Skip to content

Commit dae8887

Browse files
Merge pull request #303763 from MicrosoftDocs/main
Auto Publish – main to live - 2025-08-03 11:00 UTC
2 parents a55ddcc + 73fb618 commit dae8887

File tree

7 files changed

+23
-22
lines changed

7 files changed

+23
-22
lines changed

articles/communication-services/concepts/chat/concepts.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -41,8 +41,6 @@ Azure Communication Services supports three levels of user access control, using
4141

4242
Azure Communication Services stores chat threads according to the [data retention policy](/purview/create-retention-policies) in effect when the thread is created. You can update the retention policy if needed during the retention time period you set. After you delete a chat thread (by policy or by a Delete API request), it can't be retrieved.
4343

44-
[!INCLUDE [chat-retention-policy.md](../../includes/chat-retention-policy.md)]
45-
4644
You can choose between:
4745
- Indefinite thread retention.
4846
- Automatic deletion between 30 and 90 days via the retention policy on the [Create Chat Thread API](/rest/api/communication/chat/chat/create-chat-thread).

articles/communication-services/concepts/privacy.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -78,8 +78,6 @@ Azure Communication Services maintains a directory of phone numbers associated w
7878

7979
Azure Communication Services stores chat threads according to the [data retention policy](/purview/create-retention-policies) in effect when the thread is created. You can update the retention policy if needed during the retention time period you set. After you delete a chat thread (by policy or by a Delete API request), it can't be retrieved.
8080

81-
[!INCLUDE [chat-retention-policy.md](../includes/chat-retention-policy.md)]
82-
8381
You can choose between indefinite thread retention, automatic deletion between 30 and 90 days via the retention policy on the [Create Chat Thread API](/rest/api/communication/chat/chat/create-chat-thread), or immediate deletion using the APIs [Delete Chat Message](/rest/api/communication/chat/chat-thread/delete-chat-message) or [Delete Chat Thread](/rest/api/communication/chat/chat/delete-chat-thread).
8482

8583
Any thread created before the new retention policy isn't affected unless you specifically change the policy for that thread. If you submit a support request for a deleted chat thread more than 30 days after the retention policy deleted that thread, it can no longer be retrieved and no information about that thread is available. If needed, [open a support ticket](/azure/azure-portal/supportability/how-to-create-azure-support-request) as quickly as possible within the 30 day window after you create a thread so we can assist you.

articles/communication-services/includes/chat-retention-policy.md

Lines changed: 0 additions & 11 deletions
This file was deleted.
111 KB
Loading

articles/role-based-access-control/role-assignments-portal.yml

Lines changed: 18 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,10 +3,12 @@
33
metadata:
44
title: Assign Azure roles using the Azure portal - Azure RBAC
55
description: Learn how to grant access to Azure resources for users, groups, service principals, or managed identities using the Azure portal and Azure role-based access control (Azure RBAC).
6-
author: jenniferf-skc
6+
7+
author: jenniferf-skc
78
ms.author: jfields
89
manager: pmwongera
9-
ms.date: 11/11/2024
10+
ms.date: 08/01/2025
11+
1012
ms.service: role-based-access-control
1113
ms.topic: how-to
1214
ms.custom:
@@ -73,6 +75,20 @@ procedureSection:
7375
You can search for a role by name or by description. You can also filter roles by type and category.
7476
7577
![Screenshot of Add role assignment page with Role tab.](./media/shared/roles.png)
78+
79+
80+
Note, If you're unsure of which role you need to assign, you can now use Copilot to help you select the appropriate role. (Limited preview. This capability is being deployed in stages, so it might not be available yet in your tenant or your interface might look different.)
81+
82+
- |
83+
(Optional) In the **Role** tab, click the **Copilot can help pick role** button. The Copilot dialog box opens.
84+
85+
![Screenshot of Copilot button in the Add role assignment page.](./media/role-assignments-portal/copilot-for-role-assignment.png)
86+
87+
In the dialog box, you can add descriptive prompts to tell Copilot your requirements for the role, and what you need a user to be authorized to do, for example, *"Help me select a role to deploy and manage Azure functions."*, or *"Which role should I use if I
88+
want a user to manage and view a workspace?"* Using phrases such as *'Help me select...'* or *'Which role should I use to...'* helps Copilot understand your intent more clearly in order to deliver the best results.
89+
90+
From the direction of your prompt, Copilot suggests a role, or multiple roles, based on the requirements provided. Copilot asks you to confirm by **Select permissions**. Copilot then recommends a role based on the
91+
criteria provided. You can **Select role**, or you can ask Copilot to **Recommend other roles**. If you select **Select role**, you're taken back to the **Add role assignment** page where you can select the recommended role and view its details.
7692
- |
7793
If you want to assign a privileged administrator role, select the **Privileged administrator roles** tab to select the role.
7894

articles/sentinel/datalake/kql-queries.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -97,7 +97,7 @@ external_table("microsoft.entra.id.AADRiskyUsers")
9797
## Query considerations and limitations
9898

9999
+ Queries are run against a single workspace. Make sure you select the correct workspace before running a query.
100-
+ Executing KQL queries on the Microsoft Sentinel data lake incurs charges based on query billing meters. For more information, see [../billing.md#data-lake-tier].
100+
+ Executing KQL queries on the Microsoft Sentinel data lake incurs charges based on query billing meters. For more information, see [Plan costs and understand Microsoft Sentinel pricing and billing](../billing.md#data-lake-tier).
101101
+ Review data ingestion and table retention policy. Before setting query time range, be aware of data retention on your data lake tables and whether data is available for selected time range. For more information, see [Manage data tiers and retention in Microsoft Defender portal (preview)](https://aka.ms/manage-data-defender-portal-overview).
102102
+ KQL queries against the data lake are lower performant than queries on analytics tier. It’s recommended to use KQL queries against the data lake only when exploring historical data or when tables are stored in data lake-only mode.
103103

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,12 @@
11
---
22
title: include file
33
description: include file
4-
author: rolyon
4+
author: jenniferf-skc
55
ms.service: role-based-access-control
66
ms.topic: include
7-
ms.date: 01/08/2021
8-
ms.author: rolyon
7+
ms.date: 08/01/2025
8+
ms.author: jfields
99
ms.custom: include file
1010
---
1111

12-
When you assign roles, you must specify a scope. Scope is the set of resources the access applies to. In Azure, you can specify a scope at four levels from broad to narrow: [management group](../../articles/governance/management-groups/overview.md), subscription, [resource group](../../articles/azure-resource-manager/management/overview.md#resource-groups), and resource.
12+
When you assign roles, you must specify a scope. A Scope is the set of resources the access applies to. In Azure, you can specify a scope at four levels from broad to narrow: [management group](../../articles/governance/management-groups/overview.md), subscription, [resource group](../../articles/azure-resource-manager/management/overview.md#resource-groups), and resource.

0 commit comments

Comments
 (0)