Skip to content

Commit cddd4a6

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into heidist-qs
2 parents 07c6f86 + ca26c0c commit cddd4a6

File tree

512 files changed

+1384
-1187
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

512 files changed

+1384
-1187
lines changed

.openpublishing.redirection.azure-monitor.json

Lines changed: 78 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,65 @@
11
{
22
"redirections": [
3+
{
4+
"source_path_from_root": "/articles/azure-monitor/app/profiler.md",
5+
"redirect_url": "/azure/azure-monitor/profiler/profiler",
6+
"redirect_document_id": false
7+
},
8+
{
9+
"source_path_from_root": "/articles/azure-monitor/app/profiler-aspnetcore-linux.md",
10+
"redirect_url": "/azure/azure-monitor/profiler/profiler-aspnetcore-linux",
11+
"redirect_document_id": false
12+
},
13+
{
14+
"source_path_from_root": "/articles/azure-monitor/app/profiler-azure-functions.md",
15+
"redirect_url": "/azure/azure-monitor/profiler/profiler-azure-functions",
16+
"redirect_document_id": false
17+
},
18+
{
19+
"source_path_from_root": "/articles/azure-monitor/app/profiler-bring-your-own-storage.md",
20+
"redirect_url": "/azure/azure-monitor/profiler/profiler-bring-your-own-storage",
21+
"redirect_document_id": false
22+
},
23+
{
24+
"source_path_from_root": "/articles/azure-monitor/app/profiler-cloudservice.md",
25+
"redirect_url": "/azure/azure-monitor/profiler/profiler-cloudservice",
26+
"redirect_document_id": false
27+
},
28+
{
29+
"source_path_from_root": "/articles/azure-monitor/app/profiler-containers.md",
30+
"redirect_url": "/azure/azure-monitor/profiler/profiler-containers",
31+
"redirect_document_id": false
32+
},
33+
{
34+
"source_path_from_root": "/articles/azure-monitor/app/profiler-overview.md",
35+
"redirect_url": "/azure/azure-monitor/profiler/profiler-overview",
36+
"redirect_document_id": false
37+
},
38+
{
39+
"source_path_from_root": "/articles/azure-monitor/app/profiler-servicefabric.md",
40+
"redirect_url": "/azure/azure-monitor/profiler/profiler-servicefabric",
41+
"redirect_document_id": false
42+
},
43+
{
44+
"source_path_from_root": "/articles/azure-monitor/app/profiler-settings.md",
45+
"redirect_url": "/azure/azure-monitor/profiler/profiler-settings",
46+
"redirect_document_id": false
47+
},
48+
{
49+
"source_path_from_root": "/articles/azure-monitor/app/profiler-trackrequests.md",
50+
"redirect_url": "/azure/azure-monitor/profiler/profiler-trackrequests",
51+
"redirect_document_id": false
52+
},
53+
{
54+
"source_path_from_root": "/articles/azure-monitor/app/profiler-troubleshooting.md",
55+
"redirect_url": "/azure/azure-monitor/profiler/profiler-troubleshooting",
56+
"redirect_document_id": false
57+
},
58+
{
59+
"source_path_from_root": "/articles/azure-monitor/app/profiler-vm.md",
60+
"redirect_url": "/azure/azure-monitor/profiler/profiler-vm",
61+
"redirect_document_id": false
62+
},
363
{
464
"source_path_from_root": "/articles/azure-monitor/app/app-insights-dashboards.md",
565
"redirect_url": "/azure/azure-monitor/app/overview-dashboard",
@@ -102,22 +162,37 @@
102162
},
103163
{
104164
"source_path_from_root": "/articles/azure-monitor/alerts/alerts-metric-overview.md" ,
105-
"redirect_url": "/azure/azure-monitor/alerts/alert-types.md",
165+
"redirect_url": "/azure/azure-monitor/alerts/alerts-types",
106166
"redirect_document_id": false
107167
},
108168
{
109169
"source_path_from_root": "/articles/azure-monitor/alerts/alerts-managing-alert-instances.md" ,
110170
"redirect_url": "/azure/azure-monitor/alerts/alerts-page.md",
111171
"redirect_document_id": false
112172
},
173+
{
174+
"source_path_from_root": "/articles/azure-monitor/alerts/alerts-managing-alert-states.md" ,
175+
"redirect_url": "/azure/azure-monitor/alerts/alerts-page",
176+
"redirect_document_id": false
177+
},
113178
{
114179
"source_path_from_root": "/articles/azure-monitor/alerts/alerts-unified-log.md" ,
115-
"redirect_url": "/azure/azure-monitor/alerts/alert-types.md",
180+
"redirect_url": "/azure/azure-monitor/alerts/alerts-types",
116181
"redirect_document_id": false
117182
},
118183
{
119184
"source_path_from_root": "/articles/azure-monitor/alerts/activity-log-alerts.md" ,
120-
"redirect_url": "/azure/azure-monitor/alerts/alert-types.md",
185+
"redirect_url": "/azure/azure-monitor/alerts/alerts-types",
186+
"redirect_document_id": false
187+
},
188+
{
189+
"source_path_from_root": "/articles/azure-monitor/alerts/alerts-smartgroups-overview.md" ,
190+
"redirect_url": "/azure/azure-monitor/alerts/alerts-types",
191+
"redirect_document_id": false
192+
},
193+
{
194+
"source_path_from_root": "/articles/azure-monitor/alerts/alerts-managing-smart-groups.md" ,
195+
"redirect_url": "/azure/azure-monitor/alerts/alerts-types",
121196
"redirect_document_id": false
122197
},
123198
{

