You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/authentication/howto-authentication-use-email-signin.md
+9-9Lines changed: 9 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ services: active-directory
6
6
ms.service: active-directory
7
7
ms.subservice: authentication
8
8
ms.topic: how-to
9
-
ms.date: 01/03/2023
9
+
ms.date: 01/30/2023
10
10
11
11
ms.author: justinha
12
12
author: calui
@@ -43,8 +43,8 @@ Here's what you need to know about email as an alternate login ID:
43
43
* If the non-UPN email in use becomes stale (no longer belongs to the user), these claims will return the UPN instead.
44
44
* The feature supports managed authentication with Password Hash Sync (PHS) or Pass-Through Authentication (PTA).
45
45
* There are two options for configuring the feature:
46
-
*[Home Realm Discovery (HRD) policy](#enable-user-sign-in-with-an-email-address) - Use this option to enable the feature for the entire tenant. Global administrator privileges required.
47
-
*[Staged rollout policy](#enable-staged-rollout-to-test-user-sign-in-with-an-email-address) - Use this option to test the feature with specific Azure AD groups. Global administrator privileges required. When you first add a security group for staged rollout, you're limited to 200 users to avoid a UX time-out. After you've added the group, you can add more users directly to it, as required.
46
+
*[Home Realm Discovery (HRD) policy](#enable-user-sign-in-with-an-email-address) - Use this option to enable the feature for the entire tenant. Global Administrator, Application Administrator, or Cloud Application Administrator role is required.
47
+
*[Staged rollout policy](#enable-staged-rollout-to-test-user-sign-in-with-an-email-address) - Use this option to test the feature with specific Azure AD groups. Global Administrator privileges required. When you first add a security group for staged rollout, you're limited to 200 users to avoid a UX time-out. After you've added the group, you can add more users directly to it, as required.
48
48
49
49
## Preview limitations
50
50
@@ -132,11 +132,11 @@ Email as an alternate login ID applies to [Azure AD B2B collaboration](../extern
132
132
133
133
Once users with the *ProxyAddresses* attribute applied are synchronized to Azure AD using Azure AD Connect, you need to enable the feature for users to sign in with email as an alternate login ID for your tenant. This feature tells the Azure AD login servers to not only check the sign-in identifier against UPN values, but also against *ProxyAddresses* values for the email address.
134
134
135
-
During preview, you currently need *global administrator* permissions to enable sign-in with email as an alternate login ID. You can use either Azure portal or PowerShell to set up the feature.
135
+
During preview, you currently need *Global Administrator* permissions to enable sign-in with email as an alternate login ID. You can use either Azure portal or PowerShell to set up the feature.
136
136
137
137
### Azure portal
138
138
139
-
1. Sign in to the [Azure portal][azure-portal] as a *global administrator*.
139
+
1. Sign in to the [Azure portal][azure-portal] as a *Global Administrator*.
140
140
1. Search for and select **Azure Active Directory**.
141
141
1. From the navigation menu on the left-hand side of the Azure Active Directory window, select **Azure AD Connect > Email as alternate login ID**.
142
142
@@ -156,7 +156,7 @@ With the policy applied, it can take up to 1 hour to propagate and for users to
156
156
157
157
Once users with the *ProxyAddresses* attribute applied are synchronized to Azure AD using Azure AD Connect, you need to enable the feature for users to sign-in with email as an alternate login ID for your tenant. This feature tells the Azure AD login servers to not only check the sign-in identifier against UPN values, but also against *ProxyAddresses* values for the email address.
158
158
159
-
During preview, you can currently only enable email as an alternate login ID using PowerShell or the Microsoft Graph API. You need *global administrator* privileges to complete the following steps:
159
+
During preview, you can currently only enable email as an alternate login ID using PowerShell or the Microsoft Graph API. You need *Global Administrator* privileges to complete the following steps:
160
160
161
161
1. Open a PowerShell session as an administrator, then install the *Microsoft.Graph* module using the `Install-Module` cmdlet:
Staged rollout policy allows tenant administrators to enable features for specific Azure AD groups. It is recommended that tenant administrators use staged rollout to test user sign-in with an email address. When administrators are ready to deploy this feature to their entire tenant, they should use [HRD policy](#enable-user-sign-in-with-an-email-address).
