Skip to content

Commit b199e68

Browse files
committed
copyedits
1 parent 2f4e5f2 commit b199e68

File tree

1 file changed

+10
-9
lines changed

1 file changed

+10
-9
lines changed

articles/active-directory-domain-services/migrate-from-classic-vnet.md

Lines changed: 10 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -3,20 +3,21 @@ title: Migrate Azure AD Domain Services from a Classic virtual network | Microso
33
description: Learn how to migrate an existing Azure AD Domain Services managed domain from the Classic virtual network model to a Resource Manager-based virtual network.
44
author: justinha
55
manager: amycolannino
6+
ms.reviewer: xyuan
67

78
ms.service: active-directory
89
ms.subservice: domain-services
910
ms.workload: identity
1011
ms.topic: how-to
11-
ms.date: 03/14/2023
12+
ms.date: 03/29/2023
1213
ms.author: justinha
1314
---
1415

1516
# Migrate Azure Active Directory Domain Services from the Classic virtual network model to Resource Manager
1617

17-
Starting April 1, Azure Active Directory Domain Services (Azure AD DS) has shut down all IaaS virtual machines hosting domain controller services for customers using the Classic virtual network model. Azure AD Domain Services offers a best-effort offline migration solution for customers currently using the Classic virtual network model to the Resource Manager virtual network model. Azure AD DS managed domains that use the Resource Manager deployment model provide additional features such as fine-grained password policy, audit logs, and account lockout protection.
18+
Starting April 1, 2023, Azure Active Directory Domain Services (Azure AD DS) has shut down all IaaS virtual machines that host domain controller services for customers who use the Classic virtual network model. Azure AD Domain Services offers a best-effort offline migration solution for customers currently using the Classic virtual network model to the Resource Manager virtual network model. Azure AD DS managed domains that use the Resource Manager deployment model have more features, such as fine-grained password policy, audit logs, and account lockout protection.
1819

19-
This article outlines considerations for migration, then the required steps to successfully migrate an existing managed domain. For some of the benefits, see [Benefits of migration from the Classic to Resource Manager deployment model in Azure AD DS][migration-benefits].
20+
This article outlines considerations for migration, followed by the required steps to successfully migrate an existing managed domain. For some of the benefits, see [Benefits of migration from the Classic to Resource Manager deployment model in Azure AD DS][migration-benefits].
2021

2122
> [!NOTE]
2223
> In 2017, Azure AD Domain Services became available to host in an Azure Resource Manager network. Since then, we have been able to build a more secure service using the Azure Resource Manager's modern capabilities. Because Azure Resource Manager deployments fully replace classic deployments, Azure AD DS classic virtual network deployments will be retired on March 1, 2023.
@@ -46,7 +47,7 @@ Azure AD DS typically uses the first two available IP addresses in the address r
4647

4748
Managed domains that run on Classic virtual networks don't have AD account lockout policies in place. If VMs are exposed to the internet, attackers could use password-spray methods to brute-force their way into accounts. There's no account lockout policy to stop those attempts. For managed domains that use the Resource Manager deployment model and virtual networks, AD account lockout policies protect against these password-spray attacks.
4849

49-
By default, 5 bad password attempts in 2 minutes lock out an account for 30 minutes.
50+
By default, five (5) bad password attempts in two (2) minutes lock out an account for 30 minutes.
5051

5152
A locked out account can't be used to sign in, which may interfere with the ability to manage the managed domain or applications managed by the account. After a managed domain is migrated, accounts can experience what feels like a permanent lockout due to repeated failed attempts to sign in. Two common scenarios after migration include the following:
5253

@@ -75,7 +76,7 @@ For more information on what rules are required, see [Azure AD DS network securi
7576

7677
## Migration steps
7778

78-
The migration to the Resource Manager deployment model and virtual network is split into 4 main steps:
79+
The migration to the Resource Manager deployment model and virtual network is split into four main steps:
7980

8081
| Step | Performed through | Estimated time | Downtime |
8182
|---------|--------------------|-----------------|-----------|
@@ -93,11 +94,11 @@ Before you begin the migration process, complete the following initial checks an
9394

9495
1. Update your local Azure PowerShell environment to the latest version. To complete the migration steps, you need at least version *2.3.2*.
9596

96-
For information on how to check and update your PowerShell version, see [Azure PowerShell overview][azure-powershell].
97+
For information about how to check and update your PowerShell version, see [Azure PowerShell overview][azure-powershell].
9798

9899
1. Create, or choose an existing, Resource Manager virtual network.
99100

100-
Make sure that network settings don't block necessary ports required for Azure AD DS. Ports must be open on both the Classic virtual network and the Resource Manager virtual network. These settings include route tables (although it's not recommended to use route tables) and network security groups.
101+
Make sure that network settings don't block ports required for Azure AD DS. Ports must be open on both the Classic virtual network and the Resource Manager virtual network. These settings include route tables (although it's not recommended to use route tables) and network security groups.
101102

102103
Azure AD DS needs a network security group to secure the ports needed for the managed domain and block all other incoming traffic. This network security group acts as an extra layer of protection to lock down access to the managed domain.
103104

@@ -106,11 +107,11 @@ Before you begin the migration process, complete the following initial checks an
106107
| Source | Source service tag | Source port ranges | Destination | Service | Destination port ranges | Protocol | Action | Required | Purpose |
107108
|:-----------:|:----------------------------------:|:------------------:|:-------------:|:-------:|:-----------------------:|:--------:|:------:|:--------:|:--------|
108109
| Service tag | AzureActiveDirectoryDomainServices | * | Any | WinRM | 5986 | TCP | Allow | Yes | Management of your domain |
109-
| Service tag | CorpNetSaw | * | Any | RDP | 3389 | TCP | Allow | Optional | Debugging for support |
110+
| Service tag | CorpNetSaw | * | Any | RDP | 3389 | TCP | Allow | Optional | Debugging for support |
110111

111112
Make a note of this target resource group, target virtual network, and target virtual network subnet. These resource names are used during the migration process.
112113

113-
Please note that the **CorpNetSaw** service tag isn't available by using Azure portal, and the network security group rule for **CorpNetSaw** has to be added by using PowerShell (powershell-create-instance.md#create-a-network-security-group).
114+
Please note that the **CorpNetSaw** service tag isn't available by using Azure portal, and the network security group rule for **CorpNetSaw** has to be added by using [PowerShell](powershell-create-instance.md#create-a-network-security-group).
114115

115116
1. Check the managed domain health in the Azure portal. If you have any alerts for the managed domain, resolve them before you start the migration process.
116117
1. Optionally, if you plan to move other resources to the Resource Manager deployment model and virtual network, confirm that those resources can be migrated. For more information, see [Platform-supported migration of IaaS resources from Classic to Resource Manager][migrate-iaas].

0 commit comments

Comments
 (0)