Skip to content

Commit d8c1c2d

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into ps-ps
2 parents 7d2dc9f + 829bf83 commit d8c1c2d

File tree

258 files changed

+2257
-1621
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

258 files changed

+2257
-1621
lines changed

.openpublishing.redirection.active-directory.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4371,6 +4371,11 @@
43714371
"redirect_url": "/azure/active-directory/reports-monitoring/reports-faq",
43724372
"redirect_document_id": false
43734373
},
4374+
{
4375+
"source_path_from_root": "/articles/active-directory/reports-monitoring/workbook-legacy authentication.md",
4376+
"redirect_url": "/azure/active-directory/reports-monitoring/workbook-legacy-authentication",
4377+
"redirect_document_id": false
4378+
},
43744379
{
43754380
"source_path_from_root": "/articles/active-directory/reports-monitoring/troubleshoot-missing-audit-data.md",
43764381
"redirect_url": "/azure/active-directory/reports-monitoring/reports-faq",

.openpublishing.redirection.azure-monitor.json

Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -5626,6 +5626,21 @@
56265626
"source_path_from_root": "/articles/azure-monitor/vm/vminsights-health-troubleshoot.md",
56275627
"redirect_url": "/azure/azure-monitor/vm/vminsights-overview",
56285628
"redirect_document_id": false
5629+
},
5630+
{
5631+
"source_path_from_root": "/articles/azure-monitor/vm/monitor-virtual-machine-configure.md",
5632+
"redirect_url": "/azure/azure-monitor/vm/monitor-virtual-machine-data-collection",
5633+
"redirect_document_id": false
5634+
},
5635+
{
5636+
"source_path_from_root": "/articles/azure-monitor/vm/monitor-virtual-machine-security.md",
5637+
"redirect_url": "/azure/azure-monitor/vm/monitor-virtual-machine#security-monitoring",
5638+
"redirect_document_id": false
5639+
},
5640+
{
5641+
"source_path_from_root": "/articles/azure-monitor/vm/monitor-virtual-machine-workloads.md",
5642+
"redirect_url": "/azure/azure-monitor/vm/monitor-virtual-machine-data-collection",
5643+
"redirect_document_id": false
56295644
}
56305645
]
56315646
}

.openpublishing.redirection.healthcare-apis.json

Lines changed: 10 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -610,11 +610,15 @@
610610
"redirect_document_id": false
611611
},
612612
{ "source_path_from_root": "/articles/healthcare-apis/iot/iot-troubleshoot-error-messages-and-conditions.md",
613-
"redirect_url": "/azure/healthcare-apis/iot/troubleshoot-error-messages-and-conditions",
613+
"redirect_url": "/azure/healthcare-apis/iot/troubleshoot-errors",
614+
"redirect_document_id": false
615+
},
616+
{ "source_path_from_root": "/articles/healthcare-apis/iot/troubleshoot-error-messages-and-conditions.md",
617+
"redirect_url": "/azure/healthcare-apis/iot/troubleshoot-errors",
614618
"redirect_document_id": false
615619
},
616620
{ "source_path_from_root": "/articles/healthcare-apis/iot/iot-troubleshoot-mappings.md",
617-
"redirect_url": "/azure/healthcare-apis/iot/troubleshoot-mappings",
621+
"redirect_url": "/azure/healthcare-apis/iot/troubleshoot-errors",
618622
"redirect_document_id": false
619623
},
620624
{ "source_path_from_root": "/articles/healthcare-apis/iot/iot-connector-faqs.md",
@@ -637,6 +641,10 @@
637641
"redirect_url": "/azure/healthcare-apis/iot/deploy-new-arm",
638642
"redirect_document_id": false
639643
},
644+
{ "source_path_from_root": "/articles/healthcare-apis/iot/troubleshoot-mappings.md",
645+
"redirect_url": "/azure/healthcare-apis/iot/troubleshoot-errors",
646+
"redirect_document_id": false
647+
},
640648
{ "source_path_from_root": "/articles/healthcare-apis/events/events-display-metrics.md",
641649
"redirect_url": "/azure/healthcare-apis/events/events-use-metrics",
642650
"redirect_document_id": false

articles/active-directory/authentication/howto-authentication-methods-activity.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: how-to
9-
ms.date: 07/13/2021
9+
ms.date: 01/12/2023
1010

