Skip to content

Commit dc646da

Browse files
authored
Merge pull request #46964 from MicrosoftDocs/master
7/18 PM Publish
2 parents b9786bd + bd8ecd1 commit dc646da

File tree

54 files changed

+786
-2655
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

54 files changed

+786
-2655
lines changed

.openpublishing.redirection.json

Lines changed: 82 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -739,11 +739,21 @@
739739
"redirect_url": "/azure/active-directory/managed-service-identity/howto-assign-access-portal",
740740
"redirect_document_id": true
741741
},
742+
{
743+
"source_path": "articles/active-directory/pp/msi-howto-assign-access-portal.md",
744+
"redirect_url": "/azure/active-directory/managed-service-identity/howto-assign-access-portal",
745+
"redirect_document_id": false
746+
},
742747
{
743748
"source_path": "articles/active-directory/msi-howto-assign-access-powershell.md",
744749
"redirect_url": "/azure/active-directory/managed-service-identity/howto-assign-access-powershell",
745750
"redirect_document_id": true
746751
},
752+
{
753+
"source_path": "articles/active-directory/pp/msi-howto-assign-access-powershell.md",
754+
"redirect_url": "/azure/active-directory/managed-service-identity/howto-assign-access-powershell",
755+
"redirect_document_id": false
756+
},
747757
{
748758
"source_path": "articles/active-directory/msi-how-to-use-vm-sdk.md",
749759
"redirect_url": "/azure/active-directory/managed-service-identity/how-to-use-vm-sdk",
@@ -779,6 +789,11 @@
779789
"redirect_url": "/azure/active-directory/managed-service-identity/qs-configure-portal-windows-vm",
780790
"redirect_document_id": true
781791
},
792+
{
793+
"source_path": "articles/active-directory/pp/msi-qs-configure-portal-windows-vm.md",
794+
"redirect_url": "/azure/active-directory/managed-service-identity/qs-configure-portal-windows-vm",
795+
"redirect_document_id": false
796+
},
782797
{
783798
"source_path": "articles/active-directory/msi-qs-configure-portal-windows-vmss.md",
784799
"redirect_url": "/azure/active-directory/managed-service-identity/qs-configure-portal-windows-vmss",
@@ -789,6 +804,11 @@
789804
"redirect_url": "/azure/active-directory/managed-service-identity/qs-configure-powershell-windows-vm",
790805
"redirect_document_id": true
791806
},
807+
{
808+
"source_path": "articles/active-directory/pp/msi-qs-configure-powershell-windows-vm.md",
809+
"redirect_url": "/azure/active-directory/managed-service-identity/qs-configure-powershell-windows-vm",
810+
"redirect_document_id": false
811+
},
792812
{
793813
"source_path": "articles/active-directory/msi-qs-configure-sdk-windows-vm.md",
794814
"redirect_url": "/azure/active-directory/managed-service-identity/qs-configure-sdk-windows-vm",
@@ -799,6 +819,11 @@
799819
"redirect_url": "/azure/active-directory/managed-service-identity/qs-configure-template-windows-vm",
800820
"redirect_document_id": true
801821
},
822+
{
823+
"source_path": "articles/active-directory/pp/msi-qs-configure-template-windows-vm.md",
824+
"redirect_url": "/azure/active-directory/managed-service-identity/qs-configure-template-windows-vm",
825+
"redirect_document_id": false
826+
},
802827
{
803828
"source_path": "articles/active-directory/msi-qs-configure-template-windows-vmss.md",
804829
"redirect_url": "/azure/active-directory/managed-service-identity/qs-configure-template-windows-vmss",
@@ -814,16 +839,31 @@
814839
"redirect_url": "/azure/active-directory/managed-service-identity/tutorial-linux-vm-access-datalake",
815840
"redirect_document_id": true
816841
},
842+
{
843+
"source_path": "articles/active-directory/pp/msi-tutorial-linux-vm-access-datalake.md",
844+
"redirect_url": "/azure/active-directory/managed-service-identity/tutorial-linux-vm-access-datalake",
845+
"redirect_document_id": false
846+
},
817847
{
818848
"source_path": "articles/active-directory/msi-tutorial-linux-vm-access-nonaad.md",
819849
"redirect_url": "/azure/active-directory/managed-service-identity/tutorial-linux-vm-access-nonaad",
820850
"redirect_document_id": true
821851
},
852+
{
853+
"source_path": "articles/active-directory/pp/msi-tutorial-linux-vm-access-nonaad.md",
854+
"redirect_url": "/azure/active-directory/managed-service-identity/tutorial-linux-vm-access-nonaad",
855+
"redirect_document_id": false
856+
},
822857
{
823858
"source_path": "articles/active-directory/msi-tutorial-linux-vm-access-storage-sas.md",
824859
"redirect_url": "/azure/active-directory/managed-service-identity/tutorial-linux-vm-access-storage-sas",
825860
"redirect_document_id": false
826861
},
862+
{
863+
"source_path": "articles/active-directory/pp/msi-tutorial-linux-vm-access-storage-sas.md",
