Skip to content

Commit e32ea47

Browse files
authored
Merge pull request #46739 from MicrosoftDocs/master
7/16 PM Publish
2 parents 0b05bde + 5f321b8 commit e32ea47

File tree

132 files changed

+1024
-2095
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

132 files changed

+1024
-2095
lines changed

.openpublishing.redirection.json

Lines changed: 31 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12670,6 +12670,11 @@
1267012670
"redirect_url": "./end-user/microsoft-authenticator-app-how-to",
1267112671
"redirect_document_id": false
1267212672
},
12673+
{
12674+
"source_path": "articles/service-fabric/service-fabric-update-vmss-sku.md",
12675+
"redirect_url": "/azure/service-fabric/service-fabric-cluster-upgrade-primary-nodetype-vm",
12676+
"redirect_document_id": false
12677+
},
1267312678
{
1267412679
"source_path": "articles/service-fabric/service-fabric-enable-azure-disk-encryption-linux.md",
1267512680
"redirect_url": "/azure/service-fabric/service-fabric-cluster-creation-via-portal",
@@ -23300,6 +23305,26 @@
2330023305
"redirect_url": "/azure/active-directory/authentication/howto-mfa-userdevicesettings",
2330123306
"redirect_document_id": true
2330223307
},
23308+
{
23309+
"source_path": "articles/network-watcher/network-watcher-nsg-flow-logging-cli-nodejs.md",
23310+
"redirect_url": "/azure/network-watcher/network-watcher-nsg-flow-logging-cli",
23311+
"redirect_document_id": true
23312+
},
23313+
{
23314+
"source_path": "articles/network-watcher/network-watcher-packet-capture-manage-cli-nodejs.md",
23315+
"redirect_url": "/azure/network-watcher/network-watcher-packet-capture-manage-cli",
23316+
"redirect_document_id": true
23317+
},
23318+
{
23319+
"source_path": "articles/network-watcher/network-watcher-security-group-view-cli-nodejs.md",
23320+
"redirect_url": "/azure/network-watcher/network-watcher-security-group-view-cli",
23321+
"redirect_document_id": true
23322+
},
23323+
{
23324+
"source_path": "articles/network-watcher/network-watcher-troubleshoot-manage-cli-nodejs.md",
23325+
"redirect_url": "/azure/network-watcher/network-watcher-troubleshoot-manage-cli",
23326+
"redirect_document_id": true
23327+
},
2330323328
{
2330423329
"source_path": "articles/network-watcher/network-watcher-check-ip-flow-verify-cli-nodejs.md",
2330523330
"redirect_url": "/azure/network-watcher/diagnose-vm-network-traffic-filtering-problem-cli",
@@ -26279,6 +26304,11 @@
2627926304
"source_path": "articles/active-directory/active-directory-saas-access-panel-user-help.md",
2628026305
"redirect_url": "/azure/active-directory/user-help/active-directory-saas-access-panel-user-help",
2628126306
"redirect_document_id": true
26282-
}
26307+
},
26308+
{
26309+
"source_path": "articles/hdinsight/kafka/apache-kafka-azure-functions.md",
26310+
"redirect_url": "/azure/hdinsight/kafka/apache-kafka-introduction",
26311+
"redirect_document_id": false
26312+
}
2628326313
]
2628426314
}

articles/active-directory-domain-services/active-directory-ds-suspension.md

Lines changed: 63 additions & 21 deletions
Original file line numberDiff line numberDiff line change
@@ -14,56 +14,99 @@ ms.workload: identity
1414
ms.tgt_pltfrm: na
1515
ms.devlang: na
1616
ms.topic: article
17-
ms.date: 07/09/2018
17+
ms.date: 07/16/2018
1818
ms.author: ergreenl
1919

2020
---
2121
# Suspended domains
2222
When Azure AD Domain Services is unable to service a managed domain for a long period of time, the managed domain is put into a suspended state. This article will explain why managed domains are suspended, the length of suspension, and how to remediate a suspended domain.
2323

