Skip to content

Commit ad917c2

Browse files
authored
Merge branch 'MicrosoftDocs:main' into 240318-dps-endpoints
2 parents 2233cd6 + ed47bd3 commit ad917c2

File tree

850 files changed

+5686
-4981
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

850 files changed

+5686
-4981
lines changed

.openpublishing.redirection.json

Lines changed: 45 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,45 @@
11
{
22
"redirections": [
3+
{
4+
"source_path": "articles/internet-analyzer/internet-analyzer-cli.md",
5+
"redirect_url": "/previous-versions/azure/internet-analyzer/internet-analyzer-cli",
6+
"redirect_document_id": false
7+
},
8+
{
9+
"source_path": "articles/internet-analyzer/internet-analyzer-create-test-portal.md",
10+
"redirect_url": "/previous-versions/azure/internet-analyzer/internet-analyzer-create-test-portal",
11+
"redirect_document_id": false
12+
},
13+
{
14+
"source_path": "articles/internet-analyzer/internet-analyzer-custom-endpoint.md",
15+
"redirect_url": "/previous-versions/azure/internet-analyzer/internet-analyzer-custom-endpoint",
16+
"redirect_document_id": false
17+
},
18+
{
19+
"source_path": "articles/internet-analyzer/internet-analyzer-embed-client.md",
20+
"redirect_url": "/previous-versions/azure/internet-analyzer/internet-analyzer-embed-client",
21+
"redirect_document_id": false
22+
},
23+
{
24+
"source_path": "articles/internet-analyzer/internet-analyzer-faq.md",
25+
"redirect_url": "/previous-versions/azure/internet-analyzer/internet-analyzer-faq",
26+
"redirect_document_id": false
27+
},
28+
{
29+
"source_path": "articles/internet-analyzer/internet-analyzer-overview.md",
30+
"redirect_url": "/previous-versions/azure/internet-analyzer/internet-analyzer-overview",
31+
"redirect_document_id": false
32+
},
33+
{
34+
"source_path": "articles/internet-analyzer/internet-analyzer-scorecard.md",
35+
"redirect_url": "/previous-versions/azure/internet-analyzer/internet-analyzer-scorecard",
36+
"redirect_document_id": false
37+
},
38+
{
39+
"source_path": "articles/internet-analyzer/troubleshoot.md",
40+
"redirect_url": "/previous-versions/azure/internet-analyzer/troubleshoot",
41+
"redirect_document_id": false
42+
},
343
{
444
"source_path": "articles/batch/batch-pool-no-public-ip-address.md",
545
"redirect_url": "/previous-versions/azure/batch/articles/batch/batch-pool-no-public-ip-address",
@@ -6765,6 +6805,11 @@
67656805
"redirect_url": "/azure/scheduler/migrate-from-scheduler-to-logic-apps",
67666806
"redirect_document_id": false
67676807
},
6808+
{
6809+
"source_path_from_root": "/articles/search/search-get-started-retrieval-augmented-generation.md",
6810+
"redirect_url": "/azure/ai-services/openai/use-your-data-quickstart",
6811+
"redirect_document_id": false
6812+
},
67686813
{
67696814
"source_path_from_root": "/articles/search/cognitive-search-tutorial-blob-python.md",
67706815
"redirect_url": "/azure/search/samples-python",

articles/active-directory-b2c/conditional-access-identity-protection-overview.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Identity Protection and Conditional Access in Azure AD B2C
33
description: Learn how Identity Protection gives you visibility into risky sign-ins and risk detections. Find out how and Conditional Access lets you enforce organizational policies based on risk events in your Azure AD B2C tenants.
44
ms.service: active-directory
5-
ms.subservice: conditional-access
5+
ms.subservice: B2C
66
ms.topic: overview
77
ms.date: 01/11/2024
88
ms.author: kengaderdus
@@ -29,7 +29,7 @@ If you're already familiar with [Identity Protection](../active-directory/identi
2929

3030
By pairing Conditional Access policies with Identity Protection risk detection, you can respond to risky authentications with the appropriate policy action.
3131

