Skip to content

Commit d6dc8ce

Browse files
authored
Merge pull request #191002 from MicrosoftDocs/main
3/08 PM Publish
2 parents 4a2b2fa + 6157f0d commit d6dc8ce

File tree

181 files changed

+6298
-3753
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

181 files changed

+6298
-3753
lines changed

.openpublishing.publish.config.json

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -381,6 +381,12 @@
381381
"branch": "main",
382382
"branch_mapping": {}
383383
},
384+
{
385+
"path_to_root": "media-services-v3-python",
386+
"url": "https://github.com/Azure-Samples/media-services-v3-python",
387+
"branch": "main",
388+
"branch_mapping": {}
389+
},
384390
{
385391
"path_to_root": "samples-javascript",
386392
"url": "https://github.com/Microsoft/tsiclient",
@@ -411,12 +417,6 @@
411417
"branch": "main",
412418
"branch_mapping": {}
413419
},
414-
{
415-
"path_to_root": "media-services-v3-python",
416-
"url": "https://github.com/Azure-Samples/media-services-v3-python",
417-
"branch": "main",
418-
"branch_mapping": {}
419-
},
420420
{
421421
"path_to_root": "remote-monitoring-webui",
422422
"url": "https://github.com/Azure/pcs-remote-monitoring-webui.git",

.openpublishing.redirection.json

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -693,6 +693,11 @@
693693
"redirect_url": "/azure/frontdoor/front-door-rules-engine-actions",
694694
"redirect_document_id": false
695695
},
696+
{
697+
"source_path_from_root": "/articles/frontdoor/concept-rules-set.md",
698+
"redirect_url": "/azure/frontdoor/front-door-rules-engine",
699+
"redirect_document_id": false
700+
},
696701
{
697702
"source_path_from_root": "/articles/app-service-web/web-sites-dotnet-deploy-aspnet-mvc-app-membership-oauth-sql-database.md",
698703
"redirect_url": "/aspnet/core/security/authorization/secure-data",
@@ -6853,6 +6858,11 @@
68536858
"redirect_url": "/azure/azure-functions/functions-kubernetes-keda",
68546859
"redirect_document_id": false
68556860
},
6861+
{
6862+
"source_path_from_root": "/articles/azure-functions/functions-bindings-event-iot-output.md",
6863+
"redirect_url": "/azure/azure-functions/functions-bindings-event-hubs-output",
6864+
"redirect_document_id": false
6865+
},
68566866
{
68576867
"source_path_from_root": "/articles/azure-government/documentation-government-k8.md",
68586868
"redirect_url": "/azure/azure-government",

articles/active-directory-domain-services/tutorial-configure-networking.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ To complete this tutorial, you need the following resources and privileges:
4040
* An Azure Active Directory tenant associated with your subscription, either synchronized with an on-premises directory or a cloud-only directory.
4141
* If needed, [create an Azure Active Directory tenant][create-azure-ad-tenant] or [associate an Azure subscription with your account][associate-azure-ad-tenant].
4242
* You need [Application Administrator](/azure/active-directory/roles/permissions-reference#application-administrator) and [Groups Administrator](/azure/active-directory/roles/permissions-reference#groups-administrator) Azure AD roles in your tenant to enable Azure AD DS.
43-
* You need [Domain Services Contributor](/azure/role-based-access-control/built-in-roles#contributor) Azure role to create the required Azure AD DS resources.
43+
* You need Domain Services Contributor Azure role to create the required Azure AD DS resources.
4444
* An Azure Active Directory Domain Services managed domain enabled and configured in your Azure AD tenant.
4545
* If needed, the first tutorial [creates and configures an Azure Active Directory Domain Services managed domain][create-azure-ad-ds-instance].
4646

articles/active-directory-domain-services/tutorial-create-instance.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: domain-services
99
ms.workload: identity
1010
ms.topic: tutorial
11-
ms.date: 12/15/2021
11+
ms.date: 03/08/2022
1212
ms.author: justinha
1313

1414
#Customer intent: As an identity administrator, I want to create an Azure Active Directory Domain Services managed domain so that I can synchronize identity information with my Azure Active Directory tenant and provide Domain Services connectivity to virtual machines and applications in Azure.
@@ -38,7 +38,7 @@ To complete this tutorial, you need the following resources and privileges:
3838
* An Azure Active Directory tenant associated with your subscription, either synchronized with an on-premises directory or a cloud-only directory.
3939
* If needed, [create an Azure Active Directory tenant][create-azure-ad-tenant] or [associate an Azure subscription with your account][associate-azure-ad-tenant].
4040
* You need [Application Administrator](/azure/active-directory/roles/permissions-reference#application-administrator) and [Groups Administrator](/azure/active-directory/roles/permissions-reference#groups-administrator) Azure AD roles in your tenant to enable Azure AD DS.
41-
* You need [Domain Services Contributor](/azure/role-based-access-control/built-in-roles#contributor) Azure role to create the required Azure AD DS resources.
41+
* You need Domain Services Contributor Azure role to create the required Azure AD DS resources.
4242
* A virtual network with DNS servers that can query necessary infrastructure such as storage. DNS servers that can't perform general internet queries might block the ability to create a managed domain.
4343