2424

25-
## Overview of suspended domains
25+
## States your managed domain can be in
2626

2727
![Suspended domain timeline](media\active-directory-domain-services-suspension\suspension-timeline.PNG)
2828

2929
The preceding graphic outlines how a domain is suspended, how long it will be suspended, and ultimately, the deletion of a managed domain. The following sections detail the reasons why a domain can be suspended and how to unsuspend a managed domain.
3030

31+
### 'Running' state
32+
A managed domain that is configured correctly and operating regularly is in the **Running** state.
3133

32-
## Why are managed domains suspended?
34+
**What you can expect:**
35+
* Microsoft is able to regularly monitor the health of your managed domain.
36+
* Domain controllers for your managed domain are patched and updated regularly.
37+
* Changes from Azure Active Directory are regularly synchronized to your managed domain.
38+
* Regular backups are taken for your managed domain.
3339

34-
Managed domains are suspended when they are in a state where Azure AD Domain Services is unable to manage the domain. This can be caused by a misconfiguration that blocks access to resources needed by Azure AD Domain Services, or an inactive Azure subscription. After 15 days of being unable to service a managed domain, Azure AD Domain Services will suspend the domain.
3540

36-
The exact reasons why your domain could be suspended are listed below:
37-
* Having one or more of the following alerts present on your domain for 15 consecutive days:
38-
* [AADDS104: Network Error](active-directory-ds-troubleshoot-nsg.md).
39-
* Your Azure subscription is expired or inactive
41+
### 'Needs Attention' state
42+
A managed domain is in the **Needs Attention** state, if one or more issues require an administrator to take action. The health page of your managed domain will list one or more alerts in this state. For example, if you've configured a restrictive NSG for your virtual network, Microsoft may be unable to update and monitor your managed domain. This invalid configuration results in an alert being generated and your managed domain is put in the 'Needs Attention' state.
4043

44+
Each alert has a set of resolution steps. Some alerts are transient and will get automatically resolved by the service. You can resolve some other alerts by following the instructions in the corresponding resolution steps for that alert. To resolve some critical alerts, you need to contact Microsoft support.
4145

42-
## What happens when a domain is suspended?
46+
For more information, see [how to troubleshoot alerts on a managed domain](active-directory-ds-troubleshoot-alerts.md).
4347

44-
When a domain is suspended, Azure AD Domain Services stops the virtual machines that service your managed domain. This means that backups are no longer taken, users are unable to sign-in to your domain, and synchronization with Azure AD is no longer performed.
48+
**What you can expect:**
4549

46-
The domain will only stay in a suspension state for a maximum of 15 days. In order to ensure a timely recovery, it is recommended you address the suspension as soon as possible.
50+
In some instances (for example, if you have an invalid network configuration), the domain controllers for your managed domain may be unreachable. Therefore, Microsoft cannot guarantee your managed domain is monitored, patched, updated or backed-up on a regular basis in this state.
4751

48-
## How do I know if my domain is suspended?
49-
The managed domain will receive an [alert](active-directory-ds-troubleshoot-alerts.md) on the Azure AD Domain Services Health page in the Azure portal that declares the domain suspended. In addition, the state of the domain will be labelled "Suspended".
52+
* Your managed domain is in an unhealthy state and ongoing health monitoring may be impacted, until the alert is resolved.
53+
* Domain controllers for your managed domain may not be patched or updated.
54+
* Changes from Azure Active Directory may not be synchronized to your managed domain.
55+
* Backups for your managed domain may be taken, if possible.
56+
* If you resolve the alerts impacting your managed domain, it may be possible to restore your managed domain to the 'Running' state.
57+
* Critical alerts are triggered for configuration issues where Microsoft is unable to reach your domain controllers. If such alerts are not resolved within 15 days, your managed domain will be put in the 'Suspended' state.
5058

