Skip to content

Commit b41be14

Browse files
author
dksimpson
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into DKS-US1712683-bing-video-search
2 parents c016b2b + ff8f83e commit b41be14

File tree

107 files changed

+1228
-744
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

107 files changed

+1228
-744
lines changed

.openpublishing.publish.config.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -439,6 +439,11 @@
439439
"url": "https://github.com/Azure-Samples/azure-cosmos-db-sql-xamarin-getting-started",
440440
"branch": "master"
441441
},
442+
{
443+
"path_to_root": "cosmosdb-python-sdk",
444+
"url": "https://github.com/Azure/azure-sdk-for-python/",
445+
"branch": "master"
446+
},
442447
{
443448
"path_to_root": "cosmosdb-nodejs-get-started",
444449
"url": "https://github.com/Azure-Samples/azure-cosmos-db-sql-api-nodejs-getting-started",

.openpublishing.redirection.json

Lines changed: 11 additions & 56 deletions
Original file line numberDiff line numberDiff line change
@@ -2505,12 +2505,12 @@
25052505
},
25062506
{
25072507
"source_path": "articles/cosmos-db/analytics-usecases.md",
2508-
"redirect_url": "/azure/cosmos-db/synapse-link",
2508+
"redirect_url": "/azure/cosmos-db/synapse-link-use-cases",
25092509
"redirect_document_id": true
25102510
},
25112511
{
25122512
"source_path": "articles/cosmos-db/analytics-solution-architectures.md",
2513-
"redirect_url": "/azure/cosmos-db/synapse-link",
2513+
"redirect_url": "/azure/cosmos-db/synapse-link-use-cases",
25142514
"redirect_document_id": false
25152515
},
25162516
{
@@ -2520,7 +2520,7 @@
25202520
},
25212521
{
25222522
"source_path": "articles/cosmos-db/globally-distributed-transactional-analytical-storage.md",
2523-
"redirect_url": "/azure/cosmos-db/synapse-link",
2523+
"redirect_url": "/azure/cosmos-db/analytical-store-introduction",
25242524
"redirect_document_id": false
25252525
},
25262526
{
@@ -42724,7 +42724,7 @@
4272442724
{
4272542725
"source_path": "articles/application-insights/app-insights-usage-workbooks.md",
4272642726
"redirect_url": "/azure/azure-monitor/app/usage-workbooks",
42727-
"redirect_document_id": true
42727+
"redirect_document_id": false
4272842728
},
4272942729
{
4273042730
"source_path": "articles/application-insights/app-insights-visual-studio-codelens.md",
@@ -52334,56 +52334,6 @@
5233452334
"redirect_url": "/azure/storage",
5233552335
"redirect_document_id": false
5233652336
},
52337-
{
52338-
"source_path": "articles/virtual-desktop/create-host-pools-arm-template.md",
52339-
"redirect_url": "/azure/virtual-desktop/virtual-desktop-fall-2019/create-host-pools-arm-template",
52340-
"redirect_document_id": false
52341-
},
52342-
{
52343-
"source_path": "articles/virtual-desktop/create-service-principal-role-powershell.md",
52344-
"redirect_url": "/azure/virtual-desktop/virtual-desktop-fall-2019/create-service-principal-role-powershell",
52345-
"redirect_document_id": false
52346-
},
52347-
{
52348-
"source_path": "articles/virtual-desktop/deploy-diagnostics.md",
52349-
"redirect_url": "/azure/virtual-desktop/virtual-desktop-fall-2019/deploy-diagnostics",
52350-
"redirect_document_id": false
52351-
},
52352-
{
52353-
"source_path": "articles/virtual-desktop/deploy-windows-7-virtual-machine.md",
52354-
"redirect_url": "/azure/virtual-desktop/virtual-desktop-fall-2019/deploy-windows-7-virtual-machine",
52355-
"redirect_document_id": false
52356-
},
52357-
{
52358-
"source_path": "articles/virtual-desktop/manage-resources-using-ui-powershell.md",
52359-
"redirect_url": "/azure/virtual-desktop/virtual-desktop-fall-2019/manage-resources-using-ui-powershell",
52360-
"redirect_document_id": false
52361-
},
52362-
{
52363-
"source_path": "articles/virtual-desktop/manage-resources-using-ui.md",
52364-
"redirect_url": "/azure/virtual-desktop/virtual-desktop-fall-2019/manage-resources-using-ui",
52365-
"redirect_document_id": false
52366-
},
52367-
{
52368-
"source_path": "articles/virtual-desktop/set-up-scaling-script.md",
52369-
"redirect_url": "/azure/virtual-desktop/virtual-desktop-fall-2019/set-up-scaling-script",
52370-
"redirect_document_id": false
52371-
},
52372-
{
52373-
"source_path": "articles/virtual-desktop/tenant-setup-azure-active-directory.md",
52374-
"redirect_url": "/azure/virtual-desktop/virtual-desktop-fall-2019/tenant-setup-azure-active-directory",
52375-
"redirect_document_id": false
52376-
},
52377-
{
52378-
"source_path": "articles/virtual-desktop/troubleshoot-management-tool.md",
52379-
"redirect_url": "/azure/virtual-desktop/virtual-desktop-fall-2019/troubleshoot-management-tool",
52380-
"redirect_document_id": false
52381-
},
52382-
{
52383-
"source_path": "articles/virtual-desktop/troubleshoot-windows-7-vm.md",
52384-
"redirect_url": "/azure/virtual-desktop/virtual-desktop-fall-2019/troubleshoot-windows-7-vm",
52385-
"redirect_document_id": false
52386-
},
5238752337
{
5238852338
"source_path": "articles/sql-database-edge/index.yml",
5238952339
"redirect_url": "/azure/azure-sql-edge/",
@@ -52483,12 +52433,17 @@
5248352433
"source_path": "articles/sql-database/sql-database-auditing-and-threat-detection-powershell.md",
5248452434
"redirect_url": "/azure/sql-database/scripts/sql-database-auditing-and-threat-detection-powershell",
5248552435
"redirect_document_id": true
52486-
},
52487-
{
52436+
},
52437+
{
5248852438
"source_path": "articles/cdn/endpoint-multiorigin.md",
5248952439
"redirect_url": "/azure/cdn/cdn-overview",
5249052440
"redirect_document_id": false
5249152441
},
52442+
{
52443+
"source_path": "articles/azure-monitor/app/usage-workbooks.md",
52444+
"redirect_url": "/azure/azure-monitor/platform/workbooks-overview",
52445+
"redirect_document_id": false
52446+
},
5249252447
{
5249352448
"source_path": "articles/batch/batch-api-basics.md",
5249452449
"redirect_url": "/azure/batch/batch-service-workflow-features",