4444
Although not required for Azure AD DS, it's recommended to [configure self-service password reset (SSPR)][configure-sspr] for the Azure AD tenant. Users can change their password without SSPR, but SSPR helps if they forget their password and need to reset it.

articles/active-directory/authentication/tutorial-enable-sspr-writeback.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -91,7 +91,7 @@ Password policies in the on-premises AD DS environment may prevent password rese
9191
If you update the group policy, wait for the updated policy to replicate, or use the `gpupdate /force` command.
9292

9393
> [!Note]
94-
> For passwords to be changed immediately, *Minimum password age* must be set to 0. However, if users adhere to the on-premises policies, and the *Minimum password age* is set to a value greater than zero, password writeback still works after the on-premises policies are evaluated.
94+
> If you need to allow users to change or reset passwords more than one time per day, *Minimum password age* must be set to 0. Password writeback will work after on-premises password policies are successfully evaluated.
9595
9696
## Enable password writeback in Azure AD Connect
9797

articles/active-directory/identity-protection/concept-identity-protection-risks.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -60,7 +60,7 @@ These risks can be calculated in real-time or calculated offline using Microsoft
6060
| Token Issuer Anomaly | Offline |This risk detection indicates the SAML token issuer for the associated SAML token is potentially compromised. The claims included in the token are unusual or match known attacker patterns. |
6161
| Malware linked IP address | Offline | This risk detection type indicates sign-ins from IP addresses infected with malware that is known to actively communicate with a bot server. This detection is determined by correlating IP addresses of the user's device against IP addresses that were in contact with a bot server while the bot server was active. <br><br> **[This detection has been deprecated](../fundamentals/whats-new-archive.md#planned-deprecation---malware-linked-ip-address-detection-in-identity-protection)**. Identity Protection will no longer generate new "Malware linked IP address" detections. Customers who currently have "Malware linked IP address" detections in their tenant will still be able to view, remediate, or dismiss them until the 90-day detection retention time is reached.|
6262
| Suspicious browser | Offline | Suspicious browser detection indicates anomalous behavior based on suspicious sign-in activity across multiple tenants from different countries in the same browser. |
63-
| Unfamiliar sign-in properties | Real-time | This risk detection type considers past sign-in history (IP, Latitude / Longitude and ASN) to look for anomalous sign-ins. The system stores information about previous locations used by a user, and considers these "familiar" locations. The risk detection is triggered when the sign-in occurs from a location that is not already in the list of familiar locations. Newly created users will be in "learning mode" for a while where unfamiliar sign-in properties risk detections will be turned off while our algorithms learn the user's behavior. The learning mode duration is dynamic and depends on how much time it takes the algorithm to gather enough information about the user's sign-in patterns. The minimum duration is five days. A user can go back into learning mode after a long period of inactivity. The system also ignores sign-ins from familiar devices, and locations that are geographically close to a familiar location. <br><br> We also run this detection for basic authentication (or legacy protocols). Because these protocols do not have modern properties such as client ID, there is limited telemetry to reduce false positives. We recommend our customers to move to modern authentication. <br><br> Unfamiliar sign-in properties can be detected on both interactive and non-interactive sign-ins. When this detection is detected on non-interactive sign-ins, it deserves increased scrutiny due to the risk of token replay attacks. |
63+
| Unfamiliar sign-in properties | Real-time | This risk detection type considers past sign-in history (IP, Latitude / Longitude and ASN) to look for anomalous sign-ins. The system stores information about previous locations used by a user, and considers these "familiar" locations. The risk detection is triggered when the sign-in occurs from a location that is not already in the list of familiar locations. Newly created users will be in "learning mode" for a while where unfamiliar sign-in properties risk detections will be turned off while our algorithms learn the user's behavior. The learning mode duration is dynamic and depends on how much time it takes the algorithm to gather enough information about the user's sign-in patterns. The minimum duration is five days. A user can go back into learning mode after a long period of inactivity and after a secure password reset. The system also ignores sign-ins from familiar devices, and locations that are geographically close to a familiar location. <br><br> We also run this detection for basic authentication (or legacy protocols). Because these protocols do not have modern properties such as client ID, there is limited telemetry to reduce false positives. We recommend our customers to move to modern authentication. <br><br> Unfamiliar sign-in properties can be detected on both interactive and non-interactive sign-ins. When this detection is detected on non-interactive sign-ins, it deserves increased scrutiny due to the risk of token replay attacks. |
6464
| Admin confirmed user compromised | Offline | This detection indicates an admin has selected 'Confirm user compromised' in the Risky users UI or using riskyUsers API. To see which admin has confirmed this user compromised, check the user's risk history (via UI or API). |
6565
| Malicious IP address | Offline | This detection indicates sign-in from a malicious IP address. An IP address is considered malicious based on high failure rates because of invalid credentials received from the IP address or other IP reputation sources. |
6666
| Suspicious inbox manipulation rules | Offline | This detection is discovered by [Microsoft Defender for Cloud Apps](/cloud-app-security/anomaly-detection-policy#suspicious-inbox-manipulation-rules). This detection profiles your environment and triggers alerts when suspicious rules that delete or move messages or folders are set on a user's inbox. This detection may indicate that the user's account is compromised, that messages are being intentionally hidden, and that the mailbox is being used to distribute spam or malware in your organization. |

articles/aks/node-auto-repair.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -35,6 +35,7 @@ If AKS identifies an unhealthy node that remains unhealthy for 10 minutes, AKS t
3535

