture/10-secure-local-guest",

.openpublishing.redirection.defender-for-cloud.json

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -413,7 +413,7 @@
413413
{
414414
"source_path_from_root": "/articles/security-center/defender-for-dns-introduction.md",
415415
"redirect_url": "/azure/defender-for-cloud/defender-for-dns-introduction",
416-
"redirect_document_id": true
416+
"redirect_document_id": false
417417
},
418418
{
419419
"source_path_from_root": "/articles/security-center/defender-for-key-vault-introduction.md",
@@ -840,6 +840,11 @@
840840
"redirect_url": "/azure/defender-for-cloud/enable-agentless-scanning-vms",
841841
"redirect_document_id": true
842842
},
843+
{
844+
"source_path_from_root": "/articles/defender-for-cloud/tutorial-enable-dns-plan.md",
845+
"redirect_url": "/azure/defender-for-cloud/defender-for-dns-introduction",
846+
"redirect_document_id": true
847+
},
843848
{
844849
"source_path_from_root": "/articles/defender-for-cloud/defender-for-storage-exclude.md",
845850
"redirect_url": "/azure/defender-for-cloud/defender-for-storage-classic-enable#exclude-a-storage-account-from-a-protected-subscription-in-the-per-transaction-plan",

.openpublishing.redirection.json

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -9093,6 +9093,11 @@
90939093
"redirect_url": "/azure/vpn-gateway/point-to-site-vpn-client-cert-windows",
90949094
"redirect_document_id": false
90959095
},
9096+
{
9097+
"source_path_from_root": "/articles/vpn-gateway/vpn-gateway-forced-tunneling-rm.md",
9098+
"redirect_url": "/azure/vpn-gateway/about-site-to-site-tunneling",
9099+
"redirect_document_id": false
9100+
},
90969101
{
90979102
"source_path_from_root": "/articles/azure-vmware/public-ip-usage.md",
90989103
"redirect_url": "/azure/azure-vmware/enable-public-ip-nsx-edge",
@@ -23853,11 +23858,6 @@
2385323858
"redirect_url": "/azure/sentinel/data-connectors-reference",
2385423859
"redirect_document_id": false
2385523860
},
23856-
{
23857-
"source_path_from_root": "/articles/sentinel/data-connectors/cisco-meraki.md",
23858-
"redirect_url": "/azure/sentinel/data-connectors-reference",
23859-
"redirect_document_id": false
23860-
},
2386123861
{
2386223862
"source_path_from_root": "/articles/networking/scripts/virtual-network-powershell-sample-peer-two-virtual-networks.md",
2386323863
"redirect_url": "/azure/virtual-network/tutorial-connect-virtual-networks-powershell",

articles/active-directory-b2c/whats-new-docs.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: "What's new in Azure Active Directory business-to-customer (B2C)"
33
description: "New and updated documentation for the Azure Active Directory business-to-customer (B2C)."
4-
ms.date: 06/05/2023
4+
ms.date: 08/01/2023
55
ms.service: active-directory
66
ms.subservice: B2C
77
ms.topic: reference

articles/active-directory-domain-services/faqs.yml

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ metadata:
1111
ms.subservice: domain-services
1212
ms.workload: identity
1313
ms.topic: faq
14-
ms.date: 05/09/2023
14+
ms.date: 08/01/2023
1515
ms.author: justinha
1616
title: Frequently asked questions (FAQs) about Azure Active Directory (AD) Domain Services
1717
summary: This page answers frequently asked questions about Azure Active Directory Domain Services.
@@ -159,6 +159,10 @@ sections:
159159
Why do my domain controllers change names?
160160
answer: |
161161
It is possible that during the maintenance of domain controllers there is a change in their names. To avoid problems with this type of change, it is recommended to not use the names of the domain controllers hardcoded in applications and/or other domain resources, but the FQDN of the domain. This way, no matter what the names of the domain controllers are, you won't need to reconfigure anything after a name change.
162+
- question: |
163+
Is the password of the KRBTGT account in a managed domain rolled periodically? If so, what is the frequency?
164+
answer: |
165+
The password of the KRBTGT account in a managed domain is rolled over every seven (7) days.
162166
163167
- name: Billing and availability
164168
questions:

articles/active-directory-domain-services/join-windows-vm-template.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ ms.subservice: domain-services
1111
ms.workload: identity
1212
ms.custom: devx-track-arm-template
1313
ms.topic: how-to
14-
ms.date: 01/29/2023
14+
ms.date: 08/01/2023
1515
ms.author: justinha
1616
---
1717

@@ -31,7 +31,7 @@ To complete this tutorial, you need the following resources and privileges:
3131
* If needed, [create an Azure Active Directory tenant][create-azure-ad-tenant] or [associate an Azure subscription with your account][associate-azure-ad-tenant].
3232
* An Azure Active Directory Domain Services managed domain enabled and configured in your Azure AD tenant.
3333
* If needed, the first tutorial [creates and configures an Azure Active Directory Domain Services managed domain][create-azure-ad-ds-instance].
34-
* A user account that's a part of the managed domain.
34+
* A user account that's a part of the *AAD DC administrators* group.
3535

