Skip to content

Commit b66e212

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into WI52191-attack-path-images
2 parents eb96ebe + f693486 commit b66e212

File tree

1,027 files changed

+6559
-5667
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

1,027 files changed

+6559
-5667
lines changed

.openpublishing.redirection.active-directory.json

Lines changed: 20 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4371,11 +4371,31 @@
43714371
"redirect_url": "/azure/active-directory/reports-monitoring/reports-faq",
43724372
"redirect_document_id": false
43734373
},
4374+
{
4375+
"source_path_from_root": "/articles/active-directory/reports-monitoring/workbook-legacy authentication.md",
4376+
"redirect_url": "/azure/active-directory/reports-monitoring/workbook-legacy-authentication",
4377+
"redirect_document_id": false
4378+
},
43744379
{
43754380
"source_path_from_root": "/articles/active-directory/reports-monitoring/troubleshoot-missing-audit-data.md",
43764381
"redirect_url": "/azure/active-directory/reports-monitoring/reports-faq",
43774382
"redirect_document_id": false
43784383
},
4384+
{
4385+
"source_path_from_root": "/articles/active-directory/reports-monitoring/tutorial-access-api-with-certificates.md",
4386+
"redirect_url": "/azure/active-directory/reports-monitoring/howto-configure-prerequisites-for-reporting-api",
4387+
"redirect_document_id": false
4388+
},
4389+
{
4390+
"source_path_from_root": "/articles/active-directory/reports-monitoring/troubleshoot-graph-api.md",
4391+
"redirect_url": "/azure/active-directory/reports-monitoring/howto-configure-prerequisites-for-reporting-api",
4392+
"redirect_document_id": false
4393+
},
4394+
{
4395+
"source_path_from_root": "/articles/active-directory/reports-monitoring/concept-reporting-api.md",
4396+
"redirect_url": "/azure/active-directory/reports-monitoring/howto-configure-prerequisites-for-reporting-api",
4397+
"redirect_document_id": false
4398+
},
43794399
{
43804400
"source_path_from_root": "/articles/active-directory/customize-branding.md",
43814401
"redirect_url": "/azure/active-directory/fundamentals/customize-branding",

.openpublishing.redirection.azure-monitor.json

Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -5626,6 +5626,21 @@
56265626
"source_path_from_root": "/articles/azure-monitor/vm/vminsights-health-troubleshoot.md",
56275627
"redirect_url": "/azure/azure-monitor/vm/vminsights-overview",
56285628
"redirect_document_id": false
5629+
},
5630+
{
5631+
"source_path_from_root": "/articles/azure-monitor/vm/monitor-virtual-machine-configure.md",
5632+
"redirect_url": "/azure/azure-monitor/vm/monitor-virtual-machine-data-collection",
5633+
"redirect_document_id": false
5634+
},
5635+
{
5636+
"source_path_from_root": "/articles/azure-monitor/vm/monitor-virtual-machine-security.md",
5637+
"redirect_url": "/azure/azure-monitor/vm/monitor-virtual-machine#security-monitoring",
5638+
"redirect_document_id": false
5639+
},
5640+
{
5641+
"source_path_from_root": "/articles/azure-monitor/vm/monitor-virtual-machine-workloads.md",
5642+
"redirect_url": "/azure/azure-monitor/vm/monitor-virtual-machine-data-collection",
5643+
"redirect_document_id": false
56295644
}
56305645
]
56315646
}