864+
"redirect_url": "/azure/active-directory/managed-service-identity/tutorial-linux-vm-access-storage-sas",
865+
"redirect_document_id": false
866+
},
827867
{
828868
"source_path": "articles/active-directory/msi-tutorial-linux-vm-access-storage.md",
829869
"redirect_url": "/azure/active-directory/managed-service-identity/tutorial-linux-vm-access-storage",
@@ -834,31 +874,61 @@
834874
"redirect_url": "/azure/active-directory/managed-service-identity/tutorial-windows-vm-access-arm",
835875
"redirect_document_id": true
836876
},
877+
{
878+
"source_path": "articles/active-directory/pp/msi-tutorial-windows-vm-access-arm.md",
879+
"redirect_url": "/azure/active-directory/managed-service-identity/tutorial-windows-vm-access-arm",
880+
"redirect_document_id": false
881+
},
837882
{
838883
"source_path": "articles/active-directory/msi-tutorial-windows-vm-access-datalake.md",
839884
"redirect_url": "/azure/active-directory/managed-service-identity/tutorial-windows-vm-access-datalake",
840885
"redirect_document_id": true
841886
},
887+
{
888+
"source_path": "articles/active-directory/pp/msi-tutorial-windows-vm-access-datalake.md",
889+
"redirect_url": "/azure/active-directory/managed-service-identity/tutorial-windows-vm-access-datalake",
890+
"redirect_document_id": false
891+
},
842892
{
843893
"source_path": "articles/active-directory/msi-tutorial-windows-vm-access-nonaad.md",
844894
"redirect_url": "/azure/active-directory/managed-service-identity/tutorial-windows-vm-access-nonaad",
845895
"redirect_document_id": true
846896
},
897+
{
898+
"source_path": "articles/active-directory/pp/msi-tutorial-windows-vm-access-nonaad.md",
899+
"redirect_url": "/azure/active-directory/managed-service-identity/tutorial-windows-vm-access-nonaad",
900+
"redirect_document_id": false
901+
},
847902
{
848903
"source_path": "articles/active-directory/msi-tutorial-windows-vm-access-sql.md",
849904
"redirect_url": "/azure/active-directory/managed-service-identity/tutorial-windows-vm-access-sql",
850905
"redirect_document_id": true
851906
},
907+
{
908+
"source_path": "articles/active-directory/pp/msi-tutorial-windows-vm-access-sql.md",
909+
"redirect_url": "/azure/active-directory/managed-service-identity/tutorial-windows-vm-access-sql",
910+
"redirect_document_id": false
911+
},
852912
{
853913
"source_path": "articles/active-directory/msi-tutorial-windows-vm-access-storage-sas.md",
854914
"redirect_url": "/azure/active-directory/managed-service-identity/tutorial-windows-vm-access-storage-sas",
855915
"redirect_document_id": true
856916
},
917+
{
918+
"source_path": "articles/active-directory/pp/msi-tutorial-windows-vm-access-storage-sas.md",
919+
"redirect_url": "/azure/active-directory/managed-service-identity/tutorial-windows-vm-access-storage-sas",
920+
"redirect_document_id": false
921+
},
857922
{
858923
"source_path": "articles/active-directory/msi-tutorial-windows-vm-access-storage.md",
859924
"redirect_url": "/azure/active-directory/managed-service-identity/tutorial-windows-vm-access-storage",
860925
"redirect_document_id": true
861926
},
927+
{
928+
"source_path": "articles/active-directory/pp/msi-tutorial-windows-vm-access-storage.md",
929+
"redirect_url": "/azure/active-directory/managed-service-identity/tutorial-windows-vm-access-storage",
930+
"redirect_document_id": false
931+
},
862932
{
863933
"source_path": "articles/active-directory/active-directory-self-service-application-access.md",
864934
"redirect_url": "/azure/active-directory/application-access-self-service-how-to",
@@ -24817,7 +24887,12 @@
2481724887
},
2481824888
{
2481924889
"source_path": "articles/active-directory/pp/index.md",
24820-
"redirect_url": "/azure/active-directory/pp/msi-tutorial-linux-vm-access-storage",
24890+
"redirect_url": "/azure/active-directory/managed-service-identity/index",
24891+
"redirect_document_id": false
24892+
},
24893+
{
24894+
"source_path": "articles/active-directory/pp/msi-tutorial-linux-vm-access-storage.md",
24895+
"redirect_url": "/azure/active-directory/managed-service-identity/tutorial-linux-vm-access-storage",
2482124896
"redirect_document_id": false
2482224897
},
2482324898
{
@@ -26329,6 +26404,11 @@
2632926404
"source_path": "articles/hdinsight/kafka/apache-kafka-azure-functions.md",
2633026405
"redirect_url": "/azure/hdinsight/kafka/apache-kafka-introduction",
2633126406
"redirect_document_id": false
26332-
}
26407+
},
26408+
{
26409+
"source_path": "articles/cognitive-services/LUIS/traffic-manager.md",
26410+
"redirect_url": "/azure/cognitive-services/LUIS/luis-traffic-manager",
26411+
"redirect_document_id": true
26412+
}
2633326413
]
2633426414
}

