Skip to content

Commit ae7d241

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into awstoazure
2 parents 89c495e + 73bb3b4 commit ae7d241

File tree

748 files changed

+3084
-2235
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

748 files changed

+3084
-2235
lines changed

.openpublishing.redirection.json

Lines changed: 103 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -1255,6 +1255,11 @@
12551255
"redirect_url": "/azure/azure-arc/servers/onboard-portal",
12561256
"redirect_document_id": false
12571257
},
1258+
{
1259+
"source_path": "articles/azure-arc/arc-overview.md",
1260+
"redirect_url": "/azure/azure-arc/overview",
1261+
"redirect_document_id": false
1262+
},
12581263
{
12591264
"source_path": "articles/active-directory/saas-apps/123contactform-tutorial.md",
12601265
"redirect_url": "/azure/active-directory/saas-apps/123formbuilder-tutorial",
@@ -1350,6 +1355,26 @@
13501355
"redirect_url": "/azure/open-datasets/how-to-create-azure-machine-learning-dataset-from-open-dataset",
13511356
"redirect_document_id": false
13521357
},
1358+
{
1359+
"source_path": "articles/virtual-machines/scripts/virtual-machines-windows-cli-sample-copy-snapshot-to-same-or-different-subscription.md",
1360+
"redirect_url": "/azure/virtual-machines/scripts/virtual-machines-cli-sample-copy-snapshot-to-same-or-different-subscription",
1361+
"redirect_document_id": false
1362+
},
1363+
{
1364+
"source_path": "articles/virtual-machines/scripts/virtual-machines-linux-cli-sample-copy-snapshot-to-same-or-different-subscription.md",
1365+
"redirect_url": "/azure/virtual-machines/scripts/virtual-machines-cli-sample-copy-snapshot-to-same-or-different-subscription",
1366+
"redirect_document_id": false
1367+
},
1368+
{
1369+
"source_path": "articles/virtual-machines/scripts/virtual-machines-linux-powershell-sample-copy-snapshot-to-same-or-different-subscription.md",
1370+
"redirect_url": "/azure/virtual-machines/scripts/virtual-machines-powershell-sample-copy-snapshot-to-same-or-different-subscription",
1371+
"redirect_document_id": false
1372+
},
1373+
{
1374+
"source_path": "articles/virtual-machines/scripts/virtual-machines-windows-powershell-sample-copy-snapshot-to-same-or-different-subscription.md",
1375+
"redirect_url": "/azure/virtual-machines/scripts/virtual-machines-powershell-sample-copy-snapshot-to-same-or-different-subscription",
1376+
"redirect_document_id": false
1377+
},
13531378
{
13541379
"source_path": "articles/virtual-machines/windows/high-performance-computing.md",
13551380
"redirect_url": "/azure/architecture/topics/high-performance-computing/",
@@ -23443,6 +23468,11 @@
2344323468
"redirect_url": "/azure/active-directory/hybrid/tshoot-connect-password-hash-synchronization",
2344423469
"redirect_document_id": false
2344523470
},
23471+
{
23472+
"source_path": "articles/active-directory/conditional-access/howto-conditional-access-report-only.md",
23473+
"redirect_url": "/azure/active-directory/conditional-access/howto-conditional-access-insights-reporting",
23474+
"redirect_document_id": true
23475+
},
2344623476
{
2344723477
"source_path": "articles/iot-hub/iot-hub-security-ground-up.md",
2344823478
"redirect_url": "/azure/iot-fundamentals/iot-security-ground-up",
@@ -27765,7 +27795,7 @@
2776527795
},
2776627796
{
2776727797
"source_path": "articles/storage/scripts/storage-linux-cli-sample-copy-managed-disks-to-same-or-different-subscription.md",
27768-
"redirect_url": "/azure/virtual-machines/scripts/virtual-machines-linux-cli-sample-copy-managed-disks-to-same-or-different-subscription",
27798+
"redirect_url": "/azure/virtual-machines/scripts/virtual-machines-cli-sample-copy-managed-disks-to-same-or-different-subscription",
2776927799
"redirect_document_id": true
2777027800
},
2777127801
{
@@ -27795,7 +27825,7 @@
2779527825
},
2779627826
{
2779727827
