Skip to content

Commit d935f3a

Browse files
committed
updating
1 parent b0bdc68 commit d935f3a

File tree

4 files changed

+7
-7
lines changed

4 files changed

+7
-7
lines changed

articles/active-directory/cloud-sync/concept-attributes.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -71,7 +71,7 @@ To view the schema and verify it, follow these steps.
7171
1. Go to [Graph Explorer](https://developer.microsoft.com/graph/graph-explorer).
7272
1. Sign in with your global administrator account.
7373
1. On the left, select **modify permissions** and ensure that **Directory.ReadWrite.All** is *Consented*.
74-
1. Run the query `https://graph.microsoft.com/beta/serviceprincipals/?$filter=startswith(DisplayName, ‘{sync config name}’)`. This query returns a filtered list of service principals. This can also be acquire via the App Registration node under Azure Active Directory.
74+
1. Run the query `https://graph.microsoft.com/beta/serviceprincipals/?$filter=startswith(DisplayName, ‘{sync config name}’)`. This query returns a filtered list of service principals. This can also be acquired via the App Registration node under Azure Active Directory.
7575
1. Locate `"appDisplayName": "Active Directory to Azure Active Directory Provisioning"` and note the value for `"id"`.
7676
```
7777
"value": [

articles/active-directory/hybrid/how-to-connect-install-prerequisites.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -58,7 +58,7 @@ To read more about securing your Active Directory environment, see [Best practic
5858
#### Installation prerequisites
5959

6060
- Azure AD Connect must be installed on a domain-joined Windows Server 2016 or later - **note that Windows Server 2022 is not yet supported**. You can deploy Azure AD Connect on Windows Server 2016 but since Windows Server 2016 is in extended support, you may require [a paid support program](/lifecycle/policies/fixed#extended-support) if you require support for this configuration. We recommend the usage of domain joined Windows Server 2019.
61-
- The minimum .Net Framework version required is 4.6.2, and newer versions of .Net are also supported.
61+
- The minimum .NET Framework version required is 4.6.2, and newer versions of .Net are also supported.
6262
- Azure AD Connect can't be installed on Small Business Server or Windows Server Essentials before 2019 (Windows Server Essentials 2019 is supported). The server must be using Windows Server standard or better.
6363
- The Azure AD Connect server must have a full GUI installed. Installing Azure AD Connect on Windows Server Core isn't supported.
6464
- The Azure AD Connect server must not have PowerShell Transcription Group Policy enabled if you use the Azure AD Connect wizard to manage Active Directory Federation Services (AD FS) configuration. You can enable PowerShell transcription if you use the Azure AD Connect wizard to manage sync configuration.
@@ -82,8 +82,8 @@ We recommend that you harden your Azure AD Connect server to decrease the securi
8282
- Implement dedicated [privileged access workstations](https://4sysops.com/archives/understand-the-microsoft-privileged-access-workstation-paw-security-model/) for all personnel with privileged access to your organization's information systems.
8383
- Follow these [additional guidelines](/windows-server/identity/ad-ds/plan/security-best-practices/reducing-the-active-directory-attack-surface) to reduce the attack surface of your Active Directory environment.
8484
- Follow the [Monitor changes to federation configuration](how-to-connect-monitor-federation-changes.md) to setup alerts to monitor changes to the trust established between your Idp and Azure AD.
85-
- Enable Multi Factor Authentication (MFA) for all users that have privileged access in Azure AD or in AD. One security issue with using AADConnect is that if an attacker can get control over the Azure AD Connect server they can manipulate users in Azure AD. To prevent a attacker from using these capabilities to take over Azure AD accounts, MFA offers protections so that even if an attacker manages to e.g. reset a user's password using Azure AD Connect they still cannot bypass the second factor.
86-
- Disable Soft Matching on your tenant. Soft Matching is a great feature to help transfering source of autority for existing cloud managed objects to Azure AD Connect, but it comes with certain security risks. If you do not require it, you should [disable Soft Matching](how-to-connect-syncservice-features.md#blocksoftmatch).
85+
- Enable Multi Factor Authentication (MFA) for all users that have privileged access in Azure AD or in AD. One security issue with using Azure AD Connect is that if an attacker can get control over the Azure AD Connect server they can manipulate users in Azure AD. To prevent an attacker from using these capabilities to take over Azure AD accounts, MFA offers protections so that even if an attacker manages to e.g. reset a user's password using Azure AD Connect they still cannot bypass the second factor.
86+
- Disable Soft Matching on your tenant. Soft Matching is a great feature to help transferring source of authority for existing cloud managed objects to Azure AD Connect, but it comes with certain security risks. If you do not require it, you should [disable Soft Matching](how-to-connect-syncservice-features.md#blocksoftmatch).
8787
- Disable Hard Match Takeover. Hard match takeover allows Azure AD Connect to take control of a cloud managed object and changing the source of authority for the object to Active Directory. Once the source of authority of an object is taken over by Azure AD Connect, changes made to the Active Directory object that is linked to the Azure AD object will overwrite the original Azure AD data - including the password hash, if Password Hash Sync is enabled. An attacker could use this capability to take over control of cloud managed objects. To mitigate this risk, [disable hard match takeover](/powershell/module/msonline/set-msoldirsyncfeature?view=azureadps-1.0&preserve-view=true#example-3-block-cloud-object-takeover-through-hard-matching-for-the-tenant).
8888

8989
### SQL Server used by Azure AD Connect

articles/active-directory/hybrid/reference-connect-instances.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ Features currently not present in the Microsoft Cloud Germany:
4040
## Microsoft Azure Government
4141
The [Microsoft Azure Government cloud](https://azure.microsoft.com/features/gov/) is a cloud for US government.
4242

43-
This cloud has been supported by earlier releases of DirSync. From build 1.1.180 of Azure AD Connect, the next generation of the cloud is supported. This generation is using US-only based endpoints and have a different list of URLs to open in your proxy server.
43+
This cloud has been supported by earlier releases of DirSync. From build 1.1.180 of Azure AD Connect, the next generation of the cloud is supported. This generation is using US-only based endpoints and has a different list of URLs to open in your proxy server.
4444

4545
| URLs to open in proxy server |
4646
| --- |

articles/active-directory/hybrid/tshoot-connect-connectivity.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -179,12 +179,12 @@ The multi-factor authentication (MFA) challenge was canceled.
179179

180180
<div id="connect-msolservice-failed">
181181
<!--
182-
Empty div just to act as an alias for the "Connect To MS Online Failed" header
182+
Empty div just to act as an alias for the "Connect To MSOnline Failed" header
183183
because we used the mentioned id in the code to jump to this section.
184184
-->
185185
</div>
186186

187-
### Connect To MS Online Failed
187+
### Connect To MSOnline Failed
188188
Authentication was successful, but Azure AD PowerShell has an authentication problem.
189189

190190
<div id="get-msoluserrole-failed">

0 commit comments

Comments
 (0)