Skip to content

Commit c475e09

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into lto-poland
2 parents 2729636 + 2113c86 commit c475e09

File tree

1,882 files changed

+10807
-8293
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

1,882 files changed

+10807
-8293
lines changed

.openpublishing.redirection.active-directory.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -5290,6 +5290,11 @@
52905290
"redirect_url": "/azure/active-directory/reports-monitoring/howto-customize-filter-logs",
52915291
"redirect_document_id": true
52925292
},
5293+
{
5294+
"source_path_from_root": "/articles/active-directory/reports-monitoring/tutorial-azure-monitor-stream-logs-to-event-hub.md",
5295+
"redirect_url": "/azure/active-directory/reports-monitoring/howto-stream-logs-to-event-hub",
5296+
"redirect_document_id": false
5297+
},
52935298
{
52945299
"source_path_from_root": "/articles/active-directory/reports-monitoring/reference-basic-info-sign-in-logs.md",
52955300
"redirect_url": "/azure/active-directory/reports-monitoring/concept-sign-in-log-activity-details",

.openpublishing.redirection.json

Lines changed: 32 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,10 @@
11
{
22
"redirections": [
3+
{
4+
"source_path": "articles/azure-resource-manager/bicep/bicep-import-providers.md",
5+
"redirect_URL": "bicep-import",
6+
"redirect_document_id": false
7+
},
38
{
49
"source_path": "articles/migrate/tutorial-assess-webapps-physical.md",
510
"redirect_URL": "tutorial-assess-webapps",
@@ -49,7 +54,7 @@
4954
"source_path": "articles/storsimple/storsimple-virtual-array-update-11-release-notes.md",
5055
"redirect_url": "/azure/storsimple/storsimple-overview",
5156
"redirect_document_id": false
52-
},
57+
},
5358
{
5459
"source_path": "articles/storsimple/storsimple-ova-overview.md",
5560
"redirect_url": "/azure/storsimple/storsimple-overview",
@@ -70,7 +75,7 @@
7075
"redirect_url": "/azure/storsimple/storsimple-overview",
7176
"redirect_document_id": false
7277
},
73-
{
78+
{
7479
"source_path": "articles/storsimple/storsimple-virtual-array-deploy1-portal-prep.md",
7580
"redirect_url": "/azure/storsimple/storsimple-overview",
7681
"redirect_document_id": false
@@ -9986,7 +9991,7 @@
99869991
"source_path_from_root": "/articles/container-instances/container-instances-quotas.md",
99879992
"redirect_url": "/azure/container-instances/container-instances-resource-and-quota-limits",
99889993
"redirect_document_id": false
9989-
},
9994+
},
99909995
{
99919996
"source_path_from_root": "/articles/container-registry/container-registry-managed-get-started-azure-cli.md",
99929997
"redirect_url": "/azure/container-registry/container-registry-get-started-azure-cli",
@@ -13452,6 +13457,11 @@
1345213457
"redirect_url": "/azure/governance/policy/samples/swift-csp-cscf-2021",
1345313458
"redirect_document_id": false
1345413459
},
13460+
{
13461+
"source_path_from_root": "/articles/governance/policy/samples/azure-security-benchmarkv1.md",
13462+
"redirect_url": "/azure/governance/policy/samples/azure-security-benchmark",
13463+
"redirect_document_id": false
13464+
},
1345513465
{
1345613466
"source_path_from_root": "/articles/azure-policy/create-manage-policy.md",
1345713467
"redirect_url": "/azure/governance/policy/tutorials/create-and-manage",
@@ -14190,17 +14200,17 @@
1419014200
{
1419114201
"source_path_from_root": "/articles/load-balancer/scripts/load-balancer-linux-cli-load-balance-multiple-websites-vm.md",
1419214202
"redirect_url": "/azure/load-balancer/load-balancer-multiple-ip",
14193-
"redirect_document_id": false
14203+
"redirect_document_id": false
1419414204
},
1419514205
{
1419614206
"source_path_from_root": "/articles/load-balancer/scripts/load-balancer-linux-cli-sample-nlb.md",
1419714207
"redirect_url": "/azure/load-balancer/tutorial-multi-availability-sets-portal",
14198-
"redirect_document_id": false
14208+
"redirect_document_id": false
1419914209
},
1420014210
{
1420114211
"source_path_from_root": "/articles/load-balancer/scripts/load-balancer-linux-cli-sample-zonal-frontend.md",