"source_path": "articles/storage/scripts/storage-windows-powershell-sample-copy-managed-disks-to-same-or-different-subscription.md",
27798-
"redirect_url": "/azure/virtual-machines/scripts/virtual-machines-windows-powershell-sample-copy-managed-disks-to-same-or-different-subscription",
27828+
"redirect_url": "/azure/virtual-machines/scripts/virtual-machines-powershell-sample-copy-managed-disks-to-same-or-different-subscription",
2779927829
"redirect_document_id": true
2780027830
},
2780127831
{
@@ -33778,6 +33808,26 @@
3377833808
"redirect_url": "/azure/virtual-machines/windows/how-to-enable-write-accelerator",
3377933809
"redirect_document_id": true
3378033810
},
33811+
{
33812+
"source_path": "articles/virtual-machines/scripts/virtual-machines-windows-powershell-sample-copy-managed-disks-to-same-or-different-subscription.md",
33813+
"redirect_url": "/azure/virtual-machines/scripts/virtual-machines-powershell-sample-copy-managed-disks-to-same-or-different-subscription",
33814+
"redirect_document_id": false
33815+
},
33816+
{
33817+
"source_path": "articles/virtual-machines/scripts/virtual-machines-linux-powershell-sample-copy-managed-disks-to-same-or-different-subscription.md",
33818+
"redirect_url": "/azure/virtual-machines/scripts/virtual-machines-powershell-sample-copy-managed-disks-to-same-or-different-subscription",
33819+
"redirect_document_id": false
33820+
},
33821+
{
33822+
"source_path": "articles/virtual-machines/scripts/virtual-machines-linux-cli-sample-copy-managed-disks-to-same-or-different-subscription.md",
33823+
"redirect_url": "/azure/virtual-machines/scripts/virtual-machines-cli-sample-copy-managed-disks-to-same-or-different-subscription",
33824+
"redirect_document_id": false
33825+
},
33826+
{
33827+
"source_path": "articles/virtual-machines/scripts/virtual-machines-windows-cli-sample-copy-managed-disks-to-same-or-different-subscription.md",
33828+
"redirect_url": "/azure/virtual-machines/scripts/virtual-machines-cli-sample-copy-managed-disks-to-same-or-different-subscription",
33829+
"redirect_document_id": false
33830+
},
3378133831
{
3378233832
"source_path": "articles/multi-factor-authentication/multi-factor-authentication-manage-users-and-devices.md",
3378333833
"redirect_url": "/azure/active-directory/authentication/howto-mfa-userdevicesettings",
@@ -37217,10 +37267,15 @@
3721737267
"redirect_url": "/azure/active-directory/manage-apps/access-panel-deployment-plan",
3721837268
"redirect_document_id": false
3721937269
},
37270+
{
37271+
"source_path": "articles/active-directory/manage-apps/manage-access-panel-browser-extension.md",
37272+
"redirect_url": "/azure/active-directory/manage-apps/access-panel-deployment-plan",
37273+
"redirect_document_id": false
37274+
},
3722037275
{
3722137276
"source_path": "articles/active-directory/active-directory-saas-ie-troubleshooting.md",
37222-
"redirect_url": "/azure/active-directory/manage-apps/manage-access-panel-browser-extension",
37223-
"redirect_document_id": true
37277+
"redirect_url": "/azure/active-directory/manage-apps/access-panel-deployment-plan",
37278+
"redirect_document_id": false
3722437279
},
3722537280
{
3722637281
"source_path": "articles/active-directory/active-directory-saas-provisioning-reporting.md",
@@ -37382,16 +37437,6 @@
3738237437
"redirect_url": "/azure/active-directory/manage-apps/configure-federated-single-sign-on-non-gallery-applications-problems",
3738337438
"redirect_document_id": true
3738437439
},
37385-
{
37386-
"source_path": "articles/active-directory/application-config-sso-problem-configure-password-sso-gallery.md",
37387-
"redirect_url": "/azure/active-directory/manage-apps/configure-password-single-sign-on-gallery-applications-problems",
37388-
"redirect_document_id": true
37389-
},
37390-
{
37391-
"source_path": "articles/active-directory/application-config-sso-problem-configure-password-sso-non-gallery.md",
37392-