3636
## Azure Resource Manager template overview
3737

articles/active-directory-domain-services/network-considerations.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: domain-services
1010
ms.workload: identity
1111
ms.topic: conceptual
12-
ms.date: 07/31/2023
12+
ms.date: 08/01/2023
1313
ms.author: justinha
1414
ms.reviewer: xyuan
1515

@@ -149,7 +149,7 @@ If needed, you can [create the required network security group and rules using A
149149
150150
### Outbound connectivity
151151

152-
For Outbound connectivity, you can either keep **AllowVnetOutbound** and **AllowInternetOutBound** or restrict Outbound traffic by using ServiceTags listed in the following table. The ServiceTag for AzureUpdateDelivery must be added via [PowerShell](powershell-create-instance.md).
152+
For Outbound connectivity, you can either keep **AllowVnetOutbound** and **AllowInternetOutBound** or restrict Outbound traffic by using ServiceTags listed in the following table. The ServiceTag for AzureUpdateDelivery must be added via [PowerShell](powershell-create-instance.md). Make sure no other NSG with higher priority denies the Outbound connectivity. If Outbound connectivity is denied, replication won't work between replica sets.
153153

154154

155155
| Outbound port number | Protocol | Source | Destination | Action | Required | Purpose |

articles/active-directory-domain-services/tutorial-create-instance.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: domain-services
99
ms.workload: identity
1010
ms.topic: tutorial
11-
ms.date: 07/31/2023
11+
ms.date: 08/01/2023
1212
ms.author: justinha
1313

1414
#Customer intent: As an identity administrator, I want to create an Azure Active Directory Domain Services managed domain so that I can synchronize identity information with my Azure Active Directory tenant and provide Domain Services connectivity to virtual machines and applications in Azure.
@@ -67,7 +67,7 @@ When you create a managed domain, you specify a DNS name. There are some conside
6767
* **Non-routable domain suffixes:** We generally recommend that you avoid a non-routable domain name suffix, such as *contoso.local*. The *.local* suffix isn't routable and can cause issues with DNS resolution.
6868

6969
> [!TIP]
70-
> If you create a custom domain name, take care with existing DNS namespaces. It's recommended to use a domain name separate from any existing Azure or on-premises DNS name space.
70+
> If you create a custom domain name, take care with existing DNS namespaces. Although it's supported, you may want to use a domain name separate from any existing Azure or on-premises DNS namespace.
7171
>
7272
> For example, if you have an existing DNS name space of *contoso.com*, create a managed domain with the custom domain name of *aaddscontoso.com*. If you need to use secure LDAP, you must register and own this custom domain name to generate the required certificates.
7373
>

articles/active-directory/app-proxy/application-proxy-configure-complex-application.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ With [Azure AD Application Proxy](application-proxy.md), you can address this is
2929
:::image type="content" source="./media/application-proxy-configure-complex-application/complex-app-flow-1.png" alt-text="Diagram of a Complex application with multiple application segments definition.":::
3030

3131
A complex app has multiple app segments, with each app segment being a pair of an internal & external URL.
32-
There is one conditional access policy associated with the app and access to any of the external URLs work with pre-authentication with the same set of policies that are enforced for all.
32+
There is one Conditional Access policy associated with the app and access to any of the external URLs work with pre-authentication with the same set of policies that are enforced for all.
3333

3434
This solution that allows user to:
3535

articles/active-directory/app-proxy/application-proxy-configure-single-sign-on-with-headers.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@ The following table lists common capabilities required for header-based authenti
3636
|Federated SSO |In pre-authenticated mode, all applications are protected with Azure AD authentication and enable users to have single sign-on. |
3737
|Remote access |Application Proxy enables remote access to the app. Users can access the application from the internet on any browser using the External URL. Application Proxy is not intended for corporate access use. |
3838
|Header-based integration |Application Proxy does the SSO integration with Azure AD and then passes identity or other application data as HTTP headers to the application. |
39-
|Application authorization |Common policies can be specified based on the application being accessed, the user’s group membership and other policies. In Azure AD, policies are implemented using [conditional access](../conditional-access/overview.md). Application authorization policies only apply to the initial authentication request. |
39+
|Application authorization |Common policies can be specified based on the application being accessed, the user’s group membership and other policies. In Azure AD, policies are implemented using [Conditional Access](../conditional-access/overview.md). Application authorization policies only apply to the initial authentication request. |
4040
|Step-up authentication |Policies can be defined to force added authentication, for example, to gain access to sensitive resources. |
4141
|Fine grained authorization |Provides access control at the URL level. Added policies can be enforced based on the URL being accessed. The internal URL configured for the app, defines the scope of app that the policy is applied to. The policy configured for the most granular path is enforced. |
4242

0 commit comments

Comments
 (0)