Skip to content

Commit b49628b

Browse files
authored
Merge pull request #200134 from MicrosoftDocs/main
6/01 AM Publish
2 parents 9c60908 + d44c166 commit b49628b

File tree

89 files changed

+1092
-515
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

89 files changed

+1092
-515
lines changed

articles/active-directory-b2c/partner-asignio.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -114,7 +114,7 @@ Follow the steps mentioned in [this tutorial](tutorial-register-applications.md?
114114
| Property | Value |
115115
|:--------|:-------------|
116116
|Name | Login with Asignio *(or a name of your choice)*
117-
|Metadata URL | https://authorization.asignio.com/.well-known/openid-configuration|
117+
|Metadata URL | `https://authorization.asignio.com/.well-known/openid-configuration`|
118118
| Client ID | enter the client ID that you previously generated in [step 1](#step-1-configure-an-application-with-asignio)|
119119
|Client Secret | enter the Client secret that you previously generated in [step 1](#step-1-configure-an-application-with-asignio)|
120120
| Scope | openid email profile |

articles/active-directory/identity-protection/overview-identity-protection.md

Lines changed: 20 additions & 24 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: identity-protection
88
ms.topic: overview
9-
ms.date: 06/15/2021
9+
ms.date: 05/31/2022
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -31,16 +31,12 @@ The signals generated by and fed to Identity Protection, can be further fed into
3131

3232
## Why is automation important?
3333

34-
In his [blog post in October of 2018](https://techcommunity.microsoft.com/t5/Azure-Active-Directory-Identity/Eight-essentials-for-hybrid-identity-3-Securing-your-identity/ba-p/275843) Alex Weinert, who leads Microsoft's Identity Security and Protection team, explains why automation is so important when dealing with the volume of events:
34+
In the blog post *[Cyber Signals: Defending against cyber threats with the latest research, insights, and trends](https://www.microsoft.com/security/blog/2022/02/03/cyber-signals-defending-against-cyber-threats-with-the-latest-research-insights-and-trends/)* dated February 3, 2022 we shared a thread intelligence brief including the following statistics:
3535

36-
> Each day, our machine learning and heuristic systems provide risk scores for 18 billion login attempts for over 800 million distinct accounts, 300 million of which are discernibly done by adversaries (entities like: criminal actors, hackers).
37-
>
38-
> At Ignite last year, I spoke about the top 3 attacks on our identity systems. Here is the recent volume of these attacks
39-
>
40-
> - **Breach replay**: 4.6BN attacks detected in May 2018
41-
> - **Password spray**: 350k in April 2018
42-
> - **Phishing**: This is hard to quantify exactly, but we saw 23M risk events in March 2018, many of which are phish related
36+
> * Analyzed ...24 trillion security signals combined with intelligence we track by monitoring more than 40 nation-state groups and over 140 threat groups...
37+
> * ...From January 2021 through December 2021, we’ve blocked more than 25.6 billion Azure AD brute force authentication attacks...
4338
39+
This scale of signals and attacks requires some level of automation to be able to keep up.
4440
## Risk detection and remediation
4541

4642
Identity Protection identifies risks of many types, including:
@@ -53,7 +49,7 @@ Identity Protection identifies risks of many types, including:
5349
- Password spray
5450
- and more...
5551

56-
More detail on these and other risks including how or when they are calculated can be found in the article, [What is risk](concept-identity-protection-risks.md).
52+
More detail on these and other risks including how or when they're calculated can be found in the article, [What is risk](concept-identity-protection-risks.md).
5753

5854
The risk signals can trigger remediation efforts such as requiring users to: perform Azure AD Multi-Factor Authentication, reset their password using self-service password reset, or blocking until an administrator takes action.
5955

@@ -69,17 +65,17 @@ More information can be found in the article, [How To: Investigate risk](howto-i
6965

7066
### Risk levels
7167

72-
Identity Protection categorizes risk into three tiers: low, medium, and high.
68+
Identity Protection categorizes risk into tiers: low, medium, and high.
7369

74-
While Microsoft does not provide specific details about how risk is calculated, we will say that each level brings higher confidence that the user or sign-in is compromised. For example, something like one instance of unfamiliar sign-in properties for a user might not be as threatening as leaked credentials for another user.
70+
While Microsoft doesn't provide specific details about how risk is calculated, we'll say that each level brings higher confidence that the user or sign-in is compromised. For example, something like one instance of unfamiliar sign-in properties for a user might not be as threatening as leaked credentials for another user.
7571

7672
## Exporting risk data
7773

7874
Data from Identity Protection can be exported to other tools for archive and further investigation and correlation. The Microsoft Graph based APIs allow organizations to collect this data for further processing in a tool such as their SIEM. Information about how to access the Identity Protection API can be found in the article, [Get started with Azure Active Directory Identity Protection and Microsoft Graph](howto-identity-protection-graph-api.md)
7975

8076
Information about integrating Identity Protection information with Microsoft Sentinel can be found in the article, [Connect data from Azure AD Identity Protection](../../sentinel/data-connectors-reference.md#azure-active-directory-identity-protection).
8177