"redirect_url": "/azure/active-directory/manage-apps/configure-password-single-sign-on-non-gallery-applications-problems",
37393-
"redirect_document_id": true
37394-
},
3739537440
{
3739637441
"source_path": "articles/active-directory/application-provisioning-config-how-to.md",
3739737442
"redirect_url": "/azure/active-directory/app-provisioning/configure-automatic-user-provisioning-portal",
@@ -37564,13 +37609,43 @@
3756437609
},
3756537610
{
3756637611
"source_path": "articles/active-directory/application-sign-in-problem-password-sso-gallery.md",
37567-
"redirect_url": "/azure/active-directory/manage-apps/application-sign-in-problem-password-sso-gallery",
37568-
"redirect_document_id": true
37612+
"redirect_url": "/azure/active-directory/manage-apps/troubleshoot-password-based-sso",
37613+
"redirect_document_id": false
3756937614
},
3757037615
{
3757137616
"source_path": "articles/active-directory/application-sign-in-problem-password-sso-non-gallery.md",
37572-
"redirect_url": "/azure/active-directory/manage-apps/application-sign-in-problem-password-sso-non-gallery",
37573-
"redirect_document_id": true
37617+
"redirect_url": "/azure/active-directory/manage-apps/troubleshoot-password-based-sso",
37618+
"redirect_document_id": false
37619+
},
37620+
{
37621+
"source_path": "articles/active-directory/manage-apps/application-sign-in-problem-password-sso-gallery.md",
37622+
"redirect_url": "/azure/active-directory/manage-apps/troubleshoot-password-based-sso",
37623+
"redirect_document_id": false
37624+
},
37625+
{
37626+
"source_path": "articles/active-directory/manage-apps/application-sign-in-problem-password-sso-non-gallery.md",
37627+
"redirect_url": "/azure/active-directory/manage-apps/troubleshoot-password-based-sso",
37628+
"redirect_document_id": false
37629+
},
37630+
{
37631+
"source_path": "articles/active-directory/application-config-sso-problem-configure-password-sso-gallery.md",
37632+
"redirect_url": "/azure/active-directory/manage-apps/troubleshoot-password-based-sso",
37633+
"redirect_document_id": false
37634+
},
37635+
{
37636+
"source_path": "articles/active-directory/application-config-sso-problem-configure-password-sso-non-gallery.md",
37637+
"redirect_url": "/azure/active-directory/manage-apps/troubleshoot-password-based-sso",
37638+
"redirect_document_id": false
37639+
},
37640+
{
37641+
"source_path": "articles/active-directory/manage-apps/configure-password-single-sign-on-gallery-applications-problems.md",
37642+
"redirect_url": "/azure/active-directory/manage-apps/troubleshoot-password-based-sso",
37643+
"redirect_document_id": false
37644+
},
37645+
{
37646+
"source_path": "articles/active-directory/manage-apps/configure-password-single-sign-on-non-gallery-applications-problems.md",
37647+
"redirect_url": "/azure/active-directory/manage-apps/troubleshoot-password-based-sso",
37648+
"redirect_document_id": false
3757437649
},
3757537650
{
3757637651
"source_path": "articles/active-directory/active-directory-applications-guiding-developers-requiring-user-assignment.md",
@@ -42513,6 +42588,16 @@
4251342588
"redirect_url": "/azure/azure-monitor/platform/resource-logs-blob-format",
4251442589
"redirect_document_id": false
4251542590
},
42591+
{
42592+
"source_path": "articles/azure-monitor/platform/log-analytics-agent.md#supported-linux-operating-systems",
42593+
"redirect_url": "/azure/azure-monitor/platform/agent-linux#supported-operating-system",
42594+
"redirect_document_id": false
42595+
},
42596+
{
42597+
"source_path": "articles/azure-monitor/platform/log-analytics-agent.md#supported-windows-operating-systems",
42598+
"redirect_url": "/azure/azure-monitor/platform/agent-windows#supported-operating-system",
42599+
"redirect_document_id": false
42600+
},
4251642601
{
4251742602
"source_path": "articles/azure-monitor/platform/template-workspace-configuration.md",
4251842603
"redirect_url": "/azure/azure-monitor/samples/resource-manager-workspace",

