You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/cloud-sync/tutorial-basic-ad-azure.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -19,7 +19,7 @@ This tutorial walks you through creating a basic Active Directory environment.
19
19
20
20

21
21
22
-
You can use the environment you create in the tutorial to test various aspects of hybrid identity scenarios and will be a prerequisite for some of the tutorials. If you already have an existing Active Directory environment you can use that as a substitute. This information is provided for individuals who my be starting from nothing.
22
+
You can use the environment you create in the tutorial to test various aspects of hybrid identity scenarios and will be a prerequisite for some of the tutorials. If you already have an existing Active Directory environment you can use that as a substitute. This information is provided for individuals who may be starting from nothing.
Copy file name to clipboardExpand all lines: articles/azure-maps/tutorial-search-location.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -200,7 +200,7 @@ This section shows how to use the Maps [Search API](/rest/api/maps/search) to fi
200
200
201
201

202
202
203
-
4. You can see the raw data that the map is rendering by entering the following HTTPRequest in your browser. Replace \<YourAzureMapsKey\> with your primary key.
203
+
4. You can see the raw data that the map is rendering by entering the following HTTPRequest in your browser. Replace `<YourAzureMapsKey>` with your primary key.
The API`*atlas.Popup` provides an information window anchored at the required position on the map.
225
+
The API`atlas.Popup` provides an information window anchored at the required position on the map.
226
226
227
227
2. Add the following lines of code in the map `ready`event handler after the code to create an instance of a Popup and add a mouseover event to the symbol layer. This code shows a popup windowwith the results when you mouse over a point of interest.
In Azure Cosmos DB for NoSQL, data is scehma-free and typically denormalized. Instead of joining data across entities and sets, like you would in a relational database, joins occur within a single item. Specifically, joins are scoped to that item and can't occur across multiple items and containers.
19
+
In Azure Cosmos DB for NoSQL, data is schema-free and typically denormalized. Instead of joining data across entities and sets, like you would in a relational database, joins occur within a single item. Specifically, joins are scoped to that item and can't occur across multiple items and containers.
20
20
21
21
> [!TIP]
22
22
> If you find yourself needing to join across items and containers, consider reworking your [data model](../../modeling-data.md) to avoid this.
Copy file name to clipboardExpand all lines: articles/data-lake-analytics/includes/retirement-flag.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,4 +9,4 @@ ms.author: whhender
9
9
> New Azure Data Lake Analytics accounts can no longer be created unless your subscription has been enabled.
10
10
> If you need your subscription to be enabled [contact support](https://portal.azure.com/?#blade/Microsoft_Azure_Support/HelpAndSupportBlade) and provide your business scenario.
11
11
>
12
-
> If you are already using Azure Data Lake Analytics, you'll need to create a migration plan for your organization by February 29th, 2024.
12
+
> If you are already using Azure Data Lake Analytics, you'll need to create a [migration plan to Azure Synapse Analytics](../migrate-azure-data-lake-analytics-to-synapse.md) for your organization by February 29th, 2024.
One of the biggest challenges that security teams face today is the number of security issues they face on a daily basis. There are numerous security issues that need to be resolve and never enough resources to address them all.
14
+
One of the biggest challenges that security teams face today is the number of security issues they face on a daily basis. There are numerous security issues that need to be resolved and never enough resources to address them all.
15
15
16
16
Defender for Cloud's contextual security capabilities assists security teams to assess the risk behind each security issue, and identify the highest risk issues that need to be resolved soonest. Defender for Cloud assists security teams to reduce the risk of an impactful breach to their environment in the most effective way.
17
17
18
-
All of these capabilities are available as part of the [Defender Cloud Security Posture Management](concept-cloud-security-posture-management.md) plan and the requiring the enablement of [agentless scanning for VMs](concept-agentless-data-collection.md)
18
+
All of these capabilities are available as part of the [Defender Cloud Security Posture Management](concept-cloud-security-posture-management.md) plan and require the enablement of [agentless scanning for VMs](concept-agentless-data-collection.md)
19
19
20
20
## What is cloud security graph?
21
21
@@ -29,7 +29,7 @@ Defender for Cloud then uses the generated graph to perform an attack path analy
29
29
30
30
Attack path analysis is a graph-based algorithm that scans the cloud security graph. The scans expose exploitable paths that attackers may use to breach your environment to reach your high-impact assets. Attack path analysis exposes those attack paths and suggests recommendations as to how best remediate the issues that will break the attack path and prevent successful breach.