275
275
276
276
277
-
You need *global administrator* permissions to complete the following steps:
277
+
You need *Global Administrator* permissions to complete the following steps:
278
278
279
279
1. Open a PowerShell session as an administrator, then install the *AzureADPreview* module using the [Install-Module][Install-Module] cmdlet:
280
280
@@ -284,7 +284,7 @@ You need *global administrator* permissions to complete the following steps:
284
284
285
285
If prompted, select **Y** to install NuGet or to install from an untrusted repository.
286
286
287
-
1. Sign in to your Azure AD tenant as a *global administrator* using the [Connect-AzureAD][Connect-AzureAD] cmdlet:
287
+
1. Sign in to your Azure AD tenant as a *Global Administrator* using the [Connect-AzureAD][Connect-AzureAD] cmdlet:
288
288
289
289
```powershell
290
290
Connect-AzureAD
@@ -379,7 +379,7 @@ Within a tenant, a cloud-only user's UPN may take on the same value as another u
379
379
380
380
If prompted, select **Y** to install NuGet or to install from an untrusted repository.
381
381
382
-
1. Sign in to your Azure AD tenant as a *global administrator* using the [Connect-AzureAD][Connect-AzureAD] cmdlet:
382
+
1. Sign in to your Azure AD tenant as a *Global Administrator* using the [Connect-AzureAD][Connect-AzureAD] cmdlet:
Copy file name to clipboardExpand all lines: articles/active-directory/standards/memo-22-09-multi-factor-authentication.md
+1-3Lines changed: 1 addition & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -65,9 +65,7 @@ For more information on deploying this method, see the following resources:
65
65
66
66
>[!NOTE]
67
67
>
68
-
> Today, Microsoft Authenticator by itself is **not** phishing-resistant. You must additionally secure the authentication with the phishing resistant properties gained from conditional access policy enforcement of managed devices.
69
-
>
70
-
>**Microsoft Authenticator native phishing resistance is in development.** Once available, Microsoft Authenticator will be natively phishing-resistant without reliance on conditional access policies that enforce Hybrid join device or device marked as compliant.
68
+
> Today, Microsoft Authenticator by itself is not phishing-resistant. You must additionally configure conditional access policy requiring managed device to gain protection from external phishing threats.
Copy file name to clipboardExpand all lines: articles/azure-monitor/agents/agents-overview.md
+4-1Lines changed: 4 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ description: Overview of the Azure Monitor Agent, which collects monitoring data
4
4
ms.topic: conceptual
5
5
author: guywi-ms
6
6
ms.author: guywild
7
-
ms.date: 1/24/2023
7
+
ms.date: 1/30/2023
8
8
ms.custom: references_regions
9
9
ms.reviewer: shseth
10
10
@@ -84,6 +84,9 @@ In addition to the generally available data collection listed above, Azure Monit
84
84
|[Network Watcher](../../network-watcher/network-watcher-monitoring-overview.md)| Connection Monitor: Public preview | Azure NetworkWatcher extension |[Monitor network connectivity by using Azure Monitor Agent](../../network-watcher/azure-monitor-agent-with-connection-monitor.md)|
85
85
|[SQL Best Practices Assessment](/sql/sql-server/azure-arc/assess/)| Generally available ||[Configure best practices assessment using Azure Monitor Agent](/sql/sql-server/azure-arc/assess#enable-best-practices-assessment)|
86
86
87
+
> [!NOTE]
88
+
> Features and services listed above in preview **may not be available in Azure Government and China clouds**. They will be available typically within a month *after* the features/services become generally available.
| arg1 |Yes |string or int |The value to convert to a boolean. The string value is case-insensitive. 0 is considered to be false and all other integers are considered to be true. |
28
+
| arg1 |Yes |string or int |The value to convert to a boolean. String value "true" with any combination of upper and lower case characters (for example "True", "TRUE", "tRue", "true") are considered to be equivalent and represent the boolean value of `true`, otherwise `false`. Integer value 0 is considered to be `false` and all other integers are considered to be `true`. |
title: 'View Azure DDoS Protection alerts in Microsoft Defender for Cloud'
3
+
description: Learn how to view DDoS protection alerts in Microsoft Defender for Cloud.