articles/active-directory/authentication/concept-resilient-controls.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -86,7 +86,7 @@ This example policy set will grant selected users in **AppUsers**, access to sel
8686

8787
### Contingencies for user lockout
8888

89-
Alternatively, your organization can also create contingency policies. To create contingency policies, you must define tradeoff criteria between business continuity, operational cost, financial cost, and security risks. For example, you may activate a contingency policy only to a subset of users, for a subset of apps, for a subset of clients, or from a subset of locations. Contingency policies will give administrators and end users access to apps and resources, during a disruption when no mitigation method was implemented. Microsoft recommends enabling contingency policies in [report-only mode](../conditional-access/howto-conditional-access-report-only.md) when not in use so that administrators can monitor the potential impact of the policies should they need to be turned on.
89+
Alternatively, your organization can also create contingency policies. To create contingency policies, you must define tradeoff criteria between business continuity, operational cost, financial cost, and security risks. For example, you may activate a contingency policy only to a subset of users, for a subset of apps, for a subset of clients, or from a subset of locations. Contingency policies will give administrators and end users access to apps and resources, during a disruption when no mitigation method was implemented. Microsoft recommends enabling contingency policies in [report-only mode](../conditional-access/howto-conditional-access-insights-reporting.md) when not in use so that administrators can monitor the potential impact of the policies should they need to be turned on.
9090

9191
Understanding your exposure during a disruption helps reduce your risk and is a critical part of your planning process. To create your contingency plan, first determine the following business requirements of your organization:
9292

articles/active-directory/conditional-access/TOC.yml

Lines changed: 4 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -33,8 +33,6 @@
3333
href: concept-conditional-access-grant.md
3434
- name: Session
3535
href: concept-conditional-access-session.md
36-
- name: Insights and reporting
37-
href: howto-conditional-access-insights-reporting.md
3836
- name: Report-only mode
3937
href: concept-conditional-access-report-only.md
4038
- name: Service dependencies
@@ -78,6 +76,8 @@
7876
href: howto-conditional-access-policy-block-access.md
7977
- name: Block legacy authentication
8078
href: block-legacy-authentication.md
79+
- name: Configure report only mode
80+
href: howto-conditional-access-insights-reporting.md
8181
- name: Require approved client apps
8282
href: app-based-conditional-access.md
8383
- name: Require app protection policy
@@ -88,12 +88,8 @@
8888
href: untrusted-networks.md
8989
- name: Require terms of use
9090
href: terms-of-use.md
91-
- name: Configure report-only mode
92-
href: howto-conditional-access-report-only.md
9391
- name: Sign-in frequency and browser persistence controls
9492
href: howto-conditional-access-session-lifetime.md
95-
- name: Migrate classic policies
96-
href: policy-migration-mfa.md
9793
- name: Troubleshooting
9894
items:
9995
- name: Troubleshoot sign-in problems
@@ -102,6 +98,8 @@
10298
href: troubleshoot-conditional-access-what-if.md
10399
- name: FAQ
104100
href: faqs.md
101+
- name: Migrate classic policies
102+
href: policy-migration-mfa.md
105103
- name: Reference
106104
items:
107105
- name: Beta Graph APIs

articles/active-directory/conditional-access/block-legacy-authentication.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -82,7 +82,7 @@ Before you can block legacy authentication in your directory, you need to first
8282

8383
1. Navigate to the **Azure portal** > **Azure Active Directory** > **Sign-ins**.
8484
1. Add the Client App column if it is not shown by clicking on **Columns** > **Client App**.
85-
1. **Add filters** > **Client App** > select all of the legacy authentication protocols. Select outside the filtering dialog blox to apply your selections and close the dialog box.
85+
1. **Add filters** > **Client App** > select all of the legacy authentication protocols. Select outside the filtering dialog box to apply your selections and close the dialog box.
8686

8787
Filtering will only show you sign-in attempts that were made by legacy authentication protocols. Clicking on each individual sign-in attempt will show you additional details. The **Client App** field under the **Basic Info** tab will indicate which legacy authentication protocol was used.
8888

@@ -119,7 +119,7 @@ You can select all available grant controls for the **Other clients** condition;
119119

