Skip to content

Commit a4e6bd2

Browse files
committed
Merging changes synced from https://github.com/MicrosoftDocs/azure-docs-pr (branch live)
2 parents a2da5de + 0be1706 commit a4e6bd2

File tree

143 files changed

+1752
-803
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

143 files changed

+1752
-803
lines changed

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -29353,6 +29353,11 @@
2935329353
"source_path_from_root": "/articles/application-gateway/configuration-front-end-ip.md",
2935429354
"redirect_url": "/azure/application-gateway/configuration-frontend-ip",
2935529355
"redirect_document_id": false
29356+
},
29357+
{
29358+
"source_path_from_root": "/articles/virtual-network/ip-services/create-custom-ip-address-prefix-ipv6.md",
29359+
"redirect_url": "/azure/virtual-network/ip-services/create-custom-ip-address-prefix-ipv6-powershell",
29360+
"redirect_document_id": false
2935629361
}
2935729362
]
2935829363
}

articles/active-directory/hybrid/how-to-connect-install-prerequisites.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -83,7 +83,8 @@ We recommend that you harden your Azure AD Connect server to decrease the securi
8383
- Follow these [additional guidelines](/windows-server/identity/ad-ds/plan/security-best-practices/reducing-the-active-directory-attack-surface) to reduce the attack surface of your Active Directory environment.
8484
- Follow the [Monitor changes to federation configuration](how-to-connect-monitor-federation-changes.md) to setup alerts to monitor changes to the trust established between your Idp and Azure AD.
8585
- Enable Multi Factor Authentication (MFA) for all users that have privileged access in Azure AD or in AD. One security issue with using AADConnect is that if an attacker can get control over the Azure AD Connect server they can manipulate users in Azure AD. To prevent a attacker from using these capabilities to take over Azure AD accounts, MFA offers protections so that even if an attacker manages to e.g. reset a user's password using Azure AD Connect they still cannot bypass the second factor.
86-
- Disable Soft Matching on your tenant. Soft Matching is a great feature to help transfering source of autority for existing cloud only objects to Azure AD Connect, but it comes with certain security risks. If you do not require it, you should [disable Soft Matching](how-to-connect-syncservice-features.md#blocksoftmatch)
86+
- Disable Soft Matching on your tenant. Soft Matching is a great feature to help transfering source of autority for existing cloud managed objects to Azure AD Connect, but it comes with certain security risks. If you do not require it, you should [disable Soft Matching](how-to-connect-syncservice-features.md#blocksoftmatch).
87+
- Disable Hard Match Takeover. Hard match takeover allows Azure AD Connect to take control of a cloud managed object and changing the source of authority for the object to Active Directory. Once the source of authority of an object is taken over by Azure AD Connect, changes made to the Active Directory object that is linked to the Azure AD object will overwrite the original Azure AD data - including the password hash, if Password Hash Sync is enabled. An attacker could use this capability to take over control of cloud managed objects. To mitigate this risk, [disable hard match takeover](https://learn.microsoft.com/powershell/module/msonline/set-msoldirsyncfeature?view=azureadps-1.0#example-3-block-cloud-object-takeover-through-hard-matching-for-the-tenant).
8788

8889
### SQL Server used by Azure AD Connect
8990
* Azure AD Connect requires a SQL Server database to store identity data. By default, a SQL Server 2019 Express LocalDB (a light version of SQL Server Express) is installed. SQL Server Express has a 10-GB size limit that enables you to manage approximately 100,000 objects. If you need to manage a higher volume of directory objects, point the installation wizard to a different installation of SQL Server. The type of SQL Server installation can impact the [performance of Azure AD Connect](./plan-connect-performance-factors.md#sql-database-factors).

articles/automation/automation-availability-zones.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ In the event when a zone is down, there's no action required by you to recover f
3333
## Supported regions with availability zones
3434

3535
See [Regions and Availability Zones in Azure](../availability-zones/az-overview.md) for the Azure regions that have availability zones.
36-
Automation accounts currently support the following regions in preview:
36+
Automation accounts currently support the following regions:
3737

3838
- China North 3
3939
- Qatar Central

articles/automation/whats-new.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -24,9 +24,13 @@ This page is updated monthly, so revisit it regularly. If you're looking for ite
2424

2525
## October 2022
2626

27+
### Public preview of PowerShell 7.2 and Python 3.10
28+
29+
Azure Automation now supports runbooks in latest Runtime versions - PowerShell 7.2 and Python 3.10 in public preview. This enables creation and execution of runbooks for orchestration of management tasks. These new runtimes are currently supported only for Cloud jobs in five regions - West Central US, East US, South Africa North, North Europe, Australia, and Southeast. [Learn more](automation-runbook-types.md).
30+
2731
### Guidance for Disaster Recovery of Azure Automation account
2832

29-
Azure Automation now supports you to build your own disaster recovery strategy to handle a region-wide or zone-wide failure. [Learn more](https://learn.microsoft.com/azure/automation/automation-disaster-recovery).
33+
Build your own disaster recovery strategy to handle a region-wide or zone-wide failure [Learn more](https://learn.microsoft.com/azure/automation/automation-disaster-recovery).
3034