82-
Additionally, organizations can choose to store data for longer periods by changing diagnostic settings in Azure AD to send RiskyUsers and UserRiskEvents data to a Log Analytics workspace, archive data to a storage account, stream data to an Event Hub, or send data to a partner solution. Detailed information about how to do so can be found in the article, [How To: Export risk data](howto-export-risk-data.md).
78+
Additionally, organizations can choose to store data for longer periods by changing diagnostic settings in Azure AD to send RiskyUsers and UserRiskEvents data to a Log Analytics workspace, archive data to a storage account, stream data to Event Hubs, or send data to a partner solution. Detailed information about how to do so can be found in the article, [How To: Export risk data](howto-export-risk-data.md).
8379

8480
## Permissions
8581

@@ -92,25 +88,25 @@ Identity Protection requires users be a Security Reader, Security Operator, Secu
9288
| Security operator | View all Identity Protection reports and Overview blade <br><br> Dismiss user risk, confirm safe sign-in, confirm compromise | Configure or change policies <br><br> Reset password for a user <br><br> Configure alerts |
9389
| Security reader | View all Identity Protection reports and Overview blade | Configure or change policies <br><br> Reset password for a user <br><br> Configure alerts <br><br> Give feedback on detections |
9490

95-
Currently, the security operator role cannot access the Risky sign-ins report.
91+
Currently, the security operator role can't access the Risky sign-ins report.
9692

9793
Conditional Access administrators can also create policies that factor in sign-in risk as a condition. Find more information in the article [Conditional Access: Conditions](../conditional-access/concept-conditional-access-conditions.md#sign-in-risk).
9894

9995
## License requirements
10096

10197
[!INCLUDE [Active Directory P2 license](../../../includes/active-directory-p2-license.md)]
10298

103-
| Capability | Details | Azure AD Free / Microsoft 365 Apps | Azure AD Premium P1|Azure AD Premium P2 |
99+
| Capability | Details | Azure AD Free / Microsoft 365 Apps | Azure AD Premium P1 | Azure AD Premium P2 |
104100
| --- | --- | --- | --- | --- |
105-
| Risk policies | User risk policy (via Identity Protection) | No | No |Yes |
106-
| Risk policies | Sign-in risk policy (via Identity Protection or Conditional Access) | No | No |Yes |
107-
| Security reports | Overview | No | No |Yes |
108-
| Security reports | Risky users | Limited Information. Only users with medium and high risk are shown. No details drawer or risk history. | Limited Information. Only users with medium and high risk are shown. No details drawer or risk history. | Full access|
109-
| Security reports | Risky sign-ins | Limited Information. No risk detail or risk level is shown. | Limited Information. No risk detail or risk level is shown. | Full access|
110-
| Security reports | Risk detections | No | Limited Information. No details drawer.| Full access|
111-
| Notifications | Users at risk detected alerts | No | No |Yes |
112-
| Notifications | Weekly digest| No | No | Yes |
113-
| | MFA registration policy | No | No | Yes |
101+
| Risk policies | User risk policy (via Identity Protection) | No | No | Yes |
102+
| Risk policies | Sign-in risk policy (via Identity Protection or Conditional Access) | No | No | Yes |
103+
| Security reports | Overview | No | No | Yes |
104+
| Security reports | Risky users | Limited Information. Only users with medium and high risk are shown. No details drawer or risk history. | Limited Information. Only users with medium and high risk are shown. No details drawer or risk history. | Full access|
105+
| Security reports | Risky sign-ins | Limited Information. No risk detail or risk level is shown. | Limited Information. No risk detail or risk level is shown. | Full access |
106+
| Security reports | Risk detections | No | Limited Information. No details drawer.| Full access |
107+
| Notifications | Users at risk detected alerts | No | No | Yes |
108+
| Notifications | Weekly digest | No | No | Yes |
109+
| MFA registration policy | | No | No | Yes |
114110

115111
More information on these rich reports can be found in the article, [How To: Investigate risk](howto-identity-protection-investigate-risk.md#navigating-the-reports).
116112

articles/aks/control-kubeconfig-access.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -156,7 +156,7 @@ For enhanced security on access to AKS clusters, [integrate Azure Active Directo
156156
<!-- LINKS - internal -->
157157
[aks-quickstart-cli]: ./learn/quick-kubernetes-deploy-cli.md
158158
[aks-quickstart-portal]: ./learn/quick-kubernetes-deploy-portal.md
159-
[aks-quickstart-powershell]: /learn/quick-kubernetes-deploy-powershell.md
159+
[aks-quickstart-powershell]: /azure/aks/learn/quick-kubernetes-deploy-powershell
160160
[azure-cli-install]: /cli/azure/install-azure-cli
161161
[az-aks-get-credentials]: /cli/azure/aks#az_aks_get_credentials
162162
[azure-rbac]: ../role-based-access-control/overview.md

articles/aks/open-service-mesh-troubleshoot.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -103,7 +103,7 @@ aks-osm-webhook-osm 1 102m
103103
### Check for the service and the CA bundle of the Validating webhook
104104