1420214212
"redirect_url": "/azure/load-balancer/tutorial-load-balancer-standard-public-zonal-portal",
14203-
"redirect_document_id": false
14213+
"redirect_document_id": false
1420414214
},
1420514215
{
1420614216
"source_path_from_root": "/articles/load-balancer/scripts/load-balancer-windows-powershell-sample-nlb.md",
@@ -14691,7 +14701,7 @@
1469114701
"source_path_from_root": "/articles/notification-hubs/cross-region-recovery.md",
1469214702
"redirect_url": "/azure/notification-hubs/notification-hubs-high-availability",
1469314703
"redirect_document_id": false
14694-
},
14704+
},
1469514705
{
1469614706
"source_path_from_root": "/articles/open-datasets/service/how-to-create-dataset-from-open-dataset.md",
1469714707
"redirect_url": "/azure/open-datasets/how-to-create-azure-machine-learning-dataset-from-open-dataset",
@@ -23582,6 +23592,11 @@
2358223592
"redirect_url": "/azure/devtest-labs/how-to-move-labs",
2358323593
"redirect_document_id": false
2358423594
},
23595+
{
23596+
"source_path_from_root": "/articles/devtest-labs/devtest-lab-guidance-prescriptive-adoption.md",
23597+
"redirect_url": "/azure/devtest-labs/deliver-proof-of-concept",
23598+
"redirect_document_id": false
23599+
},
2358523600
{
2358623601
"source_path_from_root": "/articles/azure/virtual-desktop/azure-advisor.md",
2358723602
"redirect_url": "/azure/advisor/advisor-overview",
@@ -23952,7 +23967,7 @@
2395223967
"redirect_url": "/previous-versions/azure/virtual-machines/linux/openshift-container-platform-3x",
2395323968
"redirect_document_id": false
2395423969
},
23955-
{
23970+
{
2395623971
"source_path": "articles/orbital/orbital-preview.md",
2395723972
"redirect_url": "/azure/orbital/overview",
2395823973
"redirect_document_id": false
@@ -23961,7 +23976,7 @@
2396123976
"source_path": "articles/private-multi-access-edge-compute-mec/metaswitch-fusion-core-overview.md",
2396223977
"redirect_URL": "/azure/private-5g-core",
2396323978
"redirect_document_id": false
23964-
},
23979+
},
2396523980
{
2396623981
"source_path": "articles/private-5g-core/modify-site-plan.md",
2396723982
"redirect_URL": "/azure/private-5g-core/modify-service-plan",
@@ -24161,12 +24176,12 @@
2416124176
"source_path_from_root": "/articles/azure-functions/create-function-app-linux-app-service-plan.md",
2416224177
"redirect_url": "/azure/azure-functions/functions-create-function-app-portal",
2416324178
"redirect_document_id": false
24164-
},
24179+
},
2416524180
{
2416624181
"source_path_from_root": "/articles/azure-functions/create-premium-plan-function-app-portal.md",
2416724182
"redirect_url": "/azure/azure-functions/functions-create-function-app-portal",
2416824183
"redirect_document_id": false
24169-
},
24184+
},
2417024185
{
2417124186
"source_path_from_root": "/articles/sentinel/data-connectors/windows-firewall-events-via-ama.md",
2417224187
"redirect_url": "/azure/sentinel/data-connectors-reference",
@@ -24460,7 +24475,7 @@
2446024475
{
2446124476
"source_path_from_root": "/articles/virtual-machines/image-builder-reliability.md",
2446224477
"redirect_url": "/azure/reliability/reliability-image-builder.md",
24463-
"redirect_document_id": false
24478+
"redirect_document_id": false
2446424479
},
2446524480
{
2446624481
"source_path_from_root": "/articles/bastion/bastion-connect-vm-rdp-linux.md",
@@ -24476,6 +24491,11 @@
2447624491
"source_path_from_root": "/articles/private-link/tutorial-private-endpoint-cosmosdb-portal.md",
2447724492
"redirect_url": "/azure/cosmos-db/how-to-configure-private-endpoints",
2447824493
"redirect_document_id": false
24494+
},
24495+
{
24496+
"source_path_from_root": "/articles/aks/command-invoke.md",
24497+
"redirect_url": "/azure/aks/access-private-cluster",
24498+
"redirect_document_id": false
2447924499
}
2448024500
]
2448124501
}

articles/active-directory-b2c/partner-f5.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -234,12 +234,12 @@ The BIG-IP has required Azure AD B2C requests in its preconfigured request set.
234234