articles/active-directory/active-directory-tou.md

Lines changed: 19 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.tgt_pltfrm: na
1212
ms.devlang: na
1313
ms.topic: conceptual
1414
ms.component: compliance-reports
15-
ms.date: 06/29/2018
15+
ms.date: 07/18/2018
1616
ms.author: rolyon
1717

1818
---
@@ -82,7 +82,7 @@ Once you have finalized your Terms of use document, use the following procedure
8282

8383
![Add TOU](media/active-directory-tou/create-tou.png)
8484

85-
## View who has accepted and declined
85+
## View report of who has accepted and declined
8686
The Terms of use blade shows a count of the users who have accepted and declined. These counts and who accepted/declined are stored for the life of the Terms of use.
8787

8888
1. Sign in to Azure and navigate to **Terms of use** at [https://aka.ms/catou](https://aka.ms/catou).
@@ -93,10 +93,10 @@ The Terms of use blade shows a count of the users who have accepted and declined
9393

9494
![Audit Event](media/active-directory-tou/accepted-tou.png)
9595

96-
## View audit logs
96+
## View Azure AD audit logs
9797
If you want to view additional activity, Azure AD Terms of use includes audit logs. Each user consent triggers an event in the audit logs that is stored for 30 days. You can view these logs in the portal or download as a .csv file.
9898

99-
To get started with audit logs, use the following procedure:
99+
To get started with Azure AD audit logs, use the following procedure:
100100

101101
1. Sign in to Azure and navigate to **Terms of use** at [https://aka.ms/catou](https://aka.ms/catou).
102102

@@ -163,11 +163,20 @@ Conditional access policies take effect immediately. When this happens, the admi
163163
## Frequently asked questions
164164

165165
**Q: How do I see when/if a user has accepted a Terms of use?**</br>
166-
A: On the Terms of use blade, click the number under **Accepted**. You can also view or search the accept activity in the audit logs. For more information, see [View who has accepted and declined](#view-who-has-accepted-and-declined) and [View audit logs](#view-audit-logs).
166+
A: On the Terms of use blade, click the number under **Accepted**. You can also view or search the accept activity in the Azure AD audit logs. For more information, see [View report of who has accepted and declined](#view-who-has-accepted-and-declined) and [View Azure AD audit logs](#view-azure-ad-audit-logs).
167+
168+
**Q: How long is information stored?**</br>
169+
A: The user counts in the Terms of use report and who accepted/declined are stored for the life of the Terms of use. The Azure AD audit logs are stored for 30 days.
167170

168-
**Q: If you change the Terms of use terms, does it require users to accept again?**</br>
171+
**Q: Why do I see a different number of consents in the Terms of use report vs. the Azure AD audit logs?**</br>
172+
A: The Terms of use report is stored for the lifetime of that Terms of use, while the Azure AD audit logs are stored for 30 days. Also, the Terms of use report only displays the users current consent state. For example, if a user declines and then accepts, the Terms of use report will only show that user's accept. If you need to see the history, you can use the Azure AD audit logs.
173+
174+
**Q: If I change the Terms of use terms, does it require users to accept again?**</br>
169175
A: Yes, an administrator can change the Terms of use terms and it requires users to reaccept the new terms.
170176

