Skip to content

Commit dad45b6

Browse files
authored
Merge pull request #226753 from MicrosoftDocs/main
2/08 PM Publish
2 parents dbbc412 + efa99e6 commit dad45b6

File tree

176 files changed

+3750
-2788
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

176 files changed

+3750
-2788
lines changed

.openpublishing.redirection.azure-monitor.json

Lines changed: 8 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -5703,13 +5703,18 @@
57035703
"redirect_document_id": false
57045704
},
57055705
{
5706+
"source_path_from_root": "/articles/azure-monitor/alerts/proactive-performance-diagnostics.md",
5707+
"redirect_url": "https://azure.microsoft.com/updates/public-preview-alerts-based-smart-detection-for-application-insights/",
5708+
"redirect_document_id": false
5709+
},
5710+
{
57065711
"source_path_from_root": "/articles/azure-monitor/autoscale/autoscale-resource-log-schema.md",
57075712
"redirect_url": "/azure/azure-monitor/autoscale/autoscale-diagnostics",
57085713
"redirect_document_id": false
57095714
},
5710-
{
5711-
"source_path_from_root": "/articles/azure-monitor/alerts/proactive-performance-diagnostics.md",
5712-
"redirect_url": "https://azure.microsoft.com/updates/public-preview-alerts-based-smart-detection-for-application-insights/",
5715+
{
5716+
"source_path_from_root": "/articles/azure-monitor/app/java-in-process-agent.md",
5717+
"redirect_url": "/azure/azure-monitor/app/opentelemetry-enable",
57135718
"redirect_document_id": false
57145719
}
57155720
]

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -22695,6 +22695,11 @@
2269522695
"source_path": "articles/application-gateway/tutorial-protect-application-gateway.md",
2269622696
"redirect_URL": "/azure/application-gateway/tutorial-protect-application-gateway-ddos",
2269722697
"redirect_document_id": false
22698+
},
22699+
{
22700+
"source_path": "articles/virtual-machines/workloads/sap/index.md",
22701+
"redirect_URL": "/azure/sap/workloads/get-started",
22702+
"redirect_document_id": false
2269822703
}
2269922704
]
2270022705
}

articles/active-directory/hybrid/how-to-connect-install-custom.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.assetid: 6d42fb79-d9cf-48da-8445-f482c4c536af
1010
ms.service: active-directory
1111
ms.workload: identity
1212
ms.topic: how-to
13-
ms.date: 01/26/2023
13+
ms.date: 02/08/2023
1414
ms.subservice: hybrid
1515
ms.author: billmath
1616
ms.collection: M365-identity-device-management
@@ -47,7 +47,7 @@ When you install the synchronization services, you can leave the optional config
4747
| Use an existing SQL Server |Allows you to specify the SQL Server name and instance name. Choose this option if you already have a database server that you want to use. For **Instance Name**, enter the instance name, a comma, and the port number if your SQL Server instance doesn't have browsing enabled. Then specify the name of the Azure AD Connect database. Your SQL privileges determine whether a new database can be created or your SQL administrator must create the database in advance. If you have SQL Server administrator (SA) permissions, see [Install Azure AD Connect by using an existing database](how-to-connect-install-existing-database.md). If you have delegated permissions (DBO), see [Install Azure AD Connect by using SQL delegated administrator permissions](how-to-connect-install-sql-delegation.md). |
4848
| Use an existing service account |By default, Azure AD Connect provides a virtual service account for the synchronization services. If you use a remote instance of SQL Server or use a proxy that requires authentication, you can use a *managed service account* or a password-protected service account in the domain. In those cases, enter the account you want to use. To run the installation, you need to be an SA in SQL so you can create sign-in credentials for the service account. For more information, see [Azure AD Connect accounts and permissions](reference-connect-accounts-permissions.md#adsync-service-account). </br></br>By using the latest build, the SQL administrator can now provision the database out of band. Then the Azure AD Connect administrator can install it with database owner rights. For more information, see [Install Azure AD Connect by using SQL delegated administrator permissions](how-to-connect-install-sql-delegation.md).|
4949
| Specify custom sync groups |By default, when the synchronization services are installed, Azure AD Connect creates four groups that are local to the server. These groups are Administrators, Operators, Browse, and Password Reset. You can specify your own groups here. The groups must be local on the server. They can't be located in the domain. |
50-
|Import synchronization settings (preview)|Allows you to import settings from other versions of Azure AD Connect. For more information, see [Importing and exporting Azure AD Connect configuration settings](how-to-connect-import-export-config.md).|
50+
|Import synchronization settings|Allows you to import settings from other versions of Azure AD Connect. For more information, see [Importing and exporting Azure AD Connect configuration settings](how-to-connect-import-export-config.md).|
5151

5252
### User sign-in
5353
After installing the required components, select your users' single sign-on method. The following table briefly describes the available options. For a full description of the sign-in methods, see [User sign-in](plan-connect-user-signin.md).
-71 KB
Loading

0 commit comments

Comments
 (0)