.openpublishing.redirection.json

Lines changed: 18 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -43186,92 +43186,92 @@
4318643186
},
4318743187
{
4318843188
"source_path_from_root": "/articles/cognitive-services/video-indexer/connect-to-azure.md",
43189-
"redirect_url": "/azure/azure-video-analyzer/video-analyzer-for-media-docs/connect-to-azure",
43189+
"redirect_url": "/azure/azure-video-indexer/connect-to-azure",
4319043190
"redirect_document_id": false
4319143191
},
4319243192
{
4319343193
"source_path_from_root": "/articles/cognitive-services/video-indexer/manage-account-connected-to-azure.md",
43194-
"redirect_url": "/azure/azure-video-analyzer/video-analyzer-for-media-docs/manage-account-connected-to-azure",
43194+
"redirect_url": "/azure/azure-video-indexer/manage-account-connected-to-azure",
4319543195
"redirect_document_id": false
4319643196
},
4319743197
{
4319843198
"source_path_from_root": "/articles/cognitive-services/video-indexer/migrate-from-v1-to-v2.md",
43199-
"redirect_url": "/azure/azure-video-analyzer/video-analyzer-for-media-docs/",
43199+
"redirect_url": "/azure/azure-video-indexer/",
4320043200
"redirect_document_id": false
4320143201
},
4320243202
{
4320343203
"source_path_from_root": "/articles/cognitive-services/video-indexer/upload-index-videos.md",
43204-
"redirect_url": "/azure/azure-video-analyzer/video-analyzer-for-media-docs/upload-index-videos",
43204+
"redirect_url": "/azure/azure-video-indexer/upload-index-videos",
4320543205
"redirect_document_id": false
4320643206
},
4320743207
{
4320843208
"source_path_from_root": "/articles/cognitive-services/video-indexer/video-indexer-concepts.md",
43209-
"redirect_url": "/azure/azure-video-analyzer/video-analyzer-for-media-docs/video-indexer-overview",
43209+
"redirect_url": "/azure/azure-video-indexer/video-indexer-overview",
4321043210
"redirect_document_id": false
4321143211
},
4321243212
{
4321343213
"source_path_from_root": "/articles/cognitive-services/video-indexer/video-indexer-create-new.md",
43214-
"redirect_url": "/azure/azure-video-analyzer/video-analyzer-for-media-docs/",
43214+
"redirect_url": "/azure/azure-video-indexer/",
4321543215
"redirect_document_id": false
4321643216
},
4321743217
{
4321843218
"source_path_from_root": "/articles/cognitive-services/video-indexer/video-indexer-embed-widgets.md",
43219-
"redirect_url": "/azure/azure-video-analyzer/video-analyzer-for-media-docs/video-indexer-embed-widgets",
43219+
"redirect_url": "/azure/azure-video-indexer/video-indexer-embed-widgets",
4322043220
"redirect_document_id": false
4322143221
},
4322243222
{
4322343223
"source_path_from_root": "/articles/cognitive-services/video-indexer/video-indexer-get-started.md",
43224-
"redirect_url": "/azure/azure-video-analyzer/video-analyzer-for-media-docs/video-indexer-get-started",
43224+
"redirect_url": "/azure/azure-video-indexer/video-indexer-get-started",
4322543225
"redirect_document_id": false
4322643226
},
4322743227
{
4322843228
"source_path_from_root": "/articles/cognitive-services/video-indexer/video-indexer-output-json-v2.md",
43229-
"redirect_url": "/azure/azure-video-analyzer/video-analyzer-for-media-docs/video-indexer-output-json-v2",
43229+
"redirect_url": "/azure/azure-video-indexer/video-indexer-output-json-v2",