105105
```azurecli-interactive
106-
kubectl get ValidatingWebhookConfiguration aks-osm-webhook-osm -o json | jq '.webhooks[0].clientConfig.service'
106+
kubectl get ValidatingWebhookConfiguration aks-osm-validator-mesh-osm -o json | jq '.webhooks[0].clientConfig.service'
107107
```
108108

109109
A well configured Validating Webhook Configuration would look exactly like this:

articles/aks/start-stop-cluster.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -150,7 +150,7 @@ If the `ProvisioningState` shows `Starting` that means your cluster hasn't fully
150150
<!-- LINKS - internal -->
151151
[aks-quickstart-cli]: ./learn/quick-kubernetes-deploy-cli.md
152152
[aks-quickstart-portal]: ./learn/quick-kubernetes-deploy-portal.md
153-
[aks-quickstart-powershell]: /learn/quick-kubernetes-deploy-powershell.md
153+
[aks-quickstart-powershell]: /azure/aks/learn/quick-kubernetes-deploy-powershell
154154
[install-azure-cli]: /cli/azure/install-azure-cli
155155
[az-extension-add]: /cli/azure/extension#az_extension_add
156156
[az-extension-update]: /cli/azure/extension#az_extension_update

articles/api-management/api-management-howto-create-or-invite-developers.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -52,6 +52,8 @@ When a developer is invited, an email is sent to the developer. This email is ge
5252

5353
Once the invitation is accepted, the account becomes active.
5454

55+
Invitation link will be active for 2 days.
56+
5557
## <a name="block-developer"> </a> Deactivate or reactivate a developer account
5658

5759
By default, newly created or invited developer accounts are **Active**. To deactivate a developer account, click **Block**. To reactivate a blocked developer account, click **Activate**. A blocked developer account can't access the developer portal or call any APIs. To delete a user account, click **Delete**.

articles/app-service/tutorial-connect-msi-sql-database.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -144,10 +144,9 @@ The steps you follow for your project depends on whether you're using [Entity Fr
144144
1. In Visual Studio, open the Package Manager Console and add the NuGet package [Azure.Identity](https://www.nuget.org/packages/Azure.Identity) and update Entity Framework:
145145
146146
```powershell
147-
Install-Package Azure.Identity -Version 1.5.0
147+
Install-Package Azure.Identity
148148
Update-Package EntityFramework
149149
```
150-
151150
1. In your DbContext object (in *Models/MyDbContext.cs*), add the following code to the default constructor.
152151
153152
```csharp

articles/azure-monitor/app/profiler-containers.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -129,7 +129,7 @@ In this article, you'll learn the various ways you can:
129129
130130
To hit the endpoint, either:
131131
132-
- Visit [http://localhost:8080/weatherforecast](http://localhost:8080/weatherforecast) in your browser, or
132+
- Visit `http://localhost:8080/weatherforecast` in your browser, or
133133
- Use curl:
134134
135135
```terraform
@@ -175,4 +175,4 @@ docker rm -f testapp
175175
## Next Steps
176176
177177
- Learn more about [Application Insights Profiler](./profiler-overview.md).
178-
- Learn how to enable Profiler in your [ASP.NET Core applications run on Linux](./profiler-aspnetcore-linux.md).
178+
- Learn how to enable Profiler in your [ASP.NET Core applications run on Linux](./profiler-aspnetcore-linux.md).

articles/azure-netapp-files/azure-netapp-files-solution-architectures.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -107,7 +107,7 @@ This section provides references to SAP on Azure solutions.
107107

108108
### SAP AnyDB
109109

110-
* [SAP System on Oracle Database on Azure - Azure Architecture Center](/azure/architecture/example-scenario/apps/sap-on-oracle)
110+
* [SAP System on Oracle Database on Azure - Azure Architecture Center](/azure/architecture/example-scenario/apps/sap-production)
111111
* [Oracle Azure Virtual Machines DBMS deployment for SAP workload - Azure Virtual Machines](../virtual-machines/workloads/sap/dbms_guide_oracle.md#oracle-configuration-guidelines-for-sap-installations-in-azure-vms-on-linux)
112112
* [Deploy SAP AnyDB (Oracle 19c) with Azure NetApp Files](https://techcommunity.microsoft.com/t5/running-sap-applications-on-the/deploy-sap-anydb-oracle-19c-with-azure-netapp-files/ba-p/2064043)
113113
* [Manual Recovery Guide for SAP Oracle 19c on Azure VMs from Azure NetApp Files snapshot with AzAcSnap](https://techcommunity.microsoft.com/t5/running-sap-applications-on-the/manual-recovery-guide-for-sap-oracle-19c-on-azure-vms-from-azure/ba-p/3242408)

articles/azure-resource-manager/management/tag-resources.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -868,7 +868,6 @@ The following limitations apply to tags:
868868
> * Azure Automation
869869
> * Azure Content Delivery Network (CDN)
870870
> * Azure DNS (Zone and A records)
871-
> * Azure Private DNS (Zone, A records, and virtual network link)
872871
873872
## Next steps
874873

0 commit comments

Comments
 (0)