Skip to content

Commit dcce8ac

Browse files
authored
Merge pull request #220598 from MicrosoftDocs/repo_sync_working_branch
Confirm merge from repo_sync_working_branch to main to sync with https://github.com/MicrosoftDocs/azure-docs (branch main)
2 parents 2f61690 + c5a7e07 commit dcce8ac

File tree

6 files changed

+9
-7
lines changed

6 files changed

+9
-7
lines changed

articles/active-directory/authentication/concept-authentication-methods-manage.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -75,7 +75,7 @@ For users who are enabled for **Mobile phone** for SSPR, the independent control
7575

7676
Similarly, let's suppose you enable **Voice calls** for a group. After you enable it, you find that even users who aren't group members can sign-in with a voice call. In this case, it's likely those users are enabled for **Mobile phone** in the legacy SSPR policy or **Call to phone** in the legacy MFA policy.
7777

78-
## Migration between policies
78+
## Migration between policies (preview)
7979

8080
The Authentication methods policy provides a migration path toward unified administration of all authentication methods. All desired methods can be enabled in the Authentication methods policy. Methods in the legacy MFA and SSPR policies can be disabled. Migration has three settings to let you move at your own pace, and avoid problems with sign-in or SSPR during the transition. After migration is complete, you'll centralize control over authentication methods for both sign-in and SSPR in a single place, and the legacy MFA and SSPR policies will be disabled.
8181

articles/active-directory/authentication/howto-password-smart-lockout.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -77,7 +77,7 @@ To check or modify the smart lockout values for your organization, complete the
7777
The default is 60 seconds (one minute).
7878

7979
> [!NOTE]
80-
> If the first sign-in after a lockout also fails, the account locks out again. If an account locks repeatedly, the lockout duration increases.
80+
> If the first sign-in after a lockout period has expired also fails, the account locks out again. If an account locks repeatedly, the lockout duration increases.
8181
8282
![Customize the Azure AD smart lockout policy in the Azure portal](./media/howto-password-smart-lockout/azure-active-directory-custom-smart-lockout-policy.png)
8383

articles/active-directory/devices/howto-device-identity-virtual-desktop-infrastructure.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -39,6 +39,8 @@ It's important to ensure organizations manage stale devices that are created bec
3939
> [!IMPORTANT]
4040
> Failure to manage stale devices can lead to pressure increase on your tenant quota usage consumption and potential risk of service interruption, if you run out of tenant quota. You should follow the guidance documented below when deploying non persistent VDI environments to avoid this situation.
4141
42+
For successful execution of some scenarios, it is important to have unique device names in the directory. This can be achieved by proper management of stale devices, or you can guarantee device name uniqueness by using some pattern in device naming.
43+
4244
This article will cover Microsoft's guidance to administrators on support for device identity and VDI. For more information about device identity, see the article [What is a device identity](overview.md).
4345

4446
## Supported scenarios

articles/logic-apps/move-logic-app-resources.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,9 @@ To move a resource, such as a logic app or integration account, to another Azure
3636

3737
1. In the [Azure portal](https://portal.azure.com), find and select the logic app resource that you want to move.
3838

39-
1. On the resource's **Overview** page, next to **Subscription**, select the **change** link.
39+
1. On the resource navigation menu, select **Overview**. Next to the **Subscription** label, select **move**.
40+
41+
You can also go to the resource's **Properties** page, and under **Subscription Name**, select **Change subscription**.
4042

4143
1. On the **Move resources** page, select the logic app resource and any related resources that you want to move.
4244

articles/virtual-machines/linux/add-disk.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.service: storage
66
ms.subservice: disks
77
ms.collection: linux
88
ms.topic: how-to
9-
ms.date: 06/08/2022
9+
ms.date: 12/05/2022
1010
ms.author: rogarana
1111
---
1212

@@ -154,7 +154,7 @@ In this example, we are using the nano editor, so when you are done editing the
154154
155155
### TRIM/UNMAP support for Linux in Azure
156156

157-
Some Linux kernels support TRIM/UNMAP operations to discard unused blocks on the disk. This feature is primarily useful in standard storage to inform Azure that deleted pages are no longer valid and can be discarded, and can save money if you create large files and then delete them.
157+
Some Linux kernels support TRIM/UNMAP operations to discard unused blocks on the disk. This feature is primarily useful to inform Azure that deleted pages are no longer valid and can be discarded. This feature can save money on disks that are billed based on the amount of consumed storage, such as unmanaged standard disks and disk snapshots. Managed disks are billed based on the size of the disk and hence don't benefit.
158158

159159
There are two ways to enable TRIM support in your Linux VM. As usual, consult your distribution for the recommended approach:
160160

articles/virtual-network/network-security-groups-overview.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -40,8 +40,6 @@ Security rules are evaluated and applied based on the five-tuple (source, source
4040

4141
Existing connections may not be interrupted when you remove a security rule that enabled the flow. Traffic flows are interrupted when connections are stopped and no traffic is flowing in either direction, for at least a few minutes.
4242

43-
Modifying NSG rules will only impact the new connections that are formed. When a new rule is created or an existing rule is updated in a network security group, it will only apply to new flows and new connections. Existing workflow connections are not updated with the new rules.
44-
4543
Modifying network security group rules will only affect the new connections that are formed. When a new rule is created or an existing rule is updated in a network security group, it will only apply to new flows and new connections. Existing workflow connections aren't updated with the new rules.
4644

4745
There are limits to the number of security rules you can create in a network security group. For details, see [Azure limits](../azure-resource-manager/management/azure-subscription-service-limits.md?toc=%2fazure%2fvirtual-network%2ftoc.json#azure-resource-manager-virtual-networking-limits).

0 commit comments

Comments
 (0)