4323043230
"redirect_document_id": false
4323143231
},
4323243232
{
4323343233
"source_path_from_root": "/articles/cognitive-services/Video/GetStarted.md",
43234-
"redirect_url": "/azure/azure-video-analyzer/video-analyzer-for-media-docs/video-indexer-overview",
43234+
"redirect_url": "/azure/azure-video-indexer/video-indexer-overview",
4323543235
"redirect_document_id": false
4323643236
},
4323743237
{
4323843238
"source_path_from_root": "/articles/cognitive-services/Video/Glossary.md",
43239-
"redirect_url": "/azure/azure-video-analyzer/video-analyzer-for-media-docs/video-indexer-overview",
43239+
"redirect_url": "/azure/azure-video-indexer/video-indexer-overview",
4324043240
"redirect_document_id": false
4324143241
},
4324243242
{
4324343243
"source_path_from_root": "/articles/cognitive-services/Video/Home.md",
43244-
"redirect_url": "/azure/azure-video-analyzer/video-analyzer-for-media-docs/video-indexer-overview",
43244+
"redirect_url": "/azure/azure-video-indexer/video-indexer-overview",
4324543245
"redirect_document_id": false
4324643246
},
4324743247
{
4324843248
"source_path_from_root": "/articles/cognitive-services/Video/How-To/HowtoAnalyzeVideo_Video.md",
43249-
"redirect_url": "/azure/azure-video-analyzer/video-analyzer-for-media-docs/video-indexer-overview",
43249+
"redirect_url": "/azure/azure-video-indexer/video-indexer-overview",
4325043250
"redirect_document_id": false
4325143251
},
4325243252
{
4325343253
"source_path_from_root": "/articles/cognitive-services/Video/How-To/HowtoCallVideoAPIs.md",
43254-
"redirect_url": "/azure/azure-video-analyzer/video-analyzer-for-media-docs/video-indexer-overview",
43254+
"redirect_url": "/azure/azure-video-indexer/video-indexer-overview",
4325543255
"redirect_document_id": false
4325643256
},
4325743257
{
4325843258
"source_path_from_root": "/articles/cognitive-services/video-indexer/video-indexer-overview.md",
43259-
"redirect_url": "/azure/azure-video-analyzer/video-analyzer-for-media-docs/video-indexer-overview",
43259+
"redirect_url": "/azure/azure-video-indexer/video-indexer-overview",
4326043260
"redirect_document_id": false
4326143261
},
4326243262
{
4326343263
"source_path_from_root": "/articles/cognitive-services/video-indexer/video-indexer-search.md",
43264-
"redirect_url": "/azure/azure-video-analyzer/video-analyzer-for-media-docs/video-indexer-search",
43264+
"redirect_url": "/azure/azure-video-indexer/video-indexer-search",
4326543265
"redirect_document_id": false
4326643266
},
4326743267
{
4326843268
"source_path_from_root": "/articles/cognitive-services/video-indexer/video-indexer-use-apis.md",
43269-
"redirect_url": "/azure/azure-video-analyzer/video-analyzer-for-media-docs/video-indexer-use-apis",
43269+
"redirect_url": "/azure/azure-video-indexer/video-indexer-use-apis",
4327043270
"redirect_document_id": false
4327143271
},
4327243272
{
4327343273
"source_path_from_root": "/articles/cognitive-services/video-indexer/video-indexer-view-edit.md",
43274-
"redirect_url": "/azure/azure-video-analyzer/video-analyzer-for-media-docs/video-indexer-view-edit",
43274+
"redirect_url": "/azure/azure-video-indexer/video-indexer-view-edit",
4327543275
"redirect_document_id": false
4327643276
},
4327743277
{

