Skip to content

Commit c722760

Browse files
authored
Merge pull request #42896 from MicrosoftDocs/master
6/4 AM Publish
2 parents 0a7c962 + bda7070 commit c722760

File tree

153 files changed

+1888
-1228
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

153 files changed

+1888
-1228
lines changed

articles/active-directory/active-directory-assign-admin-roles-azure-portal.md

Lines changed: 18 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -9,9 +9,9 @@ editor: ''
99

1010
ms.service: active-directory
1111
ms.workload: identity
12-
ms.component: fundamentals
12+
ms.component: users-groups-roles
1313
ms.topic: article
14-
ms.date: 03/15/2018
14+
ms.date: 06/04/2018
1515
ms.author: curtand
1616
ms.reviewer: vincesm
1717
ms.custom: it-pro
@@ -21,8 +21,8 @@ ms.custom: it-pro
2121

2222
Using Azure Active Directory (Azure AD), you can designate separate administrators to serve different functions. Administrators have access to various features in the Azure portal and, depending on their role, can create or edit users, assign administrative roles to others, reset user passwords, manage user licenses, and manage domains, among other things. A user who is assigned an admin role will have the same permissions across all of the cloud services to which your organization has subscribed to, regardless of whether you assign the role in the Office 365 portal, or in the Azure portal, or by using the Azure AD module for Windows PowerShell.
2323

24-
## Details about the global administrator role
25-
The global administrator has access to all administrative features. By default, the person who signs up for an Azure subscription is assigned the global administrator role for the directory. Only global administrators can assign other administrator roles.
24+
## Details about the Global Administrator role
25+
The Global Administrator has access to all administrative features. By default, the person who signs up for an Azure subscription is assigned the global administrator role for the directory. Only global administrators can assign other administrator roles.
2626

2727
## Assign or remove administrator roles
2828
To learn how to assign administrative roles to a user in Azure Active Directory, see [Assign a user to administrator roles in Azure Active Directory](active-directory-users-assign-role-azure-portal.md).
@@ -38,7 +38,7 @@ The following administrator roles are available:
3838
> [!NOTE]
3939
> To deploy Exchange ActiveSync conditional access policy in Azure, the user must also be Global Administrator.
4040
41-
* **Dynamics 365 service administrator**: Users with this role have global permissions within Microsoft CRM Online, when the service is present, as well as the ability to manage support tickets and monitor service health. More information at [About Office 365 admin roles](https://support.office.com/article/About-Office-365-admin-roles-da585eea-f576-4f55-a1e0-87090b6aaa9d).
41+
* **Dynamics 365 Service Administrator**: Users with this role have global permissions within Microsoft Dynamics 365, when the service is present, as well as the ability to manage support tickets and monitor service health. More information at [About Office 365 admin roles](https://support.office.com/article/About-Office-365-admin-roles-da585eea-f576-4f55-a1e0-87090b6aaa9d).
4242

4343
* **Device Administrators**: Users with this role become local machine administrators on all Windows 10 devices that are joined to Azure Active Directory. They do not have the ability to manage devices objects in Azure Active Directory.
4444

@@ -65,6 +65,8 @@ The following administrator roles are available:
6565

6666
* **Mailbox Administrator**: This role is only used as part of Exchange Online email support for RIM Blackberry devices. If your organization does not use Exchange Online email on RIM Blackberry devices, do not use this role.
6767

68+
* **Message Center Reader**: Users in this role can monitor notifications and advisory health updates in [Office 365 Message center](https://support.office.com/article/Message-center-in-Office-365-38FB3333-BFCC-4340-A37B-DEDA509C2093) for their organization on configured services such as Exchange, Intune and Microsoft Teams. Message Center Readers receive weekly email digests of posts, updates, and can share message center posts in Office 365. In Azure AD, users assigned to this role will only have read-only access on Azure AD services such as users and groups.
69+
6870
* **Partner Tier 1 Support**: Do not use. This role has been deprecated and will be removed from Azure AD in the future. This role is intended for use by a small number of Microsoft resale partners, and is not intended for general use.
6971

7072
* **Partner Tier 2 Support**: Do not use. This role has been deprecated and will be removed from Azure AD in the future. This role is intended for use by a small number of Microsoft resale partners, and is not intended for general use.
@@ -101,24 +103,24 @@ The following administrator roles are available:
101103