235235
| Parameter | Parameter name | Parameter value|
236236
|----|---|---|
237-
| client-id | client-id |N/A |
237+
| client_id | client_id |N/A |
238238
| nonce | nonce| N/A|
239-
| redirect-uri | redirect-uri | N/A|
239+
| redirect_uri | redirect_uri | N/A|
240240
| scope | scope | N/A|
241-
| response-type | response-type | N/A|
242-
| client-secret | client-secret |N/A |
241+
| response_type | response_type | N/A|
242+
| client_secret | client_secret |N/A |
243243
| custom | grant_type | authorization_code |
244244

245245
**Auth redirect request: Enabled**
@@ -254,9 +254,9 @@ The BIG-IP has required Azure AD B2C requests in its preconfigured request set.
254254

255255
| Parameter | Parameter name | Parameter value|
256256
|---|---|----|
257-
| client-id | client-id | N/A|
258-
| redirect-uri | redirect-uri |N/A |
259-
| response-type |response-type |N/A |
257+
| client_id | client_id | N/A|
258+
| redirect_uri | redirect_uri |N/A |
259+
| response_type |response_type |N/A |
260260
| scope | scope | N/A|
261261
| nonce | nonce | N/A|
262262

articles/active-directory-domain-services/alert-ldaps.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.service: active-directory
1010
ms.subservice: domain-services
1111
ms.workload: identity
1212
ms.topic: troubleshooting
13-
ms.date: 01/29/2023
13+
ms.date: 09/15/2023
1414
ms.author: justinha
1515

1616
---
@@ -30,7 +30,7 @@ This article helps you understand and resolve common alerts with secure LDAP acc
3030

3131
When you enable secure LDAP, it's recommended to create additional rules that restrict inbound LDAPS access to specific IP addresses. These rules protect the managed domain from brute force attacks. To update the network security group to restrict TCP port 636 access for secure LDAP, complete the following steps:
3232

33-
1. In the Azure portal, search for and select **Network security groups**.
33+
1. In the [Microsoft Entra admin center](https://entra.microsoft.com), search for and select **Network security groups**.
3434
1. Choose the network security group associated with your managed domain, such as *AADDS-contoso.com-NSG*, then select **Inbound security rules**
3535
1. Select **+ Add** to create a rule for TCP port 636. If needed, select **Advanced** in the window to create a rule.
3636
1. For the **Source**, choose *IP Addresses* from the drop-down menu. Enter the source IP addresses that you want to grant access for secure LDAP traffic.

articles/active-directory-domain-services/alert-nsg.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.service: active-directory
1010
ms.subservice: domain-services
1111
ms.workload: identity
1212
ms.topic: troubleshooting
13-
ms.date: 01/29/2023
13+
ms.date: 09/15/2023
1414
ms.author: justinha
1515

1616
---
@@ -63,7 +63,7 @@ The following default inbound and outbound security rules are applied to the net
6363

6464
To verify the existing security rules and make sure the default ports are open, complete the following steps:
6565

66-
1. In the Azure portal, search for and select **Network security groups**.
66+
1. In the [Microsoft Entra admin center](https://entra.microsoft.com), search for and select **Network security groups**.
6767
1. Choose the network security group associated with your managed domain, such as *AADDS-contoso.com-NSG*.
6868
1. On the **Overview** page, the existing inbound and outbound security rules are shown.
6969

@@ -75,7 +75,7 @@ To verify the existing security rules and make sure the default ports are open,
7575

7676
To add a missing security rule, complete the following steps:
7777

78-
1. In the Azure portal, search for and select **Network security groups**.
78+
1. In the [Microsoft Entra admin center](https://entra.microsoft.com), search for and select **Network security groups**.
7979
1. Choose the network security group associated with your managed domain, such as *AADDS-contoso.com-NSG*.
8080
1. Under **Settings** in the left-hand panel, click *Inbound security rules* or *Outbound security rules* depending on which rule you need to add.
8181
1. Select **Add**, then create the required rule based on the port, protocol, direction, etc. When ready, select **OK**.

