Skip to content

Commit ca99be0

Browse files
authored
Merge pull request #210211 from MicrosoftDocs/main
Publish to live, Tuesday 4 AM PST, 9/6
2 parents 3d86970 + 0315829 commit ca99be0

File tree

19 files changed

+148
-45
lines changed

19 files changed

+148
-45
lines changed

articles/active-directory/hybrid/how-to-connect-fed-group-claims.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -163,7 +163,9 @@ For more information about regex replace and capture groups, see [The Regular Ex
163163
>[!NOTE]
164164
> As described in the Azure AD documentation, you can't modify a restricted claim by using a policy. The data source can't be changed, and no transformation is applied when you're generating these claims. The group claim is still a restricted claim, so you need to customize the groups by changing the name. If you select a restricted name for the name of your custom group claim, the claim will be ignored at runtime.
165165
>
166-
> You can also use the regex transform feature as a filter, because any groups that don't match the regex pattern will not be emitted in the resulting claim.
166+
> You can also use the regex transform feature as a filter, because any groups that don't match the regex pattern will not be emitted in the resulting claim.
167+
>
168+
>If the transform applied to the original groups claim results in a new custom claim, then the original groups claim will be omitted from the token. However, if the configured regex doesn't match any value in the original list, then the custom claim will not be present and the original groups claim will be included in the token.
167169
168170
### Edit the group claim configuration
169171

articles/active-directory/saas-apps/saml-toolkit-tutorial.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -161,4 +161,4 @@ In this section, you test your Azure AD single sign-on configuration with follow
161161

162162
## Next steps
163163

164-
Once you configure Azure AD SAML Toolkit you can enforce session control, which protects exfiltration and infiltration of your organization’s sensitive data in real time. Session control extends from Conditional Access. [Learn how to enforce session control with Microsoft Cloud App Security](/cloud-app-security/proxy-deployment-aad).
164+
Once you configure Azure AD SAML Toolkit you can enforce session control, which protects exfiltration and infiltration of your organization’s sensitive data in real time. Session control extends from Conditional Access. [Learn how to enforce session control with Microsoft Defender for Cloud Apps](/cloud-app-security/proxy-deployment-aad).

articles/azure-monitor/profiler/profiler-azure-functions.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ In this article, you'll use the Azure portal to:
1717
> [!NOTE]
1818
> You can enable the Application Insights Profiler for Azure Functions apps on the **App Service** plan.
1919
20-
## Pre-requisites
20+
## Prerequisites
2121

2222
- [An Azure Functions app](../../azure-functions/functions-create-function-app-portal.md). Verify your Functions app is on the **App Service** plan.
2323

articles/azure-resource-manager/bicep/learn-bicep.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,14 +2,14 @@
22
title: Learn modules for Bicep
33
description: Provides an overview of the Learn modules for Bicep.
44
ms.topic: conceptual
5-
ms.date: 12/03/2021
5+
ms.date: 09/05/2022
66
---
77
# Learn modules for Bicep
88

99
Ready to see how Bicep can help simplify and accelerate your deployments to Azure? Check out the many hands-on courses.
1010

1111
> [!TIP]
12-
> Want to learn Bicep live from subject matter experts? [Learn Live with our experts every Tuesday (Pacific time) beginning March 8, 2022.](/events/learntv/learnlive-iac-and-bicep/)
12+
> Want to learn Bicep live from subject matter experts? [Follow on-demand Learn Live sessions with our experts.](/events/learntv/learnlive-iac-and-bicep/)
1313
1414
## Get started
1515

articles/container-apps/ingress.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -47,7 +47,7 @@ The following settings are available when configuring ingress:
4747

4848
| Property | Description | Values | Required |
4949
|---|---|---|---|
50-
| `external` | When enabled, the environment is assigned a public IP and fully qualified domain name (FQDN) for external ingress and an internal IP and FQDN for internal ingress. When disabled, only an internal IP/FQDN is created. |`true` for external visibility, `false` for internal visibility (default) | Yes |
50+
| `external` | Your ingress IP and app fully qualified domain name (FQDN) can either be visible externally from the internet, or internally from a VNET depending on whether the app environment has an external or internal endpoint, respectively - or visibility from within the app environment only. |`true` for visibility from internet or VNET, depending on app environment endpoint is configured, `false` for visibility within app environment only. (default) | Yes |
5151
| `targetPort` | The port your container listens to for incoming requests. | Set this value to the port number that your container uses. Your application ingress endpoint is always exposed on port `443`. | Yes |
5252
| `transport` | You can use either HTTP/1.1 or HTTP/2, or you can set it to automatically detect the transport type. | `http` for HTTP/1, `http2` for HTTP/2, `auto` to automatically detect the transport type (default) | No |
5353
| `allowInsecure` | Allows insecure traffic to your container app. | `false` (default), `true`<br><br>If set to `true`, HTTP requests to port 80 aren't automatically redirected to port 443 using HTTPS, allowing insecure connections. | No |

articles/data-factory/connector-dynamics-crm-office-365.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.topic: conceptual
88
ms.author: jianleishen
99
author: jianleishen
1010
ms.custom: synapse
11-
ms.date: 08/19/2022
11+
ms.date: 09/05/2022
1212
---
1313
# Copy and transform data in Dynamics 365 (Microsoft Dataverse) or Dynamics CRM using Azure Data Factory or Azure Synapse Analytics
1414

