Skip to content

Commit d0e18c9

Browse files
committed
Merging changes synced from https://github.com/MicrosoftDocs/azure-docs-pr (branch live)
2 parents 7f650fa + 557ed4e commit d0e18c9

File tree

158 files changed

+1105
-1109
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

158 files changed

+1105
-1109
lines changed

articles/active-directory/app-proxy/application-proxy-integrate-with-remote-desktop-services.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -56,6 +56,7 @@ After setting up RDS and Azure AD Application Proxy for your environment, follow
5656
- External URL: This field is automatically populated based on the name of the application, but you can modify it. Your users will go to this URL when they access RDS.
5757
- Preauthentication method: Azure Active Directory
5858
- Translate URL headers: No
59+
- Use HTTP-Only Cookie: No
5960
2. Assign users to the published RD application. Make sure they all have access to RDS, too.
6061
3. Leave the single sign-on method for the application as **Azure AD single sign-on disabled**.
6162

articles/active-directory/conditional-access/concept-condition-filters-for-devices.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -119,7 +119,7 @@ The following device attributes can be used with filters for devices condition i
119119
| model | Equals, NotEquals, StartsWith, NotStartsWith, EndsWith, NotEndsWith, Contains, NotContains, In, NotIn | Any string | (device.model -notContains “Surface”) |
120120
| operatingSystem | Equals, NotEquals, StartsWith, NotStartsWith, EndsWith, NotEndsWith, Contains, NotContains, In, NotIn | A valid operating system (like Windows, iOS, or Android) | (device.operatingSystem -eq “Windows”) |
121121
| operatingSystemVersion | Equals, NotEquals, StartsWith, NotStartsWith, EndsWith, NotEndsWith, Contains, NotContains, In, NotIn | A valid operating system version (like 6.1 for Windows 7, 6.2 for Windows 8, or 10.0 for Windows 10) | (device.operatingSystemVersion -in [“10.0.18363”, “10.0.19041”, “10.0.19042”]) |
122-
| pyhsicalIds | Contains, NotContains | As an example all Windows Autopilot devices store ZTDId (a unique value assigned to all imported Windows Autopilot devices) in device physicalIds property. | (device.devicePhysicalIDs -contains "[ZTDId]") |
122+
| physicalIds | Contains, NotContains | As an example all Windows Autopilot devices store ZTDId (a unique value assigned to all imported Windows Autopilot devices) in device physicalIds property. | (device.devicePhysicalIDs -contains "[ZTDId]") |
123123
| profileType | Equals, NotEquals | A valid profile type set for a device. Supported values are: RegisteredDevice (default), SecureVM (used for Windows VMs in Azure enabled with Azure AD sign in.), Printer (used for printers), Shared (used for shared devices), IoT (used for IoT devices) | (device.profileType -notIn [“Printer”, “Shared”, “IoT”] |
124124
| systemLabels | Contains, NotContains | List of labels applied to the device by the system. Some of the supported values are: AzureResource (used for Windows VMs in Azure enabled with Azure AD sign in), M365Managed (used for devices managed using Microsoft Managed Desktop), MultiUser (used for shared devices) | (device.systemLabels -contains "M365Managed") |
125125
| trustType | Equals, NotEquals | A valid registered state for devices. Supported values are: AzureAD (used for Azure AD joined devices), ServerAD (used for Hybrid Azure AD joined devices), Workplace (used for Azure AD registered devices) | (device.trustType -notIn ‘ServerAD, Workplace’) |

articles/active-directory/devices/enterprise-state-roaming-enable.md

Lines changed: 2 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -55,13 +55,8 @@ Follow these steps to view a per-user device sync status report.
5555
1. Sign in to [Azure AD admin center](https://aad.portal.azure.com/).
5656
1. Select **Azure Active Directory** > **Users** > **All users**.
5757
1. Select the user, and then select **Devices**.
58-
1. Under **Show**, select **Devices syncing settings and app data** to show sync status.
59-
60-
![image of device sync data setting](./media/enterprise-state-roaming-enable/sync-status.png)
61-
62-
1. If there are devices syncing for this user, you see the devices as shown here.
63-
64-
![image of device sync columnar data](./media/enterprise-state-roaming-enable/device-status-row.png)
58+
1. Select **View devices syncing settings and app data** to show sync status.
59+
1. Devices syncing for the user are shown and can be downloaded.
6560

6661
## Data retention
6762

articles/active-directory/privileged-identity-management/pim-how-to-change-default-settings.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ ms.collection: M365-identity-device-management
1818
---
1919
# Configure Azure AD role settings in Privileged Identity Management
2020

21-
A privileged role administrator can customize Privileged Identity Management (PIM) in their Azure Active Directory (Azure AD) organization, including changing the experience for a user who is activating an eligible role assignment.
21+
A privileged role administrator can customize Privileged Identity Management (PIM) in their Azure Active Directory (Azure AD) organization, including changing the experience for a user who is activating an eligible role assignment. For information on the PIM events that trigger notifications and which administrators receive them, see [Email notifications in Privileged Identity Management](pim-email-notifications.md#notifications-for-azure-ad-roles)
2222

2323
## Open role settings
2424

0 commit comments

Comments
 (0)