Skip to content

Commit d2a18c5

Browse files
Learn Build Service GitHub AppLearn Build Service GitHub App
authored andcommitted
Merging changes synced from https://github.com/MicrosoftDocs/azure-docs-pr (branch live)
2 parents f7466cb + f303a7d commit d2a18c5

File tree

64 files changed

+816
-527
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

64 files changed

+816
-527
lines changed

articles/active-directory/devices/manage-device-identities.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -118,6 +118,8 @@ In this preview, you have the ability to infinitely scroll, reorder columns, and
118118
- Join type (Azure AD joined, Hybrid Azure AD joined, Azure AD registered)
119119
- Activity timestamp
120120
- OS Type and Version
121+
- Windows is displayed for Windows 11 and Windows 10 devices (with KB5006738).
122+
- Windows Server is displayed for [supported versions managed with Microsoft Defender for Endpoint](/mem/intune/protect/mde-security-integration#supported-platforms).
121123
- Device type (printer, secure VM, shared device, registered device)
122124
- MDM
123125
- Autopilot

articles/active-directory/enterprise-users/domains-verify-custom-subdomain.md

Lines changed: 9 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ ms.collection: M365-identity-device-management
2222

2323
After a root domain is added to Azure Active Directory (Azure AD), part of Microsoft Entra, all subsequent subdomains added to that root in your Azure AD organization automatically inherit the authentication setting from the root domain. However, if you want to manage domain authentication settings independently from the root domain settings, you can now with the Microsoft Graph API. For example, if you have a federated root domain such as contoso.com, this article can help you verify a subdomain such as child.contoso.com as managed instead of federated.
2424

25-
In the Azure portal, when the parent domain is federated and the admin tries to verify a managed subdomain on the **Custom domain names** page, you'll get a 'Failed to add domain' error with the reason "One or more properties contains invalid values." If you try to add this subdomain from the Microsoft 365 admin center, you will receive a similar error. For more information about the error, see [A child domain doesn't inherit parent domain changes in Office 365, Azure, or Intune](/office365/troubleshoot/administration/child-domain-fails-inherit-parent-domain-changes).
25+
In the Azure portal, when the parent domain is federated and the admin tries to verify a managed subdomain on the **Custom domain names** page, you'll get a 'Failed to add domain' error with the reason "One or more properties contains invalid values." If you try to add this subdomain from the Microsoft 365 admin center, you'll receive a similar error. For more information about the error, see [A child domain doesn't inherit parent domain changes in Office 365, Azure, or Intune](/office365/troubleshoot/administration/child-domain-fails-inherit-parent-domain-changes).
2626

2727
Because subdomains inherit the authentication type of the root domain by default, you must promote the subdomain to a root domain in Azure AD using the Microsoft Graph so you can set the authentication type to your desired type.
2828

@@ -31,6 +31,11 @@ Because subdomains inherit the authentication type of the root domain by default
3131
1. Use PowerShell to add the new subdomain, which has its root domain's default authentication type. The Azure AD and Microsoft 365 admin centers don't yet support this operation.
3232

3333
```powershell
34+
Connect-MgGraph -Scopes "Domain.ReadWrite.All"
35+
$param = @{
36+
id="test.contoso.com"
37+
AuthenticationType="Federated"
38+
}
3439
New-MsolDomain -Name "child.mydomain.com" -Authentication Federated
3540
```
3641

@@ -73,16 +78,16 @@ POST https://graph.microsoft.com/v1.0/{tenant-id}/domains/foo.contoso.com/promot
7378

7479
Scenario | Method | Code | Message
7580
-------- | ------ | ---- | -------
76-
Invoking API with a subdomain whose parent domain is unverified | POST | 400 | Unverified domains cannot be promoted. Please verify the domain before promotion.
77-
Invoking API with a federated verified subdomain with user references | POST | 400 | Promoting a subdomain with user references is not allowed. Please migrate the users to the current root domain before promotion of the subdomain.
81+
Invoking API with a subdomain whose parent domain is unverified | POST | 400 | Unverified domains can't be promoted. Please verify the domain before promotion.
82+
Invoking API with a federated verified subdomain with user references | POST | 400 | Promoting a subdomain with user references isn't allowed. Please migrate the users to the current root domain before promotion of the subdomain.
7883

7984

8085
### Change the subdomain authentication type
8186

8287
1. Use the following command to change the subdomain authentication type:
8388