32-
- **Gain a new level of visibility into the authentication risks for your apps and your customer base**. With signals from billions of monthly authentications across Microsoft Entra ID and Microsoft Account, the risk detection algorithms will now flag authentications as low, medium, or high risk for your local consumer or citizen authentications.
32+
- **Gain a new level of visibility into the authentication risks for your apps and your customer base**. With signals from billions of monthly authentications across Microsoft Entra ID and Microsoft Account, the risk detection algorithms flag authentications as low, medium, or high risk for your local consumer or citizen authentications.
3333
- **Automatically address risks by configuring your own adaptive authentication**. For specified applications, you can require a specific set of users to provide a second authentication factor, as in multi-factor authentication (MFA). Or you can block access based on the risk level detected. As with other Azure AD B2C experiences, you can customize resulting end-user experience with your organization’s voice, style, and brand. You can also display mitigation alternatives if the user isn't able to gain access.
3434
- **Control access based on location, groups, and apps**.  Conditional Access can also be used to control non-risk based situations. For example, you can require MFA for customers accessing a specific app, or block access from specified geographies.
3535
- **Integrate with Azure AD B2C user flows and Identity Experience Framework custom policies**. Use your existing customized experiences and add the controls you need to interface with Conditional Access. You can also implement advanced scenarios for granting access, such as knowledge-based access or your own preferred MFA provider.

articles/active-directory-b2c/conditional-access-user-flow.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Add Conditional Access to a user flow in Azure AD B2C
33
description: Learn how to add Conditional Access to your Azure AD B2C user flows. Configure multifactor authentication (MFA) settings and Conditional Access policies in your user flows to enforce policies and remediate risky sign-ins.
44