articles/active-directory-domain-services/alert-service-principal.md

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ ms.subservice: domain-services
1111
ms.workload: identity
1212
ms.custom: has-azure-ad-ps-ref
1313
ms.topic: troubleshooting
14-
ms.date: 01/29/2023
14+
ms.date: 09/15/2023
1515
ms.author: justinha
1616
---
1717
# Known issues: Service principal alerts in Azure Active Directory Domain Services
@@ -32,8 +32,7 @@ If a required service principal is deleted, the Azure platform can't perform aut
3232

3333
To check which service principal is missing and must be recreated, complete the following steps:
3434

35-
1. In the Azure portal, select **Azure Active Directory** from the left-hand navigation menu.
36-
1. Select **Enterprise applications**. Choose *All applications* from the **Application Type** drop-down menu, then select **Apply**.
35+
1. In the [Microsoft Entra admin center](https://entra.microsoft.com), search for and select **Enterprise applications**. Choose *All applications* from the **Application Type** drop-down menu, then select **Apply**.
3736
1. Search for each of the following application IDs. For Azure Global, search for AppId value *2565bd9d-da50-47d4-8b85-4c97f669dc36*. For other Azure clouds, search for AppId value *6ba9a5d4-8456-4118-b521-9c5ca10cdf84*. If no existing application is found, follow the *Resolution* steps to create the service principal or re-register the namespace.
3837

3938
| Application ID | Resolution |
@@ -66,7 +65,7 @@ The managed domain's health automatically updates itself within two hours and re
6665
6766
If application ID *443155a6-77f3-45e3-882b-22b3a8d431fb*, *abba844e-bc0e-44b0-947a-dc74e5d09022*, or *d87dcbc6-a371-462e-88e3-28ad15ec4e64* is missing from your Azure AD directory, complete the following steps to re-register the *Microsoft.AAD* resource provider:
6867
69-
1. In the Azure portal, search for and select **Subscriptions**.
68+
1. In the [Microsoft Entra admin center](https://entra.microsoft.com), search for and select **Subscriptions**.
7069
1. Choose the subscription associated with your managed domain.
7170
1. From the left-hand navigation, choose **Resource Providers**.
7271
1. Search for *Microsoft.AAD*, then select **Re-register**.

articles/active-directory-domain-services/change-sku.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: domain-services
1010
ms.workload: identity
1111
ms.topic: how-to
12-
ms.date: 03/23/2023
12+
ms.date: 09/15/2023
1313
ms.author: justinha
1414

1515
#Customer intent: As an identity administrator, I want to change the SKU for my Azure AD Domain Services managed domain to use different features as my business requirements change.
@@ -21,7 +21,7 @@ In Azure Active Directory Domain Services (Azure AD DS), the available performan
2121

2222
You select a SKU when you create the managed domain, and you can switch SKUs up or down as your business needs change after the managed domain has been deployed. Changes in business requirements could include the need for more frequent backups or to create additional forest trusts. For more information on the limits and pricing of the different SKUs, see [Azure AD DS SKU concepts][concepts-sku] and [Azure AD DS pricing][pricing] pages.
2323

24-
This article shows you how to change the SKU for an existing Azure AD DS managed domain using the Azure portal.
24+
This article shows you how to change the SKU for an existing Azure AD DS managed domain using the [Microsoft Entra admin center](https://entra.microsoft.com).
2525

2626
## Before you begin
2727

@@ -44,18 +44,18 @@ For more information on these limits, see [Azure AD DS SKU features and limits][
4444

4545
## Select a new SKU
4646

47-
To change the SKU for a managed domain using the Azure portal, complete the following steps:
47+
To change the SKU for a managed domain using the [Microsoft Entra admin center](https://entra.microsoft.com), complete the following steps:
4848

49-
1. At the top of the Azure portal, search for and select **Azure AD Domain Services**. Choose your managed domain from the list, such as *aaddscontoso.com*.
49+
1. In the [Microsoft Entra admin center](https://entra.microsoft.com), search for and select **Azure AD Domain Services**. Choose your managed domain from the list, such as *aaddscontoso.com*.
5050
1. In the menu on the left-hand side of the Azure AD DS page, select **Settings > SKU**.
5151