articles/active-directory/authentication/howto-mfa-nps-extension-advanced.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: multi-factor-authentication
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: how-to
9-
ms.date: 07/11/2018
9+
ms.date: 06/01/2022
1010

1111
ms.author: justinha
1212
author: justinha
@@ -23,13 +23,13 @@ The Network Policy Server (NPS) extension extends your cloud-based Azure AD Mult
2323

2424
Since the NPS extension connects to both your on-premises and cloud directories, you might encounter an issue where your on-premises user principal names (UPNs) don't match the names in the cloud. To solve this problem, use alternate login IDs.
2525

26-
Within the NPS extension, you can designate an Active Directory attribute to be used in place of the UPN for Azure AD Multi-Factor Authentication. This enables you to protect your on-premises resources with two-step verification without modifying your on-premises UPNs.
26+
Within the NPS extension, you can designate an Active Directory attribute to be used as the UPN for Azure AD Multi-Factor Authentication. This enables you to protect your on-premises resources with two-step verification without modifying your on-premises UPNs.
2727

2828
To configure alternate login IDs, go to `HKLM\SOFTWARE\Microsoft\AzureMfa` and edit the following registry values:
2929

3030
| Name | Type | Default value | Description |
3131
| ---- | ---- | ------------- | ----------- |
32-
| LDAP_ALTERNATE_LOGINID_ATTRIBUTE | string | Empty | Designate the name of Active Directory attribute that you want to use instead of the UPN. This attribute is used as the AlternateLoginId attribute. If this registry value is set to a [valid Active Directory attribute](/windows/win32/adschema/attributes-all) (for example, mail or displayName), then the attribute's value is used in place of the user's UPN for authentication. If this registry value is empty or not configured, then AlternateLoginId is disabled and the user's UPN is used for authentication. |
32+
| LDAP_ALTERNATE_LOGINID_ATTRIBUTE | string | Empty | Designate the name of Active Directory attribute that you want to use as the UPN. This attribute is used as the AlternateLoginId attribute. If this registry value is set to a [valid Active Directory attribute](/windows/win32/adschema/attributes-all) (for example, mail or displayName), then the attribute's value is used as the user's UPN for authentication. If this registry value is empty or not configured, then AlternateLoginId is disabled and the user's UPN is used for authentication. |
3333
| LDAP_FORCE_GLOBAL_CATALOG | boolean | False | Use this flag to force the use of Global Catalog for LDAP searches when looking up AlternateLoginId. Configure a domain controller as a Global Catalog, add the AlternateLoginId attribute to the Global Catalog, and then enable this flag. <br><br> If LDAP_LOOKUP_FORESTS is configured (not empty), **this flag is enforced as true**, regardless of the value of the registry setting. In this case, the NPS extension requires the Global Catalog to be configured with the AlternateLoginId attribute for each forest. |
3434
| LDAP_LOOKUP_FORESTS | string | Empty | Provide a semi-colon separated list of forests to search. For example, *contoso.com;foobar.com*. If this registry value is configured, the NPS extension iteratively searches all the forests in the order in which they were listed, and returns the first successful AlternateLoginId value. If this registry value is not configured, the AlternateLoginId lookup is confined to the current domain.|
3535

articles/active-directory/authentication/howto-mfa-userstates.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: multi-factor-authentication
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: how-to
9-
ms.date: 07/22/2021
9+
ms.date: 06/01/2022
1010

1111
ms.author: justinha
1212
author: justinha
@@ -54,9 +54,9 @@ All users start out *Disabled*. When you enroll users in per-user Azure AD Multi
5454
To view and manage user states, complete the following steps to access the Azure portal page:
5555

5656
1. Sign in to the [Azure portal](https://portal.azure.com) as a Global administrator.
57-
1. Search for and select *Azure Active Directory*, then select **Users** > **All users**.
58-
1. Select **Per-user MFA**. You may need to scroll to the right to see this menu option. Select the example screenshot below to see the full Azure portal window and menu location:
59-
[![Select Multi-Factor Authentication from the Users window in Azure AD.](media/howto-mfa-userstates/selectmfa-cropped.png)](media/howto-mfa-userstates/selectmfa.png#lightbox)
57+
1. Search for and select **Azure Active Directory**, then select **Users** > **All users**.
58+
1. Select **Per-user MFA**.
59+
:::image type="content" border="true" source="media/howto-mfa-userstates/selectmfa-cropped.png" alt-text="Screenshot of select Multi-Factor Authentication from the Users window in Azure AD.":::
6060
1. A new page opens that displays the user state, as shown in the following example.
6161
![Screenshot that shows example user state information for Azure AD Multi-Factor Authentication](./media/howto-mfa-userstates/userstate1.png)
6262

9.19 KB
Loading

articles/active-directory/conditional-access/block-legacy-authentication.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ manager: karenhoran
1111
ms.reviewer: calebb, dawoo, jebeckha, grtaylor
1212
ms.collection: M365-identity-device-management
1313
---
14-
# How to: Block legacy authentication to Azure AD with Conditional Access
14+
# How to: Block legacy authentication access to Azure AD with Conditional Access
1515

1616
To give your users easy access to your cloud apps, Azure Active Directory (Azure AD) supports a broad variety of authentication protocols including legacy authentication. However, legacy authentication doesn't support multifactor authentication (MFA). MFA is in many environments a common requirement to address identity theft.
1717

articles/active-directory/conditional-access/concept-condition-filters-for-devices.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -145,7 +145,8 @@ The filter for devices condition in Conditional Access evaluates policy based on
145145

146146
## Next steps
147147

148+
- [Back to school – Using Boolean algebra correctly in complex filters](https://techcommunity.microsoft.com/t5/intune-customer-success/back-to-school-using-boolean-algebra-correctly-in-complex/ba-p/3422765)
148149
- [Update device Graph API](/graph/api/device-update?tabs=http)
149150
- [Conditional Access: Conditions](concept-conditional-access-conditions.md)
150151
- [Common Conditional Access policies](concept-conditional-access-policy-common.md)
151-
- [Securing devices as part of the privileged access story](/security/compass/privileged-access-devices)
152+
- [Securing devices as part of the privileged access story](/security/compass/privileged-access-devices)

0 commit comments

Comments
 (0)