3636
1. Reboot the node.
3737
1. If the reboot is unsuccessful, reimage the node.
38+
1. If the reimage is unsuccessful, redploy the node.
3839

3940
Alternative remediations are investigated by AKS engineers if auto-repair is unsuccessful.
4041

articles/app-service/overview-arc-integration.md

Lines changed: 10 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: 'App Service on Azure Arc'
33
description: An introduction to App Service integration with Azure Arc for Azure operators.
44
ms.topic: article
5-
ms.date: 01/31/2022
5+
ms.date: 03/08/2022
66
---
77

88
# App Service, Functions, and Logic Apps on Azure Arc (Preview)
@@ -179,6 +179,15 @@ If your extension was in the stable version and auto-upgrade-minor-version is se
179179
```azurecli-interactive
180180
az k8s-extension update --cluster-type connectedClusters -c <clustername> -g <resource group> -n <extension name> --release-train stable --version 0.12.0
181181
```
182+
### Application services extension v 0.12.1 (March 2022)
183+
184+
- Resolved issue with outbound proxy support to enable logging to Log Analytics Workspace
185+
186+
If your extension was in the stable version and auto-upgrade-minor-version is set to true, the extension upgrades automatically. To manually upgrade the extension to the latest version, you can run the command:
187+
188+
```azurecli-interactive
189+
az k8s-extension update --cluster-type connectedClusters -c <clustername> -g <resource group> -n <extension name> --release-train stable --version 0.12.1
190+
```
182191

183192
## Next steps
184193

articles/app-service/toc.yml

Lines changed: 1 addition & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -448,23 +448,11 @@
448448
href: troubleshoot-performance-degradation.md
449449
- name: Troubleshoot domain and certificate issues
450450
href: troubleshoot-domain-ssl-certificates.md
451-
- name: FAQ
452-
items:
453-
- name: Availability, performance, and application FAQ
454-
href: faq-availability-performance-application-issues.yml
455-
- name: Deployment FAQ
456-
href: faq-deployment.yml
457-
- name: Open-source technologies FAQ
458-
href: faq-open-source-technologies.yml
459-
- name: Configuration and management FAQ
460-
href: faq-configuration-and-management.yml
461-
- name: App Service on Linux
462-
href: faq-app-service-linux.yml
463451
- name: IP address change
464452
items:
465453
- name: Inbound IP address
466454
href: ip-address-change-inbound.md
467455
- name: Outbound IP address
468456
href: ip-address-change-outbound.md
469457
- name: TLS/SSL address
470-
href: ip-address-change-ssl.md
458+
href: ip-address-change-ssl.md

articles/app-service/webjobs-sdk-how-to.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -397,7 +397,7 @@ static async Task Main()
397397
}
398398
```
399399

400-
For more information, see the [Azure CosmosDB binding](../azure-functions/functions-bindings-cosmosdb-v2-output.md#hostjson-settings) article.
400+
For more information, see the [Azure CosmosDB binding](../azure-functions/functions-bindings-cosmosdb-v2.md#hostjson-settings) article.
401401

402402
#### Event Hubs trigger configuration (version 3.*x*)
403403

@@ -526,7 +526,7 @@ static async Task Main()
526526
}
527527
```
528528

529-
For more details, see the [Service Bus binding](../azure-functions/functions-bindings-service-bus.md#hostjson-settings) article.
529+
For more details, see the [Service Bus binding](../azure-functions/functions-bindings-service-bus.md) article.
530530

531531
### Configuration for other bindings
532532

@@ -684,7 +684,7 @@ The Azure Functions documentation provides reference information about each bind
684684

685685
* [Packages](../azure-functions/functions-bindings-storage-queue.md). The package you need to install to include support for the binding in a WebJobs SDK project.
686686
* [Examples](../azure-functions/functions-bindings-storage-queue-trigger.md). Code samples. The C# class library example applies to the WebJobs SDK. Just omit the `FunctionName` attribute.
687-
* [Attributes](../azure-functions/functions-bindings-storage-queue-trigger.md#attributes-and-annotations). The attributes to use for the binding type.
687+
* [Attributes](../azure-functions/functions-bindings-storage-queue-trigger.md#attributes). The attributes to use for the binding type.
688688
* [Configuration](../azure-functions/functions-bindings-storage-queue-trigger.md#configuration). Explanations of the attribute properties and constructor parameters.
689689
* [Usage](../azure-functions/functions-bindings-storage-queue-trigger.md#usage). The types you can bind to and information about how the binding works. For example: polling algorithm, poison queue processing.
690690

0 commit comments

Comments
 (0)