.openpublishing.redirection.healthcare-apis.json

Lines changed: 10 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -610,11 +610,15 @@
610610
"redirect_document_id": false
611611
},
612612
{ "source_path_from_root": "/articles/healthcare-apis/iot/iot-troubleshoot-error-messages-and-conditions.md",
613-
"redirect_url": "/azure/healthcare-apis/iot/troubleshoot-error-messages-and-conditions",
613+
"redirect_url": "/azure/healthcare-apis/iot/troubleshoot-errors",
614+
"redirect_document_id": false
615+
},
616+
{ "source_path_from_root": "/articles/healthcare-apis/iot/troubleshoot-error-messages-and-conditions.md",
617+
"redirect_url": "/azure/healthcare-apis/iot/troubleshoot-errors",
614618
"redirect_document_id": false
615619
},
616620
{ "source_path_from_root": "/articles/healthcare-apis/iot/iot-troubleshoot-mappings.md",
617-
"redirect_url": "/azure/healthcare-apis/iot/troubleshoot-mappings",
621+
"redirect_url": "/azure/healthcare-apis/iot/troubleshoot-errors",
618622
"redirect_document_id": false
619623
},
620624
{ "source_path_from_root": "/articles/healthcare-apis/iot/iot-connector-faqs.md",
@@ -637,6 +641,10 @@
637641
"redirect_url": "/azure/healthcare-apis/iot/deploy-new-arm",
638642
"redirect_document_id": false
639643
},
644+
{ "source_path_from_root": "/articles/healthcare-apis/iot/troubleshoot-mappings.md",
645+
"redirect_url": "/azure/healthcare-apis/iot/troubleshoot-errors",
646+
"redirect_document_id": false
647+
},
640648
{ "source_path_from_root": "/articles/healthcare-apis/events/events-display-metrics.md",
641649
"redirect_url": "/azure/healthcare-apis/events/events-use-metrics",
642650
"redirect_document_id": false

.openpublishing.redirection.json

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,15 @@
11
{
22
"redirections": [
3+
{
4+
"source_path": "articles/storage/blobs/storage-quickstart-blobs-php.md",
5+
"redirect_url": "/previous-versions/azure/storage/blobs/storage-quickstart-blobs-php",
6+
"redirect_document_id": false
7+
},
8+
{
9+
"source_path": "articles/storage/blobs/storage-quickstart-blobs-ruby.md",
10+
"redirect_url": "/previous-versions/azure/storage/blobs/storage-quickstart-blobs-ruby",
11+
"redirect_document_id": false
12+
},
313
{
414
"source_path_from_root": "/articles/backup/backup-afs.md",
515
"redirect_url": "/azure/backup/backup-azure-files",

articles/active-directory/authentication/how-to-mfa-number-match.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn how to use number matching in MFA notifications
44
ms.service: active-directory
55
ms.subservice: authentication
66
ms.topic: conceptual
7-
ms.date: 01/06/2023
7+
ms.date: 01/13/2023
88
ms.author: justinha
99
author: mjsantani
1010
ms.collection: M365-identity-device-management
@@ -64,6 +64,7 @@ AD FS adapter will require number matching on supported versions of Windows Serv
6464
|---------|--------|
6565
| Windows Server 2022 | [November 9, 2021—KB5007205 (OS Build 20348.350)](https://support.microsoft.com/topic/november-9-2021-kb5007205-os-build-20348-350-af102e6f-cc7c-4cd4-8dc2-8b08d73d2b31) |
6666
| Windows Server 2019 | [November 9, 2021—KB5007206 (OS Build 17763.2300)](https://support.microsoft.com/topic/november-9-2021-kb5007206-os-build-17763-2300-c63b76fa-a9b4-4685-b17c-7d866bb50e48) |
67+
| Windows Server 2016 | [October 12, 2021—KB5006669 (OS Build 14393.4704)](https://support.microsoft.com/topic/october-12-2021-kb5006669-os-build-14393-4704-bcc95546-0768-49ae-bec9-240cc59df384) |
6768

6869
### NPS extension
6970

articles/active-directory/authentication/howto-authentication-methods-activity.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: how-to
9-
ms.date: 07/13/2021
9+
ms.date: 01/12/2023
1010

1111
ms.author: justinha
1212
author: sopand
@@ -112,7 +112,7 @@ The registration details report shows the following information for each user:
112112
- SSPR Registered (Registered, Not Registered)
113113
- SSPR Enabled (Enabled, Not Enabled)
114114
- SSPR Capable (Capable, Not Capable)
115-
- Methods registered (Email, Mobile Phone, Alternative Mobile Phone, Office Phone, Microsoft Authenticator Push, Software One Time Passcode, FIDO2, Security Key, Security questions)
115+
- Methods registered (Email, Mobile Phone, Alternative Mobile Phone, Office Phone, Microsoft Authenticator Push, Software One Time Passcode, FIDO2, Security Key, Security questions, Hardware OATH token)
116116

117117
![Screenshot of user registration details](media/how-to-authentication-methods-usage-insights/registration-details.png)
118118

@@ -133,7 +133,7 @@ The registration details report shows the following information for each user:
133133
## Limitations
134134