55
ms.service: active-directory
6-
ms.subservice: conditional-access
6+
ms.subservice: B2C
77
ms.topic: overview
88
ms.date: 01/11/2024
99
ms.author: kengaderdus
@@ -40,13 +40,13 @@ The following example shows a Conditional Access technical profile that is used
4040
</TechnicalProfile>
4141
```
4242

43-
To ensure that Identity Protection signals are evaluated properly, you'll want to call the `ConditionalAccessEvaluation` technical profile for all users, including both [local and social accounts](technical-overview.md#consumer-accounts). Otherwise, Identity Protection will indicate an incorrect degree of risk associated with users.
43+
To ensure that Identity Protection signals are evaluated properly, you'll want to call the `ConditionalAccessEvaluation` technical profile for all users, including both [local and social accounts](technical-overview.md#consumer-accounts). Otherwise, Identity Protection indicates an incorrect degree of risk associated with users.
4444
::: zone-end
4545
In the *Remediation* phase that follows, the user is challenged with MFA. Once complete, Azure AD B2C informs Identity Protection that the identified sign-in threat has been remediated and by which method. In this example, Azure AD B2C signals that the user has successfully completed the multifactor authentication challenge.
4646
The remediation may also happen through other channels. For example, when the account's password is reset, either by the administrator or by the user. You can check the user *Risk state* in the [risky users report](identity-protection-investigate-risk.md#navigating-the-risky-users-report).
4747
::: zone pivot="b2c-custom-policy"
4848
> [!IMPORTANT]
49-
> To remediate the risk successfully within the journey, make sure the *Remediation* technical profile is called after the *Evaluation* technical profile is executed. If *Evaluation* is invoked without *Remediation*, the risk state will be *At risk*.
49+
> To remediate the risk successfully within the journey, make sure the *Remediation* technical profile is called after the *Evaluation* technical profile is executed. If *Evaluation* is invoked without *Remediation*, the risk state indicates as *At risk*.
5050
When the *Evaluation* technical profile recommendation returns `Block`, the call to the *Evaluation* technical profile is not required. The risk state is set to *At risk*.
5151
The following example shows a Conditional Access technical profile used to remediate the identified threat:
5252

@@ -122,7 +122,7 @@ To add a Conditional Access policy:
122122

123123
| Include |License | Notes|
124124
|---|---|---|
125-
|**All users** | P1, P2 | This policy will affect all of your users. To be sure not to lock yourself out, exclude your administrative account by choosing **Exclude**, selecting **Directory roles**, and then selecting **Global Administrator** in the list. You can also select **Users and Groups** and then select your account in the **Select excluded users** list. |
125+
|**All users** | P1, P2 | This policy affects all of your users. To be sure not to lock yourself out, exclude your administrative account by choosing **Exclude**, selecting **Directory roles**, and then selecting **Global Administrator** in the list. You can also select **Users and Groups** and then select your account in the **Select excluded users** list. |
126126

127127
1. Select **Cloud apps or actions**, and then **Select apps**. Browse for your [relying party application](tutorial-register-applications.md).
128128
1. Select **Conditions**, and then select from the following conditions. For example, select **Sign-in risk** and **High**, **Medium**, and **Low** risk levels.
@@ -228,7 +228,7 @@ To configure your user based conditional access:
228228
7. Under **Conditions** > **User risk**, set **Configure** to **Yes**. Under **Configure user risk levels needed for policy to be enforced**
229229
1. Select **High** and **Medium**.
230230
2. Select **Done**.
231-
8. Under **Access controls** > **Grant**, select **Grant access**, **Require password change**, and select **Select**. **Require multi-factor authentication** will also be required by default.
231+
8. Under **Access controls** > **Grant**, select **Grant access**, **Require password change**, and select **Select**. **Require multi-factor authentication** is also be required by default.
232232
9. Confirm your settings and set **Enable policy** to **On**.
233233
10. Select **Create** to create to enable your policy.
234234

@@ -345,7 +345,7 @@ The following template can be used to create a Conditional Access policy with di
345345
## Add Conditional Access to a user flow
346346

347347
After you've added the Microsoft Entra Conditional Access policy, enable Conditional Access in your user flow or custom policy. When you enable Conditional Access, you don't need to specify a policy name.
348-
Multiple Conditional Access policies may apply to an individual user at any time. In this case, the most strict access control policy takes precedence. For example, if one policy requires MFA while the other blocks access, the user will be blocked.
348+
Multiple Conditional Access policies may apply to an individual user at any time. In this case, the most strict access control policy takes precedence. For example, if one policy requires MFA while the other blocks access, the user is blocked.
349349

350350
## Enable multifactor authentication (optional)
351351

@@ -386,7 +386,7 @@ To enable Conditional Access for a user flow, make sure the version supports Con
386386
### Configure claim other than phone number to be used for MFA
387387

388388
In the Conditional Access policy above, the `DoesClaimExist` claim transformation method checks if a claim contains a value, for example if the `strongAuthenticationPhoneNumber` claim contains a phone number.
389-
The claims transformation isn't limited to the `strongAuthenticationPhoneNumber` claim. Depending on the scenario, you can use any other claim. In the following XML snippet, the `strongAuthenticationEmailAddress` claim is checked instead. The claim you choose must have a valid value, otherwise the `IsMfaRegistered` claim will be set to `False`. When set to `False`, the Conditional Access policy evaluation returns a `Block` grant type, preventing the user from completing user flow.
389+
The claims transformation isn't limited to the `strongAuthenticationPhoneNumber` claim. Depending on the scenario, you can use any other claim. In the following XML snippet, the `strongAuthenticationEmailAddress` claim is checked instead. The claim you choose must have a valid value, otherwise the `IsMfaRegistered` claim is set to `False`. When set to `False`, the Conditional Access policy evaluation returns a `Block` grant type, preventing the user from completing user flow.
390390

391391
```xml
392392
<ClaimsTransformation Id="IsMfaRegisteredCT" TransformationMethod="DoesClaimExist">

articles/advisor/advisor-resiliency-reviews.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -85,8 +85,8 @@ Select **Manage** > **Reviews (Preview)** in the left navigation pane. A list of
8585

8686
At the top of the reviews page, use **Feedback** to tell us about your experience. Use the **Refresh** button to refresh the page as needed.
8787

88-
[!NOTE]
89-
If you have no reviews, the **Reviews** menu item in the left navigation is greyed out.
88+
> [!NOTE]
89+
> If you have no reviews, the **Reviews** menu item in the left navigation is greyed out.
9090
9191
### Review recommendations
9292

@@ -133,8 +133,8 @@ From a review recommendations details page:
133133
1. You can reject multiple recommendations at a time using the checkbox control, and the same reason for rejection is applied to all selected recommendations. If you need to select a different reason, reject one recommendation at a time.
134134
1. If you reject a recommendation by mistake, select **Reset** to move it back to the pending state and tab.
135135

