You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/fundamentals/active-directory-compare-azure-ad-to-ad.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
9
9
ms.topic: conceptual
10
10
ms.workload: identity
11
11
ms.subservice: fundamentals
12
-
ms.date: 02/26/2020
12
+
ms.date: 12/23/2021
13
13
ms.author: martinco
14
14
---
15
15
@@ -24,7 +24,7 @@ Most IT administrators are familiar with Active Directory Domain Services concep
24
24
|Concept|Active Directory (AD)|Azure Active Directory |
25
25
|:-|:-|:-|
26
26
|**Users**|||
27
-
|Provisioning: users | Organizations create internal users manually or use an in-house or automated provisioning system, such as the Microsoft Identity Manager, to integrate with an HR system.|Existing AD organizations use [Azure AD Connect](../hybrid/how-to-connect-sync-whatis.md) to sync identities to the cloud.</br> Azure AD adds support to automatically create users from [cloud HR systems](../saas-apps/workday-tutorial.md). </br>Azure AD can provision identities in [SCIM enabled](../app-provisioning/use-scim-to-provision-users-and-groups.md) SaaS apps to automatically provide apps with the necessary details to allow access for users. |
27
+
|Provisioning: users | Organizations create internal users manually or use an in-house or automated provisioning system, such as the Microsoft Identity Manager, to integrate with an HR system.|Existing AD organizations use [Azure AD Connect](../hybrid/how-to-connect-sync-whatis.md) to sync identities to the cloud.</br> Azure AD adds support to automatically create users from [cloud HR systems](../app-provisioning/what-is-hr-driven-provisioning.md). </br>Azure AD can provision identities in [SCIM enabled](../app-provisioning/use-scim-to-provision-users-and-groups.md) SaaS apps to automatically provide apps with the necessary details to allow access for users. |
28
28
|Provisioning: external identities| Organizations create external users manually as regular users in a dedicated external AD forest, resulting in administration overhead to manage the lifecycle of external identities (guest users)| Azure AD provides a special class of identity to support external identities. [Azure AD B2B](/azure/active-directory/b2b/) will manage the link to the external user identity to make sure they are valid. |
29
29
| Entitlement management and groups| Administrators make users members of groups. App and resource owners then give groups access to apps or resources.|[Groups](./active-directory-groups-create-azure-portal.md) are also available in Azure AD and administrators can also use groups to grant permissions to resources. In Azure AD, administrators can assign membership to groups manually or use a query to dynamically include users to a group. </br> Administrators can use [Entitlement management](../governance/entitlement-management-overview.md) in Azure AD to give users access to a collection of apps and resources using workflows and, if necessary, time-based criteria. |
30
30
| Admin management|Organizations will use a combination of domains, organizational units, and groups in AD to delegate administrative rights to manage the directory and resources it controls.| Azure AD provides [built-in roles](./active-directory-users-assign-role-azure-portal.md) with its Azure AD role-based access control (Azure AD RBAC) system, with limited support for [creating custom roles](../roles/custom-overview.md) to delegate privileged access to the identity system, the apps, and resources it controls.</br>Managing roles can be enhanced with [Privileged Identity Management (PIM)](../privileged-identity-management/pim-configure.md) to provide just-in-time, time-restricted, or workflow-based access to privileged roles. |
@@ -46,4 +46,4 @@ Most IT administrators are familiar with Active Directory Domain Services concep
46
46
-[What is Azure Active Directory?](./active-directory-whatis.md)
47
47
-[Compare self-managed Active Directory Domain Services, Azure Active Directory, and managed Azure Active Directory Domain Services](../../active-directory-domain-services/compare-identity-solutions.md)
48
48
-[Frequently asked questions about Azure Active Directory](./active-directory-faq.yml)
49
-
-[What's new in Azure Active Directory?](./whats-new.md)
49
+
-[What's new in Azure Active Directory?](./whats-new.md)
Copy file name to clipboardExpand all lines: articles/active-directory/governance/entitlement-management-request-access.md
+6-8Lines changed: 6 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,7 +12,7 @@ ms.tgt_pltfrm: na
12
12
ms.devlang: na
13
13
ms.topic: how-to
14
14
ms.subservice: compliance
15
-
ms.date: 08/31/2021
15
+
ms.date: 12/23/2021
16
16
ms.author: ajburnle
17
17
ms.reviewer: mamkumar
18
18
ms.collection: M365-identity-device-management
@@ -49,15 +49,13 @@ Once you have found the access package in the My Access portal, you can submit a
49
49
50
50
**Prerequisite role:** Requestor
51
51
52
-
1. Find the access package in the list. If necessary, you can search by typing a search string and then selecting the **Name**, **Catalog**, or **Resources** filter.
1. Click the checkmark to select the access package.
52
+
1. Find the access package in the list. If necessary, you can search by typing a search string and then selecting the **Name** or **Resources** filter.
53
+
54
+
1. To request access you can either:
57
55
58
-
1. Click **Request access** to open the Request access pane.
56
+
1. Click the row to see Access package details, and then select Request access.
Copy file name to clipboardExpand all lines: articles/azure-maps/quick-demo-map-app.md
+19-19Lines changed: 19 additions & 19 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,9 +1,10 @@
1
1
---
2
2
title: 'Quickstart: Interactive map search with Azure Maps'
3
+
titeSuffix: Microsoft Azure Maps
3
4
description: 'Quickstart: Learn how to create interactive, searchable maps. See how to create an Azure Maps account, get a primary key, and use the Web SDK to set up map applications'
4
5
author: stevemunk
5
6
ms.author: v-munksteve
6
-
ms.date: 09/30/2021
7
+
ms.date: 12/23/2021
7
8
ms.topic: quickstart
8
9
ms.service: azure-maps
9
10
services: azure-maps
@@ -32,30 +33,29 @@ This quickstart uses the Azure Maps Web SDK, however the Azure Maps service can
32
33
33
34
Create a new Azure Maps account with the following steps:
34
35
35
-
1.In the upper left-hand corner of the [Azure portal](https://portal.azure.com), click **Create a resource**.