8489
```powershell
85-
Set-MsolDomainAuthentication -DomainName child.mydomain.com -Authentication Managed
90+
Update-MgDomain -DomainId "test.contoso.com" -BodyParameter @{AuthenticationType="Managed"}
8691
```
8792

8893
1. Verify via GET in Microsoft Graph API that subdomain authentication type is now managed:

articles/active-directory/enterprise-users/groups-restore-deleted.md

Lines changed: 18 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -16,17 +16,17 @@ ms.collection: M365-identity-device-management
1616
---
1717
# Restore a deleted Microsoft 365 group in Azure Active Directory
1818

19-
When you delete a Microsoft 365 group in Azure Active Directory (Azure AD), part of Microsoft Entra, the deleted group is retained but not visible for 30 days from the deletion date. This behavior is so that the group and its contents can be restored if needed. This functionality is restricted exclusively to Microsoft 365 groups in Azure AD. It is not available for security groups and distribution groups. Please note that the 30-day group restoration period is not customizable.
19+
When you delete a Microsoft 365 group in Azure Active Directory (Azure AD), part of Microsoft Entra, the deleted group is retained but not visible for 30 days from the deletion date. This behavior is so that the group and its contents can be restored if needed. This functionality is restricted exclusively to Microsoft 365 groups in Azure AD. It isn't available for security groups and distribution groups. Please note that the 30-day group restoration period isn't customizable.
2020

2121
> [!NOTE]
22-
> Don't use `Remove-MsolGroup` because it purges the group permanently. Always use `Remove-AzureADMSGroup` to delete a Microsoft 365 group.
22+
> Don't use `Remove-MsolGroup` because it purges the group permanently. Always use `Remove-MgBetaGroup` to delete a Microsoft 365 group.
2323
2424
The permissions required to restore a group can be any of the following:
2525

2626
Role | Permissions
2727
--------- | ---------
28-
Global administrator, Group administrator, Partner Tier2 support, and Intune administrator | Can restore any deleted Microsoft 365 group
29-
User administrator and Partner Tier1 support | Can restore any deleted Microsoft 365 group except those groups assigned to the Global Administrator role
28+
Global administrator, Group administrator, Partner Tier 2 support, and Intune administrator | Can restore any deleted Microsoft 365 group
29+
User administrator and Partner Tier 1 support | Can restore any deleted Microsoft 365 group except those groups assigned to the Global Administrator role
3030
User | Can restore any deleted Microsoft 365 group that they own
3131

3232
## View and manage the deleted Microsoft 365 groups that are available to restore
@@ -46,19 +46,21 @@ User | Can restore any deleted Microsoft 365 group that they own
4646

4747
## View the deleted Microsoft 365 groups that are available to restore using PowerShell
4848

49-
The following cmdlets can be used to view the deleted groups to verify that the one or ones you're interested in have not yet been permanently purged. These cmdlets are part of the [Azure AD PowerShell module](https://www.powershellgallery.com/packages/AzureAD/). More information about this module can be found in the [Azure Active Directory PowerShell Version 2](/powershell/azure/active-directory/install-adv2) article.
49+
The following cmdlets can be used to view the deleted groups to verify that the one or ones you're interested in haven't yet been permanently purged. These cmdlets are part of the [Microsoft Graph PowerShell module](/powershell/microsoftgraph/installation?view=graph-powershell-1.0&preserve-view=true). More information about this module can be found in the [Microsoft Graph PowerShell overview](/powershell/microsoftgraph/overview?view=graph-powershell-1.0&preserve-view=true) article.
5050

51-
1. Run the following cmdlet to display all deleted Microsoft 365 groups in your Azure AD organization that are still available to restore.
51+
1. Run the following cmdlet to display all deleted Microsoft 365 groups in your Azure AD organization that are still available to restore. Please install the [Graph](/powershell/microsoftgraph/installation?view=graph-powershell-1.0&preserve-view=true) beta version if it isn't already installed on the machine.
5252