articles/active-directory/authentication/howto-registration-mfa-sspr-combined.md

Lines changed: 12 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ ms.collection: M365-identity-device-management
1717
---
1818
# Enable combined security information registration in Azure Active Directory
1919

20-
Before combined registration, users registered authentication methods for Azure Multi-Factor Authentication and self-service password reset (SSPR) separately. People were confused that similar methods were used for Multi-Factor Authentication and SSPR but they had to register for both features. Now, with combined registration, users can register once and get the benefits of both Multi-Factor Authentication and SSPR.
20+
Before combined registration, users registered authentication methods for Azure Multi-Factor Authentication and self-service password reset (SSPR) separately. People were confused that similar methods were used for Azure Multi-Factor Authentication and SSPR but they had to register for both features. Now, with combined registration, users can register once and get the benefits of both Azure Multi-Factor Authentication and SSPR.
2121

2222
Before enabling the new experience, review the article [Combined security information registration](concept-registration-mfa-sspr-combined.md) to ensure you understand the functionality and effects of this feature.
2323

@@ -31,10 +31,10 @@ Complete these steps to enable combined registration:
3131
2. Go to **Azure Active Directory** > **User settings** > **Manage user feature preview settings**.
3232
3. Under **Users can use the combined security information registration experience**, choose to enable for a **Selected** group of users or for **All** users.
3333