102104
## Administrator permissions
103105

104-
### Billing administrator
106+
### Billing Administrator
105107

106108
| Can do | Cannot do |
107109
| --- | --- |
108110
|<p>View company and user information</p><p>Manage Office support tickets</p><p>Perform billing and purchasing operations for Office products</p> |<p>Reset user passwords</p><p>Create and manage user views</p><p>Create, edit, and delete users and groups, and manage user licenses</p><p>Manage domains</p><p>Manage company information</p><p>Delegate administrative roles to others</p><p>Use directory synchronization</p><p>View audit logs</p>|
109111

110-
### Conditional Access administrator
112+
### Conditional Access Administrator
111113

112114
| Can do | Cannot do |
113115
| --- | --- |
114116
|<p>View company and user information</p><p>Manage conditional access settings</p> |<p>Reset user passwords</p><p>Create and manage user views</p><p>Create, edit, and delete users and groups, and manage user licenses</p><p>Manage domains</p><p>Manage company information</p><p>Delegate administrative roles to others</p><p>Use directory synchronization</p><p>View audit logs</p>|
115117

116-
### Global administrator
118+
### Global Administrator
117119
| Can do | Cannot do |
118120
| --- | --- |
119-
|<p>View company and user information</p><p>Manage Office support tickets</p><p>Perform billing and purchasing operations for Office products</p><p>Reset user passwords</p><p>Reset other administrator’s passwords</p> <p>Create and manage user views</p><p>Create, edit, and delete users and groups, and manage user licenses</p><p>Manage domains</p><p>Manage company information</p><p>Delegate administrative roles to others</p><p>Use directory synchronization</p><p>Enable or disable multi-factor authentication</p><p>View audit logs</p> |N/A |
121+
|<p>View company and user information</p><p>Manage Office support tickets</p><p>Perform billing and purchasing operations for Office products</p><p>Reset user passwords</p><p>Reset other administrators' passwords</p> <p>Create and manage user views</p><p>Create, edit, and delete users and groups, and manage user licenses</p><p>Manage domains</p><p>Manage company information</p><p>Delegate administrative roles to others</p><p>Use directory synchronization</p><p>Enable or disable multi-factor authentication</p><p>View audit logs</p> |N/A |
120122

121-
### Password administrator / Helpdesk administrator
123+
### Password Administrator / Helpdesk Administrator
122124
| Can do | Cannot do |
123125
| --- | --- |
124126
| <p>View company and user information</p><p>Manage Office support tickets</p><p>Change passwords for users and other Helpdesk administrators only</p>|<p>Perform billing and purchasing operations for Office products</p><p>Create and manage user views</p><p>Create, edit, and delete users and groups, and manage user licenses</p><p>Manage domains</p><p>Manage company information</p><p>Delegate administrative roles to others</p><p>Use directory synchronization</p><p>View reports</p>|
@@ -147,29 +149,29 @@ View Azure AD sign-in Reports and audit logs<br>View company and user informatio
147149
| Privileged Identity Management |<ul><li>All permissions of the Security Reader role.<li>**Cannot** manage Azure AD role memberships or settings. |
148150
| <p>Monitor Office 365 Service Health</p><p>Office 365 Security & Compliance Center |<ul><li>All permissions of the Security Reader role.<li>Can configure all settings in the Advanced Threat Protection feature (malware & virus protection, malicious URL config, URL tracing, etc.). |
149151

150-
### Service administrator
152+
### Service Administrator
151153
| Can do | Cannot do |
152154
| --- | --- |
153155
| <p>View company and user information</p><p>Manage Office support tickets</p> |<p>Reset user passwords</p><p>Perform billing and purchasing operations for Office products</p><p>Create and manage user views</p><p>Create, edit, and delete users and groups, and manage user licenses</p><p>Manage domains</p><p>Manage company information</p><p>Delegate administrative roles to others</p><p>Use directory synchronization</p><p>View audit logs</p> |
154156

155-
### User Account administrator
157+
### User Account Administrator
156158
| Can do | Cannot do |
157159
| --- | --- |
158160
| <p>View company and user information</p><p>Manage Office support tickets</p><p>Change passwords for users, Helpdesk administrators, and other User Account administrators only</p><p>Create and manage user views</p><p>Create, edit, and delete users and groups, and manage user licenses, with limitations. He or she cannot delete a global administrator or create other administrators.</p> |<p>Perform billing and purchasing operations for Office products</p><p>Manage domains</p><p>Manage company information</p><p>Delegate administrative roles to others</p><p>Use directory synchronization</p><p>Enable or disable multi-factor authentication</p><p>View audit logs</p> |
159161