5159

52-
## Unsuspending and restoring domains
60+
### 'Suspended' state
61+
A managed domain is put in the **Suspended** state for the following reasons:
62+
* One or more critical alerts have not been remediated in 15 days. This can be caused by a misconfiguration that blocks access to resources needed by Azure AD Domain Services.
63+
* For example, if the managed domain has alert [AADDS104: Network Error](active-directory-ds-troubleshoot-nsg.md) unresolved for over 15 days.
64+
* There is a billing issue with your Azure subscription or if the Azure subscription has expired.
5365

54-
To unsuspend a domain, the following steps are needed:
66+
Managed domains are suspended when Microsoft is unable to manage, monitor, patch or backup the domain on an ongoing basis.
67+
68+
**What you can expect:**
69+
* Domain controllers for your managed domain are de-provisioned and are not reachable within the virtual network.
70+
* Secure LDAP access to the managed domain over the internet (if enabled) stops working.
71+
* You will see failures in authenticating to the managed domain, logging on to domain joined virtual machines, connecting over LDAP/LDAPS etc.
72+
* Backups for your managed domain are no longer taken.
73+
* You need to resolve the alert causing your managed domain to be in the 'Suspended' state and then contact support.
74+
* Support may be able to restore your managed domain, only if there is an existing backup that is less than 30 days old.
75+
76+
77+
### 'Deleted' state
78+
A managed domain that stays in the 'Suspended' state for 15 days is **Deleted**.
79+
80+
**What you can expect:**
81+
* All resources and backups for the managed domain are deleted.
82+
* You cannot restore the managed domain and will need to create a new managed domain to use Azure AD Domain Services.
83+
* You will not be billed for the managed domain.
84+
85+
86+
## What happens when a managed domain is suspended?
87+
When a domain is suspended, Azure AD Domain Services stops and de-provisions the domain controllers for your managed domain. As a result, backups are no longer taken, users are unable to sign-in to your domain, and synchronization with Azure AD stops.
88+
89+
The managed domain will only stay in a suspended state for a maximum of 15 days. In order to ensure a timely recovery, it is recommended you address the suspension as soon as possible.
90+
91+
92+
## How do I know if my managed domain is suspended?
93+
You will see an [alert](active-directory-ds-troubleshoot-alerts.md) on the Azure AD Domain Services Health page in the Azure portal that declares the domain suspended. In addition, the state of the domain shows "Suspended".
94+
95+
96+
## How do I restore a suspended domain?
97+
To restore a domain in the 'Suspended' state, complete the following steps:
5598

5699
1. Navigate to the [Azure AD Domain Services page](https://portal.azure.com/#blade/HubsExtension/Resources/resourceType/Microsoft.AAD%2FdomainServices) on the Azure portal
57100
2. Click on the domain you wish to unsuspend
58101
3. On the left-hand navigation, click **Health**
59-
4. Click on the suspension alert (The Alert ID will be either AADDS503 or AADDS504, depending on the cause of suspension).
60-
5. Click on the resolution link provided in the alert and follow the steps to resolving your suspension.
102+
4. Click on the alert. The alert ID will be either AADDS503 or AADDS504, depending on the cause of suspension.
103+
5. Click on the resolution link provided in the alert and follow the steps to resolve the alert.
61104

62-
Your domain can only be restored from the date of last backup. The date of your last backup is displayed on the Health page of your managed domain. Any changes since the last backup will not be restored upon unsuspension. In addition, Azure AD Domain Services can only store backups for up to 30 days. If the latest backup is more than 30 days old, the backup must be deleted and Azure AD Domain Services will be unable to restore from a backup.
105+
Your domain can only be restored to the date of last backup. The date of your last backup is displayed on the Health page of your managed domain. Any changes that occurred after the last backup will not be restored. Backups for a managed domain are stored for up to 30 days. Backups older than 30 days are deleted.
63106