34-
![Enable the combined security info preview experience for All users](media/howto-registration-mfa-sspr-combined/enable-the-combined-security-info-preview.png)
34+
![Enable the combined security info experience for users](media/howto-registration-mfa-sspr-combined/enable-the-combined-security-info.png)
3535

3636
> [!NOTE]
37-
> After you enable combined registration, users who register or confirm their phone number or mobile app through the new experience can use them for Multi-Factor Authentication and SSPR, if those methods are enabled in the Multi-Factor Authentication and SSPR policies. If you then disable this experience, users who go to the previous SSPR registration page at `https://aka.ms/ssprsetup` will be required to perform multi-factor authentication before they can access the page.
37+
> After you enable combined registration, users who register or confirm their phone number or mobile app through the new experience can use them for Azure Multi-Factor Authentication and SSPR, if those methods are enabled in the Azure Multi-Factor Authentication and SSPR policies. If you then disable this experience, users who go to the previous SSPR registration page at `https://aka.ms/ssprsetup` will be required to perform multi-factor authentication before they can access the page.
3838
3939
If you have configured the Site to Zone Assignment List in Internet Explorer, the following sites have to be in the same zone:
4040

@@ -52,8 +52,8 @@ For more information about creating trusted locations in Conditional Access, see
5252

5353
The following policy applies to all selected users that attempt to register using the combined registration experience, and blocks access unless they are connecting from a location marked as trusted network.
5454

55-
1. In the **Azure portal**, browse to **Azure Active Directory** > **Security** > **Conditional Access**
56-
1. Select **+ New policy**
55+
1. In the **Azure portal**, browse to **Azure Active Directory** > **Security** > **Conditional Access**.
56+
1. Select **+ New policy**.
5757
1. Enter a name for this policy, such as *Combined Security Info Registration on Trusted Networks*.
5858
1. Under **Assignments**, select **Users and groups**. Choose the users and groups you want this policy to apply to, then select **Done**.
5959

@@ -65,20 +65,20 @@ The following policy applies to all selected users that attempt to register usin
6565
![Create a conditional access policy to control security info registration](media/howto-registration-mfa-sspr-combined/require-registration-from-trusted-location.png)
6666

6767
1. Under **Conditions** > **Locations**, configure the following options:
68-
1. Configure **Yes**
69-
1. Include **Any location**
70-
1. Exclude **All trusted locations**
68+
1. Configure **Yes**.
69+
1. Include **Any location**.
70+
1. Exclude **All trusted locations**.
7171
1. Select **Done** on the *Locations* window, then select **Done** on the *Conditions* window.
72-
1. Under **Access controls** > **Grant**, choose **Block access**, then **Select**
73-
1. Set **Enable policy** to **On**
74-
1. To finalize the policy, select **Create**
72+
1. Under **Access controls** > **Grant**, choose **Block access**, then **Select**.
73+
1. Set **Enable policy** to **On**.
74+
1. To finalize the policy, select **Create**.
7575

7676
## Next steps
7777

7878
If you need help, see how to [troubleshoot combined security info registration](howto-registration-mfa-sspr-combined-troubleshoot.md) or learn [What is the location condition in Azure Active Directory Conditional Access?](../conditional-access/location-condition.md)
7979

8080
To enable the features in your Azure AD tenant, see the tutorials to [enable self-service password reset](tutorial-enable-sspr.md) and [enable Azure Multi-Factor Authentication](tutorial-enable-azure-mfa.md).
8181

82-
Learn how to [enable combined registration in your tenant](howto-registration-mfa-sspr-combined.md) or [force users to re-register authentication methods](howto-mfa-userdevicesettings.md#manage-user-authentication-options).
82+
Learn how to [force users to re-register authentication methods](howto-mfa-userdevicesettings.md#manage-user-authentication-options).
8383

8484
You can also review the [available methods for Azure Multi-Factor Authentication and SSPR](concept-authentication-methods.md).
Loading

articles/active-directory/conditional-access/overview.md

Lines changed: 8 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -6,14 +6,15 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: conditional-access
88
ms.topic: overview
9-
ms.date: 05/20/2020
9+
ms.date: 05/21/2020
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
1313
manager: daveba
1414
ms.reviewer: calebb
1515