160-
### To add a colleague as a global administrator
162+
### To add a user as a global administrator
161163

162-
1. Sign in to the [Azure Active Directory Admin Center](https://aad.portal.azure.com) with an account that's a global admin for the tenant directory.
164+
1. Sign in to the [Azure Active Directory Admin Center](https://aad.portal.azure.com) with an account that's a Global Administrator for the tenant directory.
163165

164166
![Opening azure AD admin center](./media/active-directory-assign-admin-roles-azure-portal/active-directory-admin-center.png)
165167

166168
2. Select **Users and groups &gt; All users**
167169

168-
3. Find the user you want to designate as a global administrator and open the blade for that user.
170+
3. Find the user you want to designate as a Global Administrator and open the blade for that user.
169171

170172
4. On the user blade, select **Directory role**.
171173

172-
5. On the directory role blade, select the **Global administrator** role, and save.
174+
5. On the directory role blade, select the **Global Administrator** role, and save.
173175

174176
## Deprecated roles
175177

articles/active-directory/active-directory-conditional-access-conditions.md

Lines changed: 9 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.devlang: na
1515
ms.topic: article
1616
ms.tgt_pltfrm: na
1717
ms.workload: identity
18-
ms.date: 05/22/2018
18+
ms.date: 06/01/2018
1919
ms.author: markvi
2020
ms.reviewer: calebb
2121

@@ -165,7 +165,7 @@ Common use cases for this condition are policies that:
165165

166166
In addition to using web SSO and modern authentication protocols, you can apply this condition to mail applications that use Exchange ActiveSync, like the native mail apps on most smartphones. Currently, client apps using legacy protocols need to be secured using AD FS.
167167

168-
You can only select this condition if **Office 365 Exchange Online is the only cloud app you have selected.
168+
You can only select this condition if **Office 365 Exchange Online** is the only cloud app you have selected.
169169

170170
![Cloud apps](./media/active-directory-conditional-access-conditions/32.png)
171171

@@ -188,26 +188,17 @@ Applying this condition only to supported platforms is the equivalent to all dev
188188

189189
### Legacy authentication
190190

191-
Conditional access now applies to older Office clients that do not support modern authentication as well as clients that use mail protocols like POP, IMAP, SMTP, etc. This allows you to configure policies like block access from other clients”.
191+
Conditional access now applies to older Office clients that do not support modern authentication as well as clients that use mail protocols like POP, IMAP, SMTP, etc. This allows you to configure policies like **block access from other clients**.
192192

193193

194-
#### How to get started
195-
196-
To enforce policies for legacy authentication flows, follow the steps below:
197-
1. Go to Conditional access and create a new policy.
198-
199-
2. Select the users and cloud apps and conditions as appropriate. We recommend testing the policy with a small set of users to understand the usage of “Other clients” in your organization.
200-
201-
3. Navigate to the client app condition and select "Other clients"
202-
203-
![Supported platforms](./media/active-directory-conditional-access-conditions/140.png)
194+
![Legacy authentication](./media/active-directory-conditional-access-conditions/160.png)
204195

205-
4. Select the access control you want to enforce for "Other clients". (Any control selection will lead to block access since the other clients are not able to enforce controls like MFA, device compliance, etc.).
196+
206197

207198

208199
#### Known issues
209200

210-
- Configuring policy for Other clients” will lead to blocking the entire organization from certain clients like SPConnect. This is due to these older clients authenticating in unexpected ways. This issue does not apply to the major Office applications like the older Office clients.
201+
- Configuring a policy for **Other clients** blocks the entire organization from certain clients like SPConnect. This is due to these older clients authenticating in unexpected ways. This issue does not apply to the major Office applications like the older Office clients.
211202

212203
- It can take up to 24 hours for the policy to take effect.
213204

@@ -219,11 +210,11 @@ Conditional access now applies to older Office clients that do not support moder
219210
It depends on the authentication protocol that EWS is using. If the EWS application is using modern authentication, it will be covered by the "Mobile apps and desktop clients" client app. If the EWS application is using basic authentication, it will be covered by the “Other clients” client app.
220211