31
31
32
-
By taking your environment's contextual information into account such as, internet exposure, permissions, lateral movement, and more. Attack path analysis identifies issues that may lead to a breach on your environment, and helps you to remediate the highest risk ones first.
32
+
By taking your environment's contextual information into account such as internet exposure, permissions, lateral movement, and more, attack path analysis identifies issues that may lead to a breach on your environment, and helps you to remediate the highest risk ones first.
33
33
34
34
:::image type="content" source="media/concept-cloud-map/attack-path.png" alt-text="Image that shows a sample attack path from attacker to your sensitive data.":::
35
35
@@ -39,7 +39,7 @@ Learn how to use [attack path analysis](how-to-manage-attack-path.md).
39
39
40
40
Using the cloud security explorer, you can proactively identify security risks in your multicloud environment by running graph-based queries on the cloud security graph. Your security team can use the query builder to search for and locate risks, while taking your organization's specific contextual and conventional information into account.
41
41
42
-
Cloud security explorer provides you with the ability to perform proactive exploration features. You can search for security risks within your organization by running graph-based path-finding queries on top the contextual security data that is already provided by Defender for Cloud. Such as, cloud misconfigurations, vulnerabilities, resource context, lateral movement possibilities between resources and more.
42
+
Cloud security explorer provides you with the ability to perform proactive exploration features. You can search for security risks within your organization by running graph-based path-finding queries on top the contextual security data that is already provided by Defender for Cloud, such as cloud misconfigurations, vulnerabilities, resource context, lateral movement possibilities between resources and more.
43
43
44
44
Learn how to use the [cloud security explorer](how-to-manage-cloud-security-explorer.md), or check out the [cloud security graph components list](attack-path-reference.md#cloud-security-graph-components-list).
Copy file name to clipboardExpand all lines: articles/event-hubs/includes/event-hubs-partition-count.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -11,6 +11,6 @@ ms.custom: "include file"
11
11
12
12
---
13
13
14
-
As [partition](../event-hubs-features.md#partitions) is a data organization mechanism that allows you to publish and consume data in a parallel manner, we recommend that you balance scaling units (TUs, PUs or CUs) and partitions to achieve optimal scale. In general we recommend users to maintain a maximum throughput of 1 MB/s per partition and choose the partition count to match the maximum throughput you want to handle. For example, if your use case requires 20 MB/s, it is recommended to choose at least 20 partitions to achieve the optimal throughput.
15
-
16
-
However, if you have a model in which your application has an affinity to a particular partition, increasing the number of partitions may not be of any benefit to you. For more information, see [availability and consistency](../event-hubs-availability-and-consistency.md).
14
+
As [partition](../event-hubs-features.md#partitions) is a data organization mechanism that allows you to publish and consume data in a parallel manner, we recommend that you balance scaling units (TUs, PUs or CUs) and partitions to achieve optimal scale. In general, we recommend a maximum throughput of 1 MB/s per partition. Therefore, a rule of thumb for calculating the number of partitions would be to divide the maximum expected throughput by 1 MB/s. For example, if your use case requires 20 MB/s, it is recommended to choose at least 20 partitions to achieve the optimal throughput.
15
+
16
+
However, if you have a model in which your application has an affinity to a particular partition, increasing the number of partitions may not be beneficial. For more information, see [availability and consistency](../event-hubs-availability-and-consistency.md).
Copy file name to clipboardExpand all lines: articles/machine-learning/how-to-share-models-pipelines-across-workspaces-with-registries.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -118,7 +118,7 @@ print(ml_client_registry)
118
118
119
119
## Create environment in registry
120
120
121
-
Environments define the docker container and python dependencies required to run training jobs or deploy models. For more information on environments, see the following articles:
121
+
Environments define the docker container and Python dependencies required to run training jobs or deploy models. For more information on environments, see the following articles:
0 commit comments