5353

5454
```powershell
55-
Get-AzureADMSDeletedGroup
55+
Install-Module Microsoft.Graph.Beta
56+
Connect-MgGraph -Scopes "Group.ReadWrite.All"
57+
Get-MgBetaDirectoryDeletedGroup
5658
```
5759
58-
2. Alternately, if you know the objectID of a specific group (and you can get it from the cmdlet in step 1), run the following cmdlet to verify that the specific deleted group has not yet been permanently purged.
60+
2. Alternately, if you know the objectID of a specific group (and you can get it from the cmdlet in step 1), run the following cmdlet to verify that the specific deleted group hasn't yet been permanently purged.
5961
60-
```
61-
Get-AzureADMSDeletedGroup –Id <objectId>
62+
```powershell
63+
Get-MgBetaDirectoryDeletedGroup -DirectoryObjectId <objectId>
6264
```
6365
6466
## How to restore your deleted Microsoft 365 group using
@@ -68,25 +70,25 @@ Once you have verified that the group is still available to restore, restore the
6870
1. Run the following cmdlet to restore the group and its contents.
6971
7072
71-
```
72-
Restore-AzureADMSDeletedDirectoryObject –Id <objectId>
73+
```powershell
74+
Restore-MgBetaDirectoryDeletedItem -DirectoryObjectId <objectId>
7375
```
7476
7577
2. Alternatively, the following cmdlet can be run to permanently remove the deleted group.
7678
7779
78-
```
79-
Remove-AzureADMSDeletedDirectoryObject –Id <objectId>
80+
```powershell
81+
Remove-MgBetaDirectoryDeletedItem -DirectoryObjectId <objectId>
8082
```
8183
8284
## How do you know this worked?
8385
84-
To verify that you’ve successfully restored a Microsoft 365 group, run the `Get-AzureADGroup –ObjectId <objectId>` cmdlet to display information about the group. After the restore request is completed:
86+
To verify that you’ve successfully restored a Microsoft 365 group, run the `Get-MgBetaGroup –GroupId <objectId>` cmdlet to display information about the group. After the restore request is completed:
8587
8688
- The group appears in the Left navigation bar on Exchange
8789
- The plan for the group will appear in Planner
8890
- Any SharePoint sites and all of their contents will be available
89-
- The group can be accessed from any of the Exchange endpoints and other Microsoft365 workloads that support Microsoft 365 groups
91+
- The group can be accessed from any of the Exchange endpoints and other Microsoft 365 workloads that support Microsoft 365 groups
9092
9193
## Next steps
9294

articles/active-directory/enterprise-users/groups-troubleshooting.md

Lines changed: 22 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -21,19 +21,32 @@ This article contains troubleshooting information for groups in Azure Active Dir
2121
## Troubleshooting group creation issues
2222

2323
**I disabled security group creation in the Azure portal but groups can still be created via PowerShell**
24-
The **User can create security groups in Azure portals** setting in the Azure portal controls whether or not non-admin users can create security groups in the Access panel or the Azure portal. It does not control security group creation via PowerShell.
24+
The **User can create security groups in Azure portals** setting in the Azure portal controls whether or not nonadmin users can create security groups in the Access panel or the Azure portal. It does not control security group creation via PowerShell.
2525

26-
To disable group creation for non-admin users in PowerShell:
27-
1. Verify that non-admin users are allowed to create groups:
26+
To disable group creation for nonadmin users in PowerShell:
27+
1. Verify that nonadmin users are allowed to create groups:
2828

2929
```powershell
30-
Get-MsolCompanyInformation | Format-List UsersPermissionToCreateGroupsEnabled
30+
Get-MgBetaDirectorySetting | select -ExpandProperty values
3131
```
3232

33-
2. If it returns `UsersPermissionToCreateGroupsEnabled : True`, then non-admin users can create groups. To disable this feature:
33+
2. If it returns `EnableGroupCreation : True`, then nonadmin users can create groups. To disable this feature:
3434

3535
```powershell
36-
Set-MsolCompanySettings -UsersPermissionToCreateGroupsEnabled $False
36+
Install-Module Microsoft.Graph.Beta.Identity.DirectoryManagement
37+
Import-Module Microsoft.Graph.Beta.Identity.DirectoryManagement
38+
$params = @{
39+
TemplateId = "62375ab9-6b52-47ed-826b-58e47e0e304b"
40+
Values = @(
41+
@{
42+
Name = "EnableGroupCreation"
43+
Value = "false"
44+
}
45+
)
46+
}
47+
Connect-MgGraph -Scopes "Directory.ReadWrite.All"
48+
New-MgBetaDirectorySetting -BodyParameter $params
49+
3750
```
3851

3952
**I received a max groups allowed error when trying to create a Dynamic Group in PowerShell**
@@ -46,7 +59,7 @@ To create any new Dynamic groups, you'll first need to delete some existing Dyna
4659
**I configured a rule on a group but no memberships get updated in the group**
4760
1. Verify the values for user or device attributes in the rule. Ensure there are users that satisfy the rule.