@@ -530,7 +530,7 @@ To write data into a lookup field using alternate key columns, follow this guida
530530
:::image type="content" source="./media/connector-dynamics-crm-office-365/connector-dynamics-lookup-field-column-mapping-alternate-key-2.png" alt-text="Screenshot shows mapping columns to lookup fields via alternate keys step 2.":::
531531

532532
> [!Note]
533-
> Currently this is only supported in mapping data flows.
533+
> Currently this is only supported when you use inline mode in the sink transformation of mapping data flows.
534534
535535
## Mapping data flow properties
536536

articles/defender-for-iot/organizations/getting-started.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -98,7 +98,8 @@ This procedure describes how to add a Defender for IoT plan for OT networks to a
9898

9999
1. Select the **I accept the terms** option, and then select **Save**.
100100

101-
Your OT networks plan will be shown under the associated subscription in the **Plans** grid.
101+
Your OT networks plan will be shown under the associated subscription in the **Plans** grid. For more information, see [Manage your subscriptions](how-to-manage-subscriptions.md).
102+
102103

103104
## Add a Defender for IoT plan for Enterprise IoT networks to an Azure subscription
104105

@@ -119,3 +120,4 @@ For more information, see:
119120

120121
- [Welcome to Microsoft Defender for IoT for organizations](overview.md)
121122
- [Microsoft Defender for IoT architecture](architecture.md)
123+
- [Move existing sensors to a different subscription](how-to-manage-subscriptions.md#move-existing-sensors-to-a-different-subscription)

articles/defender-for-iot/organizations/how-to-create-and-manage-users.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ This article describes how to create and manage users of sensors and the on-prem
1111

1212
Features are also available to track user activity and enable Active Directory sign in.
1313

14-
By default, each sensor and on-premises management console is installed with a *cyberx, support* and *cyberx_host* user. These users have access to advanced tools for troubleshooting and setup. Administrator users should sign in with these user credentials, create an admin user, and then create extra users for security analysts and read-only users.
14+
By default, each sensor and on-premises management console is installed with the *cyberx* and *support* users. Sensors are also installed with the *cyberx_host* user. These users have access to advanced tools for troubleshooting and setup. Administrator users should sign in with these user credentials, create an admin user, and then create extra users for security analysts and read-only users.
1515

1616
## Role-based permissions
1717
The following user roles are available:

articles/defender-for-iot/organizations/how-to-manage-subscriptions.md

Lines changed: 24 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -55,18 +55,38 @@ When onboarding or editing your Defender for IoT plan, you'll need to know how m
5555

5656
[!INCLUDE [devices-inventoried](includes/devices-inventoried.md)]
5757

58-
**To calculate the number of devices you need to monitor**:
58+
#### Calculate the number of devices you need to monitor
5959

6060
We recommend making an initial estimate of your committed devices when onboarding your Defender for IoT plan.
6161

62-
1. Collect the total number of devices in your network.
62+
**For OT devices**:
6363

64-
1. Remove any devices that are *not* considered as committed devices by Defender for IoT.
64+
1. Collect the total number of devices at each site in your network, and add them together.
6565

66-
If you are also a Defender for Endpoint customer, you can identify devices managed by Defender for Endpoint in the Defender for Endpoint **Device inventory** page. In the **Endpoints** tab, filter for devices by **Onboarding status**. For more information, see [Defender for Endpoint Device discovery overview](/microsoft-365/security/defender-endpoint/device-discovery).
66+
1. Remove any devices that are [*not* considered as committed devices by Defender for IoT](#defender-for-iot-committed-devices).
6767

6868
After you've set up your network sensor and have full visibility into all devices, you can [Edit a plan](#edit-a-plan-for-ot-networks) to update the number of committed devices as needed.
6969

70+
**For Enterprise IoT devices**:
71+
72+
In the **Device inventory** page in the **Defender for Endpoint** portal:
73+
74+
1. Add the total number of discovered **network devices** with the total number of discovered **IoT devices**.
75+
76+
For example:
77+
78+
:::image type="content" source="media/how-to-manage-subscriptions/eiot-calculate-devices.png" alt-text="Screenshot of network device and IoT devices in the device inventory in Microsoft Defender for Endpoint.":::
79+
80+
For more information, see the [Defender for Endpoint Device discovery overview](/microsoft-365/security/defender-endpoint/device-discovery).
81+
82+
1. Remove any devices that are [*not* considered as committed devices by Defender for IoT](#defender-for-iot-committed-devices).
83+
84+
1. Round up your total to a multiple of 100.
85+
86+
For example: In the device inventory, you have 473 network devices and 1206 IoT devices. Added together the total is 1679 devices, and rounded up to a multiple of 100 is 1700. Use 1700 as the estimated number of committed devices.
87+
88+
To edit the number of committed Enterprise IoT devices after you've onboarded a plan, you will need to cancel the plan and onboard a new plan in Defender for Endpoint. For more information, see the [Defender for Endpoint documentation](/microsoft-365/security/defender-endpoint/enable-microsoft-defender-for-iot-integration).
89+
7090
## Onboard a Defender for IoT plan for OT networks
7191

7292
This procedure describes how to add a Defender for IoT plan for OT networks to an Azure subscription.
21.7 KB
Loading

0 commit comments

Comments
 (0)