52-
![Select the SKU menu option for your Azure AD DS managed domain in the Azure portal](media/change-sku/overview-change-sku.png)
52+
![Select the SKU menu option for your Azure AD DS managed domain in the Microsoft Entra admin center](media/change-sku/overview-change-sku.png)
5353

5454
1. From the drop-down menu, select the SKU you wish for your managed domain. If you have a resource forest, you can't select *Standard* SKU as forest trusts are only available on the *Enterprise* SKU or higher.
5555

5656
Choose the SKU you want from the drop-down menu, then select **Save**.
5757

58-
![Choose the required SKU from the drop-down menu in the Azure portal](media/change-sku/change-sku-selection.png)
58+
![Choose the required SKU from the drop-down menu in the Microsoft Entra admin center](media/change-sku/change-sku-selection.png)
5959

6060
It can take a minute or two to change the SKU type.
6161

articles/active-directory-domain-services/check-health.md

Lines changed: 7 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Check the health of Azure Active Directory Domain Services | Microsoft Docs
3-
description: Learn how to check the health of an Azure Active Directory Domain Services (Azure AD DS) managed domain and understand status messages using the Azure portal.
3+
description: Learn how to check the health of an Azure Active Directory Domain Services (Azure AD DS) managed domain and understand status messages.
44
services: active-directory-ds
55
author: justinha
66
manager: amycolannino
@@ -10,25 +10,26 @@ ms.service: active-directory
1010
ms.subservice: domain-services
1111
ms.workload: identity
1212
ms.topic: how-to
13-
ms.date: 01/29/2023
13+
ms.date: 09/13/2023
1414
ms.author: justinha
1515

1616
---
1717
# Check the health of an Azure Active Directory Domain Services managed domain
1818

19-
Azure Active Directory Domain Services (Azure AD DS) runs some background tasks to keep the managed domain healthy and up-to-date. These tasks include taking backups, applying security updates, and synchronizing data from Azure AD. If there are issues with the Azure AD DS managed domain, these tasks may not successfully complete. To review and resolve any issues, you can check the health status of a managed domain using the Azure portal.
19+
Azure Active Directory Domain Services (Azure AD DS) runs some background tasks to keep the managed domain healthy and up-to-date. These tasks include taking backups, applying security updates, and synchronizing data from Azure AD. If there are issues with the Azure AD DS managed domain, these tasks may not successfully complete. To review and resolve any issues, you can check the health status of a managed domain using the Microsoft Entra admin center.
2020

2121
This article shows you how to view the Azure AD DS health status and understand the information or alerts shown.
2222

2323
## View the health status
2424

25-
The health status for a managed domain is viewed using the Azure portal. Information on the last backup time and synchronization with Azure AD can be seen, along with any alerts that indicate a problem with the managed domain's health. To view the health status for a managed domain, complete the following steps:
25+
The health status for a managed domain is viewed using the Microsoft Entra admin center. Information on the last backup time and synchronization with Azure AD can be seen, along with any alerts that indicate a problem with the managed domain's health. To view the health status for a managed domain, complete the following steps:
2626

27-
1. In the Azure portal, search for and select **Azure AD Domain Services**.
27+
1. Sign in to [Microsoft Entra admin center](https://entra.microsoft.com) as a [Global Administrator](../active-directory/roles/permissions-reference.md#global-administrator).
28+
1. Search for and select **Azure AD Domain Services**.
2829
1. Select your managed domain, such as *aaddscontoso.com*.
2930
1. On the left-hand side of the Azure AD DS resource window, select **Health**. The following example screenshot shows a healthy managed domain and the status of the last backup and Azure AD synchronization:
3031

31-
![Health page overview in the Azure portal showing the Azure Active Directory Domain Services status](./media/check-health/health-page.png)
32+
![Health page overview showing the Azure Active Directory Domain Services status](./media/check-health/health-page.png)
3233

3334
The *Last evaluated* timestamp of the health page shows when the managed domain was last checked. The health of a managed domain is evaluated every hour. If you make any changes to a managed domain, wait until the next evaluation cycle to view the updated health status.
3435

0 commit comments

Comments
 (0)