135135
- The data in the report is not updated in real-time and may reflect a latency of up to a few hours.
136-
- The **PhoneAppNotification** or **PhoneAppOTP** methods that a user might have configured are not displayed in the dashboard.
136+
- The **PhoneAppNotification** or **PhoneAppOTP** methods that a user might have configured are not displayed in the dashboard on **Azure AD Authentication methods - Policies**.
137137

138138
## Next steps
139139

articles/active-directory/cloud-sync/how-to-install.md

Lines changed: 23 additions & 24 deletions
Original file line numberDiff line numberDiff line change
@@ -17,67 +17,66 @@ ms.collection: M365-identity-device-management
1717

1818
This article walks you through the installation process for the Azure Active Directory (Azure AD) Connect provisioning agent and how to initially configure it in the Azure portal.
1919

20-
>[!IMPORTANT]
21-
>The following installation instructions assume that all the [prerequisites](how-to-prerequisites.md) were met.
20+
> [!IMPORTANT]
21+
> The following installation instructions assume that you've met all the [prerequisites](how-to-prerequisites.md).
2222
2323
>[!NOTE]
24-
>This article deals with installing the provisioning agent by using the wizard. For information on installing the Azure AD Connect provisioning agent by using a command-line interface (CLI), see [Install the Azure AD Connect provisioning agent by using a CLI and PowerShell](how-to-install-pshell.md).
24+
>This article deals with installing the provisioning agent by using the wizard. For information about installing the Azure AD Connect provisioning agent by using a CLI, see [Install the Azure AD Connect provisioning agent by using a CLI and PowerShell](how-to-install-pshell.md).
2525
26-
For more information and an example, see the following video.
26+
For more information and an example, view the following video:
2727

2828
> [!VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RWK5mR]
2929
3030
## Group Managed Service Accounts
31-
A Group Managed Service Account (gMSA) is a managed domain account that provides automatic password management, simplified service principal name (SPN) management, and the ability to delegate the management to other administrators. It also extends this functionality over multiple servers. Azure AD Connect cloud sync supports and recommends the use of a Group Managed Service Account for running the agent. For more information on a Group Managed Service Account, see [Group Managed Service Accounts](how-to-prerequisites.md#group-managed-service-accounts).
31+
A group Managed Service Account (gMSA) is a managed domain account that provides automatic password management, simplified service principal name (SPN) management, and the ability to delegate the management to other administrators. A gMSA also extends this functionality over multiple servers. Azure AD Connect cloud sync supports and recommends the use of a gMSA for running the agent. For more information, see [Group Managed Service Accounts](how-to-prerequisites.md#group-managed-service-accounts).
3232

3333

34-
### Upgrade an existing agent to use the gMSA
35-
To upgrade an existing agent to use the Group Managed Service Account created during installation, update the agent service to the latest version by running AADConnectProvisioningAgent.msi. Now run through the installation wizard again and provide the credentials to create the account when prompted.
34+
### Update an existing agent to use the gMSA
35+
To update an existing agent to use the Group Managed Service Account created during installation, upgrade the agent service to the latest version by running *AADConnectProvisioningAgent.msi*. Now run through the installation wizard again and provide the credentials to create the account when you're prompted to do so.
3636

3737
## Install the agent
3838

3939
[!INCLUDE [active-directory-cloud-sync-how-to-install](../../../includes/active-directory-cloud-sync-how-to-install.md)]
4040

41-
## Verify agent installation
41+
## Verify the agent installation
4242

4343
[!INCLUDE [active-directory-cloud-sync-how-to-verify-installation](../../../includes/active-directory-cloud-sync-how-to-verify-installation.md)]
4444

4545
>[!IMPORTANT]
46-
>The agent has been installed, but it must be configured and enabled before it will start synchronizing users. To configure a new agent, see [Create a new configuration for Azure AD Connect cloud sync](how-to-configure.md).
46+
> After you've installed the agent, you must configure and enable it before it will start synchronizing users. To configure a new agent, see [Create a new configuration for Azure AD Connect cloud sync](how-to-configure.md).
4747
4848
## Enable password writeback in Azure AD Connect cloud sync
4949