64-
## Deleting domains
65107

66-
If the domain is suspended for more than 15 days, Azure AD Domain Services deletes the managed domain due to inactivity and the inability to service the domain. You will no longer be billed for Azure AD Domain Services. To restore your managed domain, you will need to recreate it.
108+
## Deleting domains
109+
If the domain is suspended for more than 15 days, Azure AD Domain Services deletes the managed domain due to inactivity and the inability to service the domain. You will no longer be billed for Azure AD Domain Services. At this point, you cannot restore your managed domain and need to recreate it.
67110

68111

69112
## Next steps
@@ -72,5 +115,4 @@ If the domain is suspended for more than 15 days, Azure AD Domain Services delet
72115
- [Contact the product team](active-directory-ds-contact-us.md)
73116

74117
## Contact Us
75-
76118
Contact the Azure Active Directory Domain Services product team to [share feedback or for support](active-directory-ds-contact-us.md).

articles/active-directory/active-directory-conditional-access-app-sign-in-risk.md

Lines changed: 22 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.devlang: na
1414
ms.topic: article
1515
ms.tgt_pltfrm: na
1616
ms.workload: identity
17-
ms.date: 07/03/2018
17+
ms.date: 07/16/2018
1818
ms.author: markvi
1919
ms.reviewer: calebb
2020
#Customer intent: As an IT admin, I want to configure a policy to handle suspicious sign-ins, so that they can be automatically handled.
@@ -70,7 +70,7 @@ This section shows how to create the required conditional access policy. In your
7070
| Grant | Block access |
7171

7272

73-
![Create policy](./media/active-directory-conditional-access-app-sign-in-risk/115.png)
73+
![Create policy](./media/active-directory-conditional-access-app-sign-in-risk/130.png)
7474

7575

7676

@@ -123,6 +123,26 @@ This section shows how to create the required conditional access policy. In your
123123

124124
b. Click **Done**.
125125

126+
10. Click **Conditions**.
127+
128+
![Access controls](./media/active-directory-conditional-access-app-sign-in-risk/19.png)
129+
130+
11. On the **Conditions** page:
131+
132+
![Sign-in risk level](./media/active-directory-conditional-access-app-sign-in-risk/21.png)
133+
134+
a. Click **Sign-in risk**.
135+
136+
b. As **Configure**, click **Yes**.
137+
138+
c. As sign-in risk level, select **Medium**.
139+
140+
d. Click **Select**.
141+
142+
e. On the **Conditions** page, click **Done**.
143+
144+
145+
126146
10. In the **Access controls** section, click **Grant**.
127147

128148
![Access controls](./media/active-directory-conditional-access-app-sign-in-risk/10.png)

articles/active-directory/b2b/licensing-guidance.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -63,7 +63,7 @@ A B2B guest user is one that is invited from a partner organization to work with
6363

6464
## Next steps
6565

66-
See the following articles articles on Azure AD B2B collaboration:
66+
See the following articles on Azure AD B2B collaboration:
6767

6868
* [What is Azure AD B2B collaboration?](what-is-b2b.md)
6969
* [Azure Active Directory B2B collaboration frequently asked questions (FAQ)](faq.md)

articles/active-directory/connect/active-directory-aadconnect-feature-automatic-upgrade.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -13,13 +13,13 @@ ms.devlang: na
1313
ms.topic: article
1414
ms.tgt_pltfrm: na
1515
ms.workload: identity
16-
ms.date: 07/13/2017
16+
ms.date: 06/16/2018
1717
ms.component: hybrid
1818
ms.author: billmath
1919

2020
---
2121
# Azure AD Connect: Automatic upgrade
22-
This feature was introduced with build 1.1.105.0 (released February 2016).
22+
This feature was introduced with build [1.1.105.0 (released February 2016)](active-directory-aadconnect-version-history.md#111050). This feature was updated in [build 1.1.561](active-directory-aadconnect-version-history.md#115610) and now supports additional scenarios that were previously not supported.
2323

2424
## Overview
2525
Making sure your Azure AD Connect installation is always up to date has never been easier with the **automatic upgrade** feature. This feature is enabled by default for express installations and DirSync upgrades. When a new version is released, your installation is automatically upgraded.