136-
[!NOTE]
137-
The reason for the rejection is visible to your account team. It helps them understand workload context and your business priorities better. Additionally, Microsoft uses this information to improve the quality of recommendations.
136+
> [!NOTE]
137+
> The reason for the rejection is visible to your account team. It helps them understand workload context and your business priorities better. Additionally, Microsoft uses this information to improve the quality of recommendations.
138138
139139
## Implement recommendations
140140

@@ -155,8 +155,8 @@ The recommendations are grouped by type:
155155
* **Reviews**: These recommendations are part of a review for a selected workload.
156156
* **Automated**: These recommendations are the standard Advisor recommendations for the selected subscriptions.
157157

158-
[!NOTE]
159-
If none of your resiliency review recommendations are in the *Accepted* state, the **Reviews** tab is hidden.
158+
> [!NOTE]
159+
> If none of your resiliency review recommendations are in the *Accepted* state, the **Reviews** tab is hidden.
160160
161161
:::image type="content" source="./media/resiliency-reviews/resiliency-review-recommendation-list-accepted.png" alt-text="Screenshot of the Azure Advisor Resiliency Reviews recommendations page of accepted recommendations." lightbox="./media/resiliency-reviews/resiliency-review-recommendation-list-accepted.png":::
162162

articles/advisor/toc.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -44,6 +44,8 @@
4444
items:
4545
- name: Use Azure Well Architected Framework Assessments
4646
href: advisor-assessments.md
47+
- name: Use Azure Advisor resiliency reviews
48+
href: advisor-resiliency-reviews.md
4749
- name: Optimize virtual machine spend by resizing or shutting down underutilized instances
4850
href: advisor-cost-recommendations.md
4951
- name: Optimize your Azure costs using the cost optimization workbook

articles/ai-services/computer-vision/concept-detecting-faces.md

Lines changed: 2 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -17,14 +17,10 @@ ms.author: pafarley
1717
Image Analysis 3.2 can detect human faces within an image and generate rectangle coordinates for each detected face.
1818

1919
> [!NOTE]
20-
> This feature is also offered by the dedicated [Face](./overview-identity.md) service. Use this alternative for more detailed face analysis, including face identification and head pose detection.
20+
> This feature is also offered by the dedicated [Azure AI Face](./overview-identity.md) service. Use that alternative for more detailed face analysis, including face identification and head pose detection.
2121
2222
[!INCLUDE [Sensitive attributes notice](./includes/identity-sensitive-attributes.md)]
2323

24-
Try out the face detection features quickly and easily in your browser using Vision Studio.
25-
26-
> [!div class="nextstepaction"]
27-
> [Try Vision Studio](https://portal.vision.cognitive.azure.com/)
2824

2925
## Face detection examples
3026

@@ -55,7 +51,7 @@ The following example demonstrates the JSON response returned by Analyze API for
5551
}
5652
```
5753

58-
The next example demonstrates the JSON response returned for an image containing multiple human faces.
54+
The next example demonstrates the JSON response returned for an image containing multiple faces.
5955

6056
![Vision Analyze Family Photo Face](./Images/family_photo_face.png)
6157

articles/ai-services/computer-vision/faq.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ sections:
2424
- question: |
2525
How can I increase the transactions-per-second (TPS) allowed by the service?
2626
answer: |
27-
The free (S0) tier only allows 20 transactions per minute. Upgrade to the S1 tier to get up to 30 transactions per second. If you're seeing the error code 429 and the "Too many requests" error message, [submit an Azure support ticket](https://azure.microsoft.com/support/create-ticket/) to raise your TPS to 50 or higher with a brief business justification. [Azure AI Vision pricing](https://azure.microsoft.com/pricing/details/cognitive-services/computer-vision/#pricing).
27+
The free (S0) tier only allows 20 transactions per minute. Upgrade to the S1 tier to get up to 20 transactions per second. If you're seeing the error code 429 and the "Too many requests" error message, [submit an Azure support ticket](https://azure.microsoft.com/support/create-ticket/) to raise your TPS to 50 or higher with a brief business justification. [Azure AI Vision pricing](https://azure.microsoft.com/pricing/details/cognitive-services/computer-vision/#pricing).
2828
2929
- question: |
3030
The service is throwing an error because my image file is too large. How can I work around this?

0 commit comments

Comments
 (0)