221212

222-
**What controls can I use for "Other clients**
213+
**What controls can I use for Other clients**
223214

224215
Any control can be configured for "Other clients". However, the end user experience will be block access for all cases. "Other clients" do not support controls like MFA, compliant device, domain join, etc.
225216

226-
**What conditions can I use for "Other clients?"**
217+
**What conditions can I use for Other clients?**
227218

228219
Any conditions can be configured for "Other clients".
229220

@@ -241,7 +232,7 @@ No. Here is the summary of Exchange ActiveSync (EAS) support:
241232

242233
**Do the policies apply to all client apps by default going forward?**
243234

244-
No. There is no change in the default policy behavior. The policies will continue to apply to browser and mobile applications/desktop clients by default.
235+
No. There is no change in the default policy behavior. The policies continue to apply to browser and mobile applications/desktop clients by default.
245236

246237

247238

articles/active-directory/active-directory-conditional-access-policy-connected-applications.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -48,7 +48,7 @@ To get a device registered with Azure AD, you have three options:
4848

4949
- **[Azure AD registered devices](device-management-introduction.md#azure-ad-registered-devices)** - to get a personal device registered with Azure AD
5050

51-
- **[Azure AD joined devices](device-management-introduction.md#azure-ad-joined-devices)** - to get an organizational Windows 10 device that is not joined to an on-premises AD registered with Azure AD registered.
51+
- **[Azure AD joined devices](device-management-introduction.md#azure-ad-joined-devices)** - to get an organizational Windows 10 device that is not joined to an on-premises AD registered with Azure AD.
5252

5353
- **[Hybrid Azure AD joined devices](device-management-introduction.md#hybrid-azure-ad-joined-devices)** - to get a Windows 10 device that is joined to an on-premises AD registered with Azure AD.
5454

-1.72 KB
Loading
9.77 KB
Loading

articles/advisor/advisor-cost-recommendations.md

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -31,6 +31,11 @@ If you want to be more aggressive at identifying underutilized virtual machines,
3131
## Reduce costs by eliminating unprovisioned ExpressRoute circuits
3232
Advisor identifies ExpressRoute circuits that have been in the provider status of *Not Provisioned* for more than one month, and recommends deleting the circuit if you aren't planning to provision the circuit with your connectivity provider.
3333

34+
## Buy virtual machine reserved instances to save money over pay-as-you-go costs
35+
Advisor will review your virtual machine usage over the last 30 days and determine if you could save money by purchasing reserved instances. Advisor will show you the regions and sizes where you potentially have the most savings and will show you the estimated savings from purchasing reserved instances.
36+
37+
With reserved instances, you can pre-purchase the base costs for your virtual machines. Discounts will automatically apply to new or existing VMs that have the same size and region as your reserved instances. [Learn more about Azure Reserved VM Instances.](https://azure.microsoft.com/pricing/reserved-vm-instances/)
38+
3439
## How to access Cost recommendations in Azure Advisor
3540

3641
1. Sign in to the [Azure portal](https://portal.azure.com), and then open [Advisor](https://aka.ms/azureadvisordashboard).

articles/advisor/advisor-high-availability-recommendations.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -46,6 +46,9 @@ If your disks do not require high IOPS, you can limit costs by maintaining them
4646
## Protect your virtual machine data from accidental deletion
4747
Setting up virtual machine backup ensures the availability of your business-critical data and offers protection against accidental deletion or corruption. Advisor identifies virtual machines where backup is not enabled, and it recommends enabling backup.
4848

49+
## Ensure you have access to Azure cloud experts when you need it
50+
When running a business-critical workload, it's important to have access to technical support when needed. Advisor identifies potential business-critical subscriptions that do not have technical support included in their support plan and recommends upgrading to an option that includes technical support.
51+
4952
## How to access High Availability recommendations in Advisor
5053

5154
1. Sign in to the [Azure portal](https://portal.azure.com), and then open [Advisor](https://aka.ms/azureadvisordashboard).

articles/app-service/environment/app-service-high-density-hosting.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.workload: web
1313
ms.tgt_pltfrm: na
1414
ms.devlang: multiple
1515
ms.topic: article
16-
ms.date: 22/01/2018
16+
ms.date: 01/22/2018
1717
ms.author: byvinyal
1818

1919
---

0 commit comments

Comments
 (0)