articles/active-directory/manage-apps/plan-an-application-integration.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.devlang: na
1313
ms.topic: article
1414
ms.tgt_pltfrm: na
1515
ms.workload: identity
16-
ms.date: 06/27/2018
16+
ms.date: 07/16/2018
1717
ms.author: barbkess
1818
ms.reviewer: asteen
1919

@@ -59,7 +59,7 @@ Maybe you don't have the answers to all of these questions up front but that's o
5959
## Application integration with Azure AD
6060
### Finding unsanctioned cloud applications with Cloud Discovery
6161
As mentioned above, there may be applications that haven't been managed by your organization until now. As part of the inventory process, it is possible to find unsanctioned cloud applications. See
62-
[Set up Cloud Discovery](/cloud-app-security/set-up-cloud-discovery.md).
62+
[Set up Cloud Discovery](/cloud-app-security/set-up-cloud-discovery).
6363

6464
### Authentication Types
6565
Each of your applications may have different authentication requirements. With Azure AD, signing certificates can be used with applications that use SAML 2.0, WS-Federation, or OpenID Connect Protocols as well as Password Single Sign On. For more information about application authentication types for use with Azure AD see [Managing Certificates for Federated Single Sign-On in Azure Active Directory](manage-certificates-for-federated-single-sign-on.md) and [Password based single sign on](what-is-single-sign-on.md).

articles/active-directory/manage-apps/what-is-single-sign-on.md

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.component: app-mgmt
1212
ms.workload: identity
1313
ms.component: users-groups-roles
1414
ms.topic: article
15-
ms.date: 06/27/2018
15+
ms.date: 07/16/2018
1616
ms.author: barbkess
1717
ms.reviewer: asmalser
1818
ms.custom: it-pro
@@ -42,8 +42,7 @@ When users sign in to an application, they go through an authentication process
4242
Azure AD supports three different ways to sign in to applications:
4343

4444
* **Federated single sign-on** enables applications to redirect to Azure AD for user authentication instead of prompting for its own password. Federated single sign-on is supported for applications that support protocols such as SAML 2.0, WS-Federation, or OpenID Connect, and is the richest mode of single sign-on.
45-
* **Password-based single sign-on** enables secure application password storage and replay using a web browser extension or mobile app. Password-based single sign-on uses the existing
46-
* process provided by the application, but enables an administrator to manage the passwords and does not require the user to know the password.
45+
* **Password-based single sign-on** enables secure application password storage and replay using a web browser extension or mobile app. Password-based single sign-on uses the existing process provided by the application, but enables an administrator to manage the passwords and does not require the user to know the password.
4746
* **Existing single sign-on** enables Azure AD to leverage any existing single sign-on that has been set up for the application, but enables these applications to be linked to the Office 365 or Azure AD access panel portals, and also enables additional reporting in Azure AD when the applications are launched there.
4847

4948
Once a user has authenticated with an application, they also need to have an account record provisioned at the application that tells the application where the permissions and level of access are inside the application. The provisioning of this account record can either occur automatically, or it can occur manually by an administrator before the user is provided single sign-on access.
@@ -191,7 +190,7 @@ These links use the same access control mechanisms as the access panel and Offic
191190
## Related articles
192191
* [Article Index for Application Management in Azure Active Directory](../active-directory-apps-index.md)
193192
* [List of Tutorials on How to Integrate SaaS Apps with Azure Active Directory](../saas-apps/tutorial-list.md)
194-
* [Set up Cloud Discovery](/cloud-app/security/set-up-cloud-discovery)
193+
* [Set up Cloud Discovery](/cloud-app-security/set-up-cloud-discovery)
195194
* [Introduction to Managing Access to Apps](what-is-access-management.md)
196195
* [Comparing Capabilities for Managing External Identities in Azure AD](../active-directory-b2b-compare-b2c.md)
197196

50.5 KB
Loading
1.6 KB
Loading
6.72 KB
Loading

0 commit comments

Comments
 (0)