1111
ms.author: justinha
1212
author: sopand
@@ -112,7 +112,7 @@ The registration details report shows the following information for each user:
112112
- SSPR Registered (Registered, Not Registered)
113113
- SSPR Enabled (Enabled, Not Enabled)
114114
- SSPR Capable (Capable, Not Capable)
115-
- Methods registered (Email, Mobile Phone, Alternative Mobile Phone, Office Phone, Microsoft Authenticator Push, Software One Time Passcode, FIDO2, Security Key, Security questions)
115+
- Methods registered (Email, Mobile Phone, Alternative Mobile Phone, Office Phone, Microsoft Authenticator Push, Software One Time Passcode, FIDO2, Security Key, Security questions, Hardware OATH token)
116116

117117
![Screenshot of user registration details](media/how-to-authentication-methods-usage-insights/registration-details.png)
118118

@@ -133,7 +133,7 @@ The registration details report shows the following information for each user:
133133
## Limitations
134134

135135
- The data in the report is not updated in real-time and may reflect a latency of up to a few hours.
136-
- The **PhoneAppNotification** or **PhoneAppOTP** methods that a user might have configured are not displayed in the dashboard.
136+
- The **PhoneAppNotification** or **PhoneAppOTP** methods that a user might have configured are not displayed in the dashboard on **Azure AD Authentication methods - Policies**.
137137

138138
## Next steps
139139

articles/active-directory/develop/howto-configure-publisher-domain.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -116,7 +116,7 @@ You're not required to maintain the resources that are used for verification aft
116116
If your tenant has verified domains, in the **Select a verified domain** dropdown, select one of the domains.
117117

118118
> [!NOTE]
119-
> The expected `Content-Type` header that should return is `application/json`. If you use any other header, like `application/json; charset=utf-8`, you might see this error message:
119+
> Content will be interpreted as UTF-8 JSON for deserialization. Supported `Content-Type` headers that should return are `application/json`, `application/json; charset=utf-8`, or ` `. If you use any other header, you might see this error message:
120120
>
121121
> `Verification of publisher domain failed. Error getting JSON file from https:///.well-known/microsoft-identity-association. The server returned an unexpected content type header value.`
122122
>

articles/active-directory/hybrid/how-to-connect-group-writeback-enable.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -29,6 +29,10 @@ Group writeback requires enabling both the original and new versions of the feat
2929
>
3030
>The enhanced group writeback feature is enabled on the tenant and not per Azure AD Connect client instance. Please be sure that all Azure AD Connect client instances are updated to a minimal build version of 1.6.4.0 or later.
3131
32+
> [!NOTE]
33+
> If you don't want to writeback all existing Microsoft 365 groups to Active Directory, you need to make changes to group writeback default behaviour before performing the steps in this article to enable the feature. See [Modify Azure AD Connect group writeback default behavior](how-to-connect-modify-group-writeback.md).
34+
> Also the new and original versions of the feature need to be enabled in the order documented. If the original feature is enabled first, all existing Microsoft 365 groups will be written back to Active Directory.
35+
3236
### Enable group writeback by using PowerShell
3337

3438
1. On your Azure AD Connect server, open a PowerShell prompt as an administrator.

articles/active-directory/hybrid/how-to-connect-group-writeback-v2.md

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -118,7 +118,10 @@ You can modify the default behavior as follows:
118118
- Microsoft 365 groups with up to 250,000 members can be written back to on-premises.
119119

120120
If you plan to make changes to the default behavior, we recommend that you do so before you enable group writeback. However, you can still modify the default behavior if group writeback is already enabled. For more information, see [Modify Azure AD Connect group writeback default behavior](how-to-connect-modify-group-writeback.md).
121-
121+
122+
> [!NOTE]
123+
> You need to make these changes before enabling group writeback; otherwise, all existing Microsoft 365 groups will be automatically written back to Active Directory. Also, the new and original versions of the feature need to be enabled in the order documented. If the original feature is enabled first, all existing Microsoft 365 groups will be written back to Active Directory.
124+
122125
## Understand limitations of public preview 
123126

124127
Although this release has undergone extensive testing, you might still encounter issues. One of the goals of this public preview release is to find and fix any issues before the feature moves to general availability. Please also note that any public preview functionality can still receive breaking changes which may require you to make changes to you configuration to continue using this feature. We may also decide to change or remove certain functionality without prior notice.
@@ -143,4 +146,4 @@ These limitations and known issues are specific to group writeback:
143146

144147
- [Modify Azure AD Connect group writeback default behavior](how-to-connect-modify-group-writeback.md)
145148
- [Enable Azure AD Connect group writeback](how-to-connect-group-writeback-enable.md)
146-
- [Disable Azure AD Connect group writeback](how-to-connect-group-writeback-disable.md)
149+
- [Disable Azure AD Connect group writeback](how-to-connect-group-writeback-disable.md)

articles/active-directory/reports-monitoring/concept-activity-logs-azure-monitor.md