4861
For devices, check the device properties to ensure any synced attributes contain the expected values.
49-
2. Check the membership processing status to confirm if it is complete. You can check the [membership processing status](groups-create-rule.md#check-processing-status-for-a-rule) and the last updated date on the **Overview** page for the group.
62+
2. Check the membership processing status to confirm if it's complete. You can check the [membership processing status](groups-create-rule.md#check-processing-status-for-a-rule) and the last updated date on the **Overview** page for the group.
5063

5164
If everything looks good, please allow some time for the group to populate. Depending on the size of your Azure AD organization, the group may take up to 24 hours for populating for the first time or after a rule change.
5265

@@ -57,15 +70,15 @@ This is expected behavior. Existing members of the group are removed when a rule
5770
Dedicated membership evaluation is done periodically in an asynchronous background process. How long the process takes is determined by the number of users in your directory and the size of the group created as a result of the rule. Typically, directories with small numbers of users will see the group membership changes in less than a few minutes. Directories with a large number of users can take 30 minutes or longer to populate.
5871

5972
**How can I force the group to be processed now?**
60-
Currently, there is no way to automatically trigger the group to be processed on demand. However, you can manually trigger the reprocessing by updating the membership rule to add a whitespace at the end.
73+
Currently, there's no way to automatically trigger the group to be processed on demand. However, you can manually trigger the reprocessing by updating the membership rule to add a whitespace at the end.
6174

6275
**I encountered a rule processing error**
6376
The following table lists common dynamic membership rule errors and how to correct them.
6477

6578
| Rule parser error | Error usage | Corrected usage |
6679
| --- | --- | --- |
6780
| Error: Attribute not supported. |(user.invalidProperty -eq "Value") |(user.department -eq "value")<br/><br/>Make sure the attribute is on the [supported properties list](groups-dynamic-membership.md#supported-properties). |
68-
| Error: Operator is not supported on attribute. |(user.accountEnabled -contains true) |(user.accountEnabled -eq true)<br/><br/>The operator used is not supported for the property type (in this example, -contains cannot be used on type boolean). Use the correct operators for the property type. |
81+
| Error: Operator isn't supported on attribute. |(user.accountEnabled -contains true) |(user.accountEnabled -eq true)<br/><br/>The operator used isn't supported for the property type (in this example, -contains can't be used on type boolean). Use the correct operators for the property type. |
6982
| Error: Query compilation error. | 1. (user.department -eq "Sales") (user.department -eq "Marketing")<br>2. (user.userPrincipalName -match "\*@domain.ext") | 1. Missing operator. Use -and or -or to join predicates<br>(user.department -eq "Sales") -or (user.department -eq "Marketing")<br>2. Error in regular expression used with -match<br>(user.userPrincipalName -match ".\*@domain.ext")<br>or alternatively: (user.userPrincipalName -match "@domain.ext$") |
7083

7184
## Next steps

articles/active-directory/enterprise-users/users-bulk-add.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -91,7 +91,7 @@ Next, you can check to see that the users you created exist in the Azure AD orga
9191
Run the following command:
9292

9393
``` PowerShell
94-
Get-AzureADUser -Filter "UserType eq 'Member'"
94+
Get-MgUser -Filter "UserType eq 'Member'"
9595
```
9696

9797
You should see that the users that you created are listed.

articles/active-directory/enterprise-users/users-bulk-delete.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -71,7 +71,7 @@ Next, you can check to see that the users you deleted exist in the Azure AD orga
7171
Run the following command:
7272

7373
``` PowerShell
74-
Get-AzureADUser -Filter "UserType eq 'Member'"
74+
Get-MgUser -Filter "UserType eq 'Member'"
7575
```
7676

7777
Verify that the users that you deleted are no longer listed.
-6.42 KB
Loading

articles/active-directory/roles/admin-units-members-dynamic.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -124,7 +124,7 @@ For steps on how to edit your rule, see the following [Edit dynamic membership r
124124
"displayName": "Windows Devices",
125125
"description": "All Contoso devices running Windows",
126126
"membershipType": "Dynamic",
127-
"membershipRule": "(device.deviceOSType -eq \"Windows\")",
127+
"membershipRule": "(deviceOSType -eq 'Windows')",
128128
"membershipRuleProcessingState": "On"
129129
}
130130
```

0 commit comments

Comments
 (0)