50-
To use password writeback and enable the self-service password reset (SSPR) service to detect the cloud sync agent, you need to use the `Set-AADCloudSyncPasswordWritebackConfiguration` cmdlet and tenant’s global administrator credentials:
50+
To use *password writeback* and enable the self-service password reset (SSPR) service to detect the cloud sync agent, use the `Set-AADCloudSyncPasswordWritebackConfiguration` cmdlet and the tenant’s global administrator credentials:
5151

5252
```
5353
Import-Module "C:\\Program Files\\Microsoft Azure AD Connect Provisioning Agent\\Microsoft.CloudSync.Powershell.dll"
5454
Set-AADCloudSyncPasswordWritebackConfiguration -Enable $true -Credential $(Get-Credential)
5555
```
5656

57-
For more information on using password writeback with Azure AD Connect cloud sync, see [Tutorial: Enable cloud sync self-service password reset writeback to an on-premises environment (preview)](../../active-directory/authentication/tutorial-enable-cloud-sync-sspr-writeback.md).
57+
For more information about using password writeback with Azure AD Connect cloud sync, see [Tutorial: Enable cloud sync self-service password reset writeback to an on-premises environment (preview)](../../active-directory/authentication/tutorial-enable-cloud-sync-sspr-writeback.md).
5858

59-
## Installing against US government cloud
59+
## Install an agent in the US government cloud
6060

61-
By default, the Azure Active Directory (Azure AD) Connect provisioning agent installs against the default Azure cloud environment. If you're installing the agent for use in the US government, follow these steps:
61+
By default, the Azure AD Connect provisioning agent is installed in the default Azure environment. If you're installing the agent for US government use, make this change in step 7 of the preceding installation procedure:
6262

63-
- In step #7 above, instead of select **Open file**, go to start run and navigate to the **AADConnectProvisioningAgentSetup.exe** file. In the run box, after the executable, enter **ENVIRONMENTNAME=AzureUSGovernment** and select **Ok**.
63+
- Instead of selecting **Open file**, select **Start** > **Run**, and then go to the *AADConnectProvisioningAgentSetup.exe* file. In the **Run** box, after the executable, enter **ENVIRONMENTNAME=AzureUSGovernment**, and then select **OK**.
6464

65-
[![Screenshot showing US government cloud install.](media/how-to-install/new-install-12.png)](media/how-to-install/new-install-12.png#lightbox)
65+
[![Screenshot that shows how to install an agent in the US government cloud.](media/how-to-install/new-install-12.png)](media/how-to-install/new-install-12.png#lightbox)
6666

6767
## Password hash synchronization and FIPS with cloud sync
6868

69-
If your server has been locked down according to Federal Information Processing Standard (FIPS), then MD5 is disabled.
70-
69+
If your server has been locked down according to the Federal Information Processing Standard (FIPS), MD5 (message-digest algorithm 5) is disabled.
7170

72-
To enable MD5 for password hash synchronization, perform the following steps:
71+
To enable MD5 for password hash synchronization, do the following:
7372

7473
1. Go to %programfiles%\Microsoft Azure AD Connect Provisioning Agent.
75-
2. Open AADConnectProvisioningAgent.exe.config.
76-
3. Go to the configuration/runtime node at the top of the file.
77-
4. Add the following node: `<enforceFIPSPolicy enabled="false"/>`
78-
5. Save your changes.
74+
1. Open *AADConnectProvisioningAgent.exe.config*.
75+
1. Go to the configuration/runtime node at the top of the file.
76+
1. Add the `<enforceFIPSPolicy enabled="false"/>` node.
77+
1. Save your changes.
7978

80-
For reference, this snippet is what it should look like:
79+
For reference, your code should look like the following snippet:
8180

8281
```xml
8382
<configuration>
@@ -87,7 +86,7 @@ For reference, this snippet is what it should look like:
8786
</configuration>
8887
```
8988

90-
For information about security and FIPS, see [Azure AD password hash sync, encryption, and FIPS compliance](https://blogs.technet.microsoft.com/enterprisemobility/2014/06/28/aad-password-sync-encryption-and-fips-compliance/).
89+
For more information about security and FIPS, see [Azure AD password hash sync, encryption, and FIPS compliance](https://blogs.technet.microsoft.com/enterprisemobility/2014/06/28/aad-password-sync-encryption-and-fips-compliance/).
9190

9291

9392
## Next steps

0 commit comments

Comments
 (0)