Lines changed: 3 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.topic: conceptual
99
ms.workload: identity
1010
ms.subservice: report-monitor
11-
ms.date: 12/02/2022
11+
ms.date: 01/12/2023
1212
ms.author: sarahlipsey
1313
ms.reviewer: besiler
1414
ms.collection: M365-identity-device-management
@@ -57,11 +57,12 @@ Once you have your endpoint established, go to **Azure AD** and then **Diagnosti
5757

5858
If you already have an Azure AD license, you need an Azure subscription to set up the storage account and Event Hubs. The Azure subscription comes at no cost, but you have to pay to utilize Azure resources, including the storage account that you use for archival and the Event Hubs that you use for streaming. The amount of data and, thus, the cost incurred, can vary significantly depending on the tenant size.
5959

60+
Azure Monitor provides the option to exclude whole events, fields, or parts of fields when ingesting logs from Azure AD. Learn more about this cost saving feature in [Data collection transformation in Azure Monitor](../../azure-monitor/essentials/data-collection-transformations.md).
61+
6062
### Storage size for activity logs
6163

6264
Every audit log event uses about 2 KB of data storage. Sign in event logs are about 4 KB of data storage. For a tenant with 100,000 users, which would incur about 1.5 million events per day, you would need about 3 GB of data storage per day. Because writes occur in approximately five-minute batches, you can anticipate approximately 9,000 write operations per month.
6365

64-
6566
The following table contains a cost estimate of, depending on the size of the tenant, a general-purpose v2 storage account in West US for at least one year of retention. To create a more accurate estimate for the data volume that you anticipate for your application, use the [Azure storage pricing calculator](https://azure.microsoft.com/pricing/details/storage/blobs/).
6667

6768

@@ -75,9 +76,6 @@ The following table contains a cost estimate of, depending on the size of the te
7576

7677
If you want to know for how long the activity data is stored in a Premium tenant, see: [How long does Azure AD store the data?](reference-reports-data-retention.md#how-long-does-azure-ad-store-the-data)
7778

78-
79-
80-
8179
### Event Hubs messages for activity logs
8280

8381
Events are batched into approximately five-minute intervals and sent as a single message that contains all the events within that timeframe. A message in the Event Hubs has a maximum size of 256 KB. If the total size of all the messages within the timeframe exceeds that volume, multiple messages are sent.

articles/active-directory/reports-monitoring/concept-all-sign-ins.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.topic: conceptual
99
ms.workload: identity
1010
ms.subservice: report-monitor
11-
ms.date: 01/05/2023
11+
ms.date: 01/12/2023
1212
ms.author: sarahlipsey
1313
ms.reviewer: besiler
1414
ms.collection: M365-identity-device-management
@@ -262,6 +262,7 @@ When analyzing authentication details, take note of the following details:
262262
- The **Authentication details** tab can initially show incomplete or inaccurate data until log information is fully aggregated. Known examples include:
263263
- A **satisfied by claim in the token** message is incorrectly displayed when sign-in events are initially logged.
264264
- The **Primary authentication** row isn't initially logged.
265+
- If you're unsure of a detail in the logs, gather the **Request ID** and **Correlation ID** to use for further analyzing or troubleshooting.
265266

266267
## Sign-in data used by other services
267268

articles/active-directory/reports-monitoring/concept-sign-ins.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.topic: conceptual
99
ms.workload: identity
1010
ms.subservice: report-monitor
11-
ms.date: 11/04/2022
11+
ms.date: 01/12/2023
1212
ms.author: sarahlipsey
1313
ms.reviewer: besiler
1414
ms.collection: M365-identity-device-management
@@ -156,7 +156,8 @@ When analyzing authentication details, take note of the following details:
156156
- **OATH verification code** is logged as the authentication method for both OATH hardware and software tokens (such as the Microsoft Authenticator app).
157157
- The **Authentication details** tab can initially show incomplete or inaccurate data until log information is fully aggregated. Known examples include:
158158
- A **satisfied by claim in the token** message is incorrectly displayed when sign-in events are initially logged.
159-
- The **Primary authentication** row isn't initially logged.
159+
- The **Primary authentication** row isn't initially logged.
160+
- If you're unsure of a detail in the logs, gather the **Request ID** and **Correlation ID** to use for further analyzing or troubleshooting.
160161

161162
## Sign-in data used by other services
162163

0 commit comments

Comments
 (0)