177+
**Q: If hyperlinks are in the Terms of use PDF document, will end users be able to click them?**</br>
178+
A: The PDF is rendered by default as a JPEG, so hyperlinks are not clickable. Users have the option to select **Having trouble viewing? Click here**, which renders the PDF natively where hyperlinks are supported.
179+
171180
**Q: Can a Terms of use support multiple languages?**</br>
172181
A: Yes. Currently there are 18 different languages an administrator can configure for a single Terms of use.
173182

@@ -185,6 +194,7 @@ A: The user is blocked from getting access to the application. The user would ha
185194

186195
**Q: Is it possible to unaccept Terms of use that were previously accepted?**</br>
187196
A: You can [review previously accepted Terms of use](#how-users-can-review-their-terms-of-use), but currently there isn't a way to unaccept.
188-
189-
**Q: How long is information stored?**</br>
190-
A: The user counts and who accepted/declined are stored for the life of the Terms of use. The audit logs are stored for 30 days.
197+
198+
## Next steps
199+
200+
- [Best practices for conditional access in Azure Active Directory](active-directory-conditional-access-best-practices.md)

articles/active-directory/device-management-faq.md

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -99,6 +99,11 @@ For down-level Windows OS versions that are on-premises AD domain-joined:
9999

100100
---
101101

102+
**Q: How do I connect to a remote Azure AD joined device?**
103+
**A:** Refer to the article https://docs.microsoft.com/en-us/windows/client-management/connect-to-remote-aadj-pc for details.
104+
105+
---
106+
102107
**Q: Why do I see duplicate device entries in Azure portal?**
103108

104109
**A:**

articles/active-directory/device-management-troubleshoot-hybrid-join-windows-legacy.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -53,6 +53,8 @@ This article provides you with troubleshooting guidance on how to resolve potent
5353

5454
- A reinstallation of the operating system or manual re-registration may create a new registration in Azure AD, which results in multiple entries under the USER info tab in the Azure portal.
5555

56+
- Make sure [KB4284842](https://support.microsoft.com/en-us/help/4284842) is installed, in case of Windows 7 SP1 or Windows Server 2008 R2 SP1. This update prevents future authentication failures due to customer's access loss to protected keys after changing password.
57+
5658
## Step 1: Retrieve the registration status
5759

5860
**To verify the registration status:**

articles/active-directory/fundamentals/whats-new.md

Lines changed: 12 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -35,27 +35,27 @@ This page is updated monthly, so revisit it regularly.
3535

3636
## July 2018
3737

38-
### New Azure AD email design and sender information - End of July
38+
### Improvements to Azure Active Directory email notifications
3939

4040
**Type:** Plan for change
4141
**Service category:** Other
4242
**Product capability:** Identity lifecycle management
4343

44-
At the **end of July 2018**, you'll notice that all Azure AD emails will have an updated design, sender email address, and sender display name when sent from the following services:
45-
46-
- Azure AD Identity Protection
47-
- Azure AD Connect Health
48-
- Azure AD Provisioning Service
49-
- Azure AD Enterprise Application Management
44+
At the **end of July 2018**, Azure Active Directory (Azure AD) emails will feature an updated design, as well as changes to the sender email address and sender display name, when sent from the following services:
45+
5046
- Azure AD Access Reviews
47+
- Azure AD Connect Health
48+
- Azure AD Identity Protection
5149
- Azure AD Privileged Identity Management
50+
- Enterprise App Expiring Certificate Notifications
51+
- Enterprise App Provisioning Service Notifications
52+
53+
The email notifications will be sent from the following email address and display name:
5254

53-
Also at that time, email notifications will start to use the following address:
54-
55-
- Display name: Microsoft Azure
5655
- Email address: [email protected]
57-
58-
For an example of some of the new e-mail designs, see [Email notifications in Azure AD PIM](https://go.microsoft.com/fwlink/?linkid=2005832).
56+
- Display name: Microsoft Azure
57+
58+
For an example of some of the new e-mail designs and more information, see [Email notifications in Azure AD PIM](https://go.microsoft.com/fwlink/?linkid=2005832).
5959

6060
---
6161

articles/active-directory/pp/TOC.yml

Lines changed: 0 additions & 4 deletions
This file was deleted.

articles/active-directory/pp/msi-howto-assign-access-portal.md

Lines changed: 0 additions & 60 deletions
This file was deleted.

0 commit comments

Comments
 (0)