1616
ms.collection: M365-identity-device-management
17+
ms.custom: contperfq4
1718
---
1819
# What is Conditional Access?
1920

@@ -68,7 +69,7 @@ Common signals that Conditional Access can take in to account when making a poli
6869

6970
## Commonly applied policies
7071

71-
Many organizations have common access concerns that Conditional Access policies can help with such as:
72+
Many organizations have [common access concerns that Conditional Access policies can help with](concept-conditional-access-policy-common.md) such as:
7273

7374
- Requiring multi-factor authentication for users with administrative roles
7475
- Requiring multi-factor authentication for Azure management tasks
@@ -93,12 +94,8 @@ Customers with [Microsoft 365 Business licenses](/office365/servicedescriptions/
9394

9495
## Next steps
9596

96-
[Building a Conditional Access policy piece by piece](concept-conditional-access-policies.md)
97-
98-
To learn how to implement Conditional Access in your environment, see [Plan your Conditional Access deployment in Azure Active Directory](plan-conditional-access.md).
99-
100-
[Learn about Identity Protection](../identity-protection/overview-v2.md)
101-
102-
[Learn about Microsoft Cloud App Security](/cloud-app-security/what-is-cloud-app-security)
103-
104-
[Learn about Microsoft Intune](/intune/index)
97+
- [Building a Conditional Access policy piece by piece](concept-conditional-access-policies.md)
98+
- [Plan your Conditional Access deployment](plan-conditional-access.md)
99+
- [Learn about Identity Protection](../identity-protection/overview-v2.md)
100+
- [Learn about Microsoft Cloud App Security](/cloud-app-security/what-is-cloud-app-security)
101+
- [Learn about Microsoft Intune](/intune/index)

articles/active-directory/governance/entitlement-management-logs-and-reporting.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -188,5 +188,5 @@ $bResponse.Results |ft
188188
```
189189

190190
## Next steps:
191-
- [Create interactive reports with Azure Monitor workbooks](../../azure-monitor/app/usage-workbooks.md)
191+
- [Create interactive reports with Azure Monitor workbooks](../../azure-monitor/platform/workbooks-overview.md)
192192

articles/active-directory/reports-monitoring/howto-use-azure-monitor-workbooks.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -43,13 +43,13 @@ including device platform, device state, client app, sign-in risk, location, and
4343
reports how many users were granted or denied access, as well as how many users bypassed
4444
Conditional Access policies when accessing resources.
4545

46-
- To help you to address these questions, Azure Active Directory provides workbooks for monitoring. [Azure Monitor workbooks](https://docs.microsoft.com/azure/azure-monitor/app/usage-workbooks) combine text, analytics queries, metrics, and parameters into rich interactive reports.
46+
- To help you to address these questions, Azure Active Directory provides workbooks for monitoring. [Azure Monitor workbooks](https://docs.microsoft.com/azure/azure-monitor/platform/workbooks-overview) combine text, analytics queries, metrics, and parameters into rich interactive reports.
4747

4848

4949

5050
This article:
5151

52-
- Assumes you're familiar with how to [Create interactive reports by using Monitor workbooks](https://docs.microsoft.com/azure/azure-monitor/app/usage-workbooks).
52+
- Assumes you're familiar with how to [Create interactive reports by using Monitor workbooks](https://docs.microsoft.com/azure/azure-monitor/platform/workbooks-overview).
5353

5454
- Explains how to use Monitor workbooks to understand the effect of your Conditional Access policies, to troubleshoot sign-in failures, and to identify legacy authentications.
5555

@@ -304,4 +304,4 @@ To help you troubleshoot sign-ins, Azure Monitor gives you a breakdown by the fo
304304

305305
## Next steps
306306

307-
[Create interactive reports by using Monitor workbooks](https://docs.microsoft.com/azure/azure-monitor/app/usage-workbooks).
307+
[Create interactive reports by using Monitor workbooks](https://docs.microsoft.com/azure/azure-monitor/platform/workbooks-overview).

0 commit comments

Comments
 (0)