4
+
services: ddos-protection
5
+
documentationcenter: na
6
+
author: AbdullahBell
7
+
ms.service: ddos-protection
8
+
ms.topic: how-to
9
+
ms.tgt_pltfrm: na
10
+
ms.workload: infrastructure-services
11
+
ms.date: 01/30/2023
12
+
ms.author: abell
13
+
---
14
+
15
+
# View Azure DDoS Protection alerts in Microsoft Defender for Cloud
16
+
17
+
Microsoft Defender for Cloud provides a list of [security alerts](../security-center/security-center-managing-and-responding-alerts.md), with information to help investigate and remediate problems. With this feature, you get a unified view of alerts, including DDoS attack-related alerts and the actions taken to mitigate the attack in near-time.
18
+
There are two specific alerts that you'll see for any DDoS attack detection and mitigation:
19
+
20
+
-**DDoS Attack detected for Public IP**: This alert is generated when the DDoS protection service detects that one of your public IP addresses is the target of a DDoS attack.
21
+
-**DDoS Attack mitigated for Public IP**: This alert is generated when an attack on the public IP address has been mitigated.
22
+
To view the alerts, open **Defender for Cloud** in the Azure portal and select **Security alerts**. Under **Threat Protection**, select **Security alerts**. The following screenshot shows an example of the DDoS attack alerts.
23
+
24
+
:::image type="content" source="./media/manage-ddos-protection/ddos-alert-asc.png" alt-text="Screenshot of DDoS Alert in Microsoft Defender for Cloud." lightbox="./media/manage-ddos-protection/ddos-alert-asc.png":::
25
+
26
+
## Prerequisites
27
+
28
+
- An Azure account with an active subscription. [Create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
29
+
-[DDoS Network Protection](manage-ddos-protection.md) must be enabled on a virtual network or [DDoS IP Protection (Preview)](manage-ddos-protection-powershell-ip.md) must be enabled on a public IP address.
30
+
31
+
## View alerts in Microsoft Defender for Cloud
32
+
33
+
1. Sign in to the [Azure portal](https://portal.azure.com/).
34
+
1. In the search box at the top of the portal, enter **Microsoft Defender for Cloud**. Select **Microsoft Defender for Cloud** in the search results.
35
+
1. Under *General* in the side tab, select **Security alerts**. To filter the alerts list, select your subscription, or any of the relevant filters. You can optionally add filters with the **Add filter** option.
36
+
37
+
:::image type="content" source="./media/manage-ddos-protection/ddos-protection-security-alerts.png" alt-text="Screenshot of Security alert in Microsoft Defender for Cloud.":::
38
+
39
+
The alerts include general information about the public IP address that’s under attack, geo and threat intelligence information, and remediation steps.
40
+
41
+
## Next steps
42
+
43
+
In this How-To, you learned how to view alerts in Microsoft Defender for Cloud.
44
+
45
+
To learn how to test and simulate a DDoS attack, see the simulation testing guide:
46
+
47
+
> [!div class="nextstepaction"]
48
+
> [Test through simulations](test-through-simulations.md)
In this article, you create, view, and delete [**Azure Machine Learning workspaces**](concept-workspace.md) for [Azure Machine Learning](overview-what-is-azure-machine-learning.md), using the [Azure portal](https://portal.azure.com) or the [SDK for Python](/python/api/overview/azure/ml/).
24
+
In this article, you create, view, and delete [**Azure Machine Learning workspaces**](concept-workspace.md) for [Azure Machine Learning](overview-what-is-azure-machine-learning.md), using the [Azure portal](https://portal.azure.com) or the [SDK for Python](https://aka.ms/sdk-v2-install).
25
25
26
26
As your needs change or requirements for automation increase you can also manage workspaces [using the CLI](how-to-manage-workspace-cli.md), [Azure PowerShell](how-to-manage-workspace-powershell.md), or [via the VS Code extension](how-to-setup-vs-code.md).
Copy file name to clipboardExpand all lines: articles/machine-learning/how-to-run-jupyter-notebooks.md
-6Lines changed: 0 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -172,12 +172,6 @@ Once you're connected to a compute instance, use the toolbar to run all cells in
172
172
173
173
Only you can see and use the compute instances you create. Your **User files** are stored separately from the VM and are shared among all compute instances in the workspace.
174
174
175
-
### View logs and output
176
-
177
-
Use [notebook widgets](/python/api/azureml-widgets/azureml.widgets) to view the progress of the run and logs. A widget is asynchronous and provides updates until training finishes. Azure Machine Learning widgets are also supported in Jupyter and JupterLab.
On the notebook toolbar, use the **Variable explorer** tool to show the name, type, length, and sample values for all variables that have been created in your notebook.
0 commit comments