3135
## September 2022
3236

articles/azure-arc/servers/ssh-arc-overview.md

Lines changed: 38 additions & 35 deletions
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ allowing existing management tools to have a greater impact on Azure Arc-enabled
1919
SSH access to Arc-enabled servers provides the following key benefits:
2020
- No public IP address or open SSH ports required
2121
- Access to Windows and Linux machines
22-
- Ability to log-in as a local user or an [Azure user (Linux only)](../../active-directory/devices/howto-vm-sign-in-azure-ad-linux.md)
22+
- Ability to log in as a local user or an [Azure user (Linux only)](../../active-directory/devices/howto-vm-sign-in-azure-ad-linux.md)
2323
- Support for other OpenSSH based tooling with config file support
2424

2525
## Prerequisites
@@ -42,32 +42,54 @@ SSH access to Arc-enabled servers is currently supported in the following region
4242
- Ubuntu Server: Ubuntu Server 16.04 to Ubuntu Server 20.04
4343

4444
## Getting started
45-
### Register the HybridConnectivity resource provider
45+
46+
### Install local command line tool
47+
This functionality is currently packaged in an Azure CLI extension and an Azure PowerShell module.
48+
#### [Install Azure CLI extension](#tab/azure-cli)
49+
50+
```az extension add --name ssh```
51+
4652
> [!NOTE]
47-
> This is a one-time operation that needs to be performed on each subscription.
53+
> The Azure CLI extension version must be greater than 1.1.0.
4854
49-
Check if the HybridConnectivity resource provider (RP) has been registered:
55+
#### [Install Azure PowerShell module](#tab/azure-powershell)
5056

51-
```az provider show -n Microsoft.HybridConnectivity```
57+
```Install-Module -Name AzPreview -Scope CurrentUser -Repository PSGallery -Force```
5258

53-
If the RP has not been registered, run the following:
59+
### Enable functionality on your Arc-enabled server
60+
In order to use the SSH connect feature, you must enable connections on the hybrid agent.
5461

55-
```az provider register -n Microsoft.HybridConnectivity```
62+
> [!NOTE]
63+
> The following actions must be completed in an elevated terminal session.
5664
57-
This operation can take 2-5 minutes to complete. Before moving on, check that the RP has been registered.
65+
View your current incoming connections:
5866

59-
### Install az CLI extension
60-
This functionality is currently package in an az CLI extension.
61-
In order to install this extension, run:
67+
```azcmagent config list```
6268

63-
```az extension add --name ssh```
69+
If you have existing ports, you'll need to include them in the following command.
6470

65-
If you already have the extension installed, it can be updated by running:
71+
To add access to SSH connections, run the following:
6672

67-
```az extension update --name ssh```
73+
```azcmagent config set incomingconnections.ports 22<,other open ports,...>```
74+
75+
If you're using a non-default port for your SSH connection, replace port 22 with your desired port in the previous command.
6876

6977
> [!NOTE]
70-
> The Azure CLI extension version must be greater than 1.1.0.
78+
> The following steps will not need to be run for most users.
79+
80+
### Register the HybridConnectivity resource provider
81+
> [!NOTE]
82+
> This is a one-time operation that needs to be performed on each subscription.
83+
84+
Check if the HybridConnectivity resource provider (RP) has been registered:
85+
86+
```az provider show -n Microsoft.HybridConnectivity```
87+
88+
If the RP hasn't been registered, run the following:
89+
90+
```az provider register -n Microsoft.HybridConnectivity```
91+
92+
This operation can take 2-5 minutes to complete. Before moving on, check that the RP has been registered.
7193

7294
### Create default connectivity endpoint
7395
> [!NOTE]
@@ -86,24 +108,5 @@ Validate endpoint creation:
86108
az rest --method get --uri https://management.azure.com/subscriptions/<subscription>/resourceGroups/<resourcegroup>/providers/Microsoft.HybridCompute/machines/<arc enabled server name>/providers/Microsoft.HybridConnectivity/endpoints/default?api-version=2021-10-06-preview
87109
```
88110

89-
### Enable functionality on your Arc-enabled server
90-
In order to use the SSH connect feature, you must enable connections on the hybrid agent.
91-
92-
> [!NOTE]
93-
> The following actions must be completed in an elevated terminal session.
94-
95-
View your current incoming connections:
96-
97-
```azcmagent config list```
98-
99-
If you have existing ports, you will need to include them in the following command.
100-
101-
To add access to SSH connections, run the following:
102-
103-
```azcmagent config set incomingconnections.ports 22<,other open ports,...>```
104-
105-
> [!NOTE]
106-
> If you are using a non-default port for your SSH connection, replace port 22 with your desired port in the previous command.
107-
108111
## Examples
109-
To view examples of using the ```az ssh arc``` command, view the az CLI documentation page for [az ssh](/cli/azure/ssh).
112+
To view examples, view the Az CLI documentation page for [az ssh](/cli/azure/ssh) or the Azure PowerShell documentation page for [Az.Ssh](/powershell/module/az.ssh).

0 commit comments

Comments
 (0)