120120
## Next steps
121121

122-
- [Determine impact using Conditional Access report-only mode](howto-conditional-access-report-only.md)
122+
- [Determine impact using Conditional Access report-only mode](howto-conditional-access-insights-reporting.md)
123123
- If you are not familiar with configuring Conditional Access policies yet, see [require MFA for specific apps with Azure Active Directory Conditional Access](../authentication/tutorial-enable-azure-mfa.md) for an example.
124124
- For more information about modern authentication support, see [How modern authentication works for Office 2013 and Office 2016 client apps](/office365/enterprise/modern-auth-for-office-2013-and-2016)
125-
- [How to set up a multifunction device or application to send email using Office 365 and Microsoft 365](/exchange/mail-flow-best-practices/how-to-set-up-a-multifunction-device-or-application-to-send-email-using-office-3)
125+
- [How to set up a multifunction device or application to send email using Office 365 and Microsoft 365](/exchange/mail-flow-best-practices/how-to-set-up-a-multifunction-device-or-application-to-send-email-using-office-3)

articles/active-directory/conditional-access/concept-conditional-access-report-only.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -48,4 +48,4 @@ Administrators have the capability to create multiple policies in report-only mo
4848

4949
## Next steps
5050

51-
[Configure report-only mode on a Conditional Access policy](howto-conditional-access-report-only.md)
51+
[Configure report-only mode on a Conditional Access policy](howto-conditional-access-insights-reporting.md)

articles/active-directory/conditional-access/howto-conditional-access-insights-reporting.md

Lines changed: 26 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: conditional-access
88
ms.topic: conceptual
9-
ms.date: 05/01/2020
9+
ms.date: 08/27/2020
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -94,6 +94,22 @@ View the breakdown of users or sign-ins for each of the conditions. You can filt
9494

9595
You can also investigate the sign-ins of a specific user by searching for sign-ins at the bottom of the dashboard. The query on the left displays the most frequent users. Selecting a user will filter the query to the right.
9696

97+
> [!NOTE]
98+
> When downloading the Sign-ins logs, choose JSON format to include Conditional Access report-only result data.
99+
100+
## Configure a Conditional Access policy in report-only mode
101+
102+
To configure a Conditional Access policy in report-only mode:
103+
104+
1. Sign into the **Azure portal** as a Conditional Access administrator, security administrator, or global administrator.
105+
1. Browse to **Azure Active Directory** > **Security** > **Conditional Access**.
106+
1. Select an existing policy or create a new policy.
107+
1. Under **Enable policy** set the toggle to **Report-only** mode.
108+
1. Select **Save**
109+
110+
> [!TIP]
111+
> Editing the **Enable policy** state of an existing policy from **On** to **Report-only** disables existing policy enforcement.
112+
97113
## Troubleshooting
98114

99115
### Why are queries failing due to a permissions error?
@@ -109,6 +125,10 @@ In order to access the workbook, you need the proper Azure AD permissions as wel
109125

110126
For more information about how to stream Azure AD sign-in logs to a Log Analytics workspace, see the article [Integrate Azure AD logs with Azure Monitor logs](../reports-monitoring/howto-integrate-activity-logs-with-log-analytics.md).
111127

128+
### Why are the queries in the workbook failing?
129+
130+
Customers have noticed that queries sometimes fail if the wrong or multiple workspaces are associated with the workbook. To fix this problem, click **Edit** at the top of the workbook and then the Settings gear. Select and then remove workspaces that are not associated with the workbook. There should be only one workspace associated with each workbook.
131+
112132
### Why is the Conditional Access policies parameter is empty?
113133

114134
The list of policies is generated by looking at the policies evaluated for the most recent sign-in event. If there are no recent sign-ins in your tenant, you may need to wait a few minutes for the workbook to load the list of Conditional Access policies. This can happen immediately after configuring Log Analytics or may take longer if a tenant doesn’t have recent sign-in activity.
@@ -131,4 +151,8 @@ You can edit and customize the workbook by going to **Azure Active Directory** >
131151

132152
## Next steps
133153

134-
[Conditional Access report-only mode](concept-conditional-access-report-only.md)
154+
- [Conditional Access report-only mode](concept-conditional-access-report-only.md)
155+
156+
- For more information about Azure AD workbooks, see the article, [How to use Azure Monitor workbooks for Azure Active Directory reports](../reports-monitoring/howto-use-azure-monitor-workbooks.md).
157+
158+
- [Conditional Access common policies](concept-conditional-access-policy-common.md)

0 commit comments

Comments
 (0)