36
-
2.In the *Search the Marketplace* box, type **Azure Maps**.
37
-
3.From the *Results*, select **Azure Maps**. Click **Create** button that appears below the map.
38
-
4. On the **Create Maps Account** page, enter the following values:
36
+
1.Select **Create a resource** in the upper left-hand corner of the [Azure portal](https://portal.azure.com).
37
+
2.Type **Azure Maps** in the *Search services and Marketplace* box.
38
+
3.Select **Azure Maps** in the drop down list that appears, then select the **Create** button.
39
+
4. On the **Create an Azure Maps Account resource** page, enter the following values then select the **Create** button:
39
40
* The *Subscription* that you want to use for this account.
40
-
* The *Resource group* name for this account. You may choose to *Create new* or *Use existing* resource group.
41
-
* The *Name* of your new account.
42
-
* The *Pricing tier* for this account.
43
-
* Read the *License* and *Privacy Statement*, and check the checkbox to accept the terms.
44
-
* Click the **Create** button.
41
+
* The *Resource group* name for this account. You may choose to *Create new* or *Select existing* resource group.
42
+
* The *Name* of your new Azure Maps account.
43
+
* The *Pricing tier* for this account. Select **Gen2**.
44
+
* Read the *License* and *Privacy Statement*, then select the checkbox to accept the terms.
45
45
46
-
:::image type="content" source="./media/quick-demo-map-app/create-account.png" alt-text="Create Maps account in portal" lightbox="./media/quick-demo-map-app/create-account.png":::
46
+
:::image type="content" source="./media/quick-demo-map-app/create-account.png" alt-text="A screen shot showing the Create an Azure Maps Account resource page in the Azure portal." lightbox="./media/quick-demo-map-app/create-account.png":::
47
47
48
48
<aid="getkey"></a>
49
49
50
50
## Get the primary key for your account
51
51
52
-
Once your Maps account is successfully created, retrieve the primary key that enables you to query the Maps APIs.
52
+
Once your Azure Maps account is successfully created, retrieve the primary key that enables you to query the Maps APIs.
53
53
54
54
1. Open your Maps account in the portal.
55
55
2. In the settings section, select **Authentication**.
56
-
3. Copy the **Primary Key**to your clipboard. Save it locally to use later in this tutorial.
56
+
3. Copy the **Primary Key**and save it locally to use later in this tutorial.
:::image type="content" source="./media/quick-demo-map-app/get-key.png" alt-text="Screen shot showing your Azure Maps Primary Key in the Azure portal" lightbox="./media/quick-demo-map-app/get-key.png":::
59
59
60
60
>[!NOTE]
61
61
> This quickstart uses the [Shared Key](azure-maps-authentication.md#shared-key-authentication) authentication approach for demonstration purposes, but the preferred approach for any production environment is to use [Azure Active Directory](azure-maps-authentication.md#azure-ad-authentication) authentication.
@@ -77,7 +77,7 @@ Once your Maps account is successfully created, retrieve the primary key that en
77
77
4. Try out the interactive search experience. In the search box on the upper-left corner of the demo web application, search for **restaurants**.
78
78
5. Move your mouse over the list of addresses and locations that appear below the search box. Notice how the corresponding pin on the map pops out information about that location. For privacy of private businesses, fictitious names and addresses are shown.
79
79
80
-
:::image type="content" source="./media/quick-demo-map-app/interactive-search.png" alt-text="Interactive map search web application" lightbox="./media/quick-demo-map-app/interactive-search.png":::
80
+
:::image type="content" source="./media/quick-demo-map-app/interactive-search.png" alt-text="A screen shot showing the interactive map search web application." lightbox="./media/quick-demo-map-app/interactive-search.png":::
81
81
82
82
## Clean up resources
83
83
@@ -87,17 +87,17 @@ Once your Maps account is successfully created, retrieve the primary key that en
87
87
If you don't plan to continue to the tutorials, take these steps to clean up the resources:
88
88
89
89
1. Close the browser that runs the **AzureMapDemo.html** web application.
90
-
2. Navigate to the Azure portal page. Select **All resources** from the main portal page. Or, click on the menu icon in the upper left-hand corner. Select**All resources**.
91
-
3.Click on your Azure Maps account. At the top of the page, click **Delete**.
90
+
2. Navigate to the Azure portal. Select **All resources** from the main portal page, or select the menu icon in the upper left-hand corner then**All resources**.
91
+
3.Select your Azure Maps account, then select **Delete** at the top of the page.
92
92
93
-
For more code examples and an interactive coding experience, see these guides:
93
+
For more code examples and an interactive coding experience, see these articles:
94
94
95
95
*[Find an address with Azure Maps search service](how-to-search-for-address.md)
96
96
*[Use the Azure Maps Map Control](how-to-use-map-control.md)
97
97
98
98
## Next steps
99
99
100
-
In this quickstart, you created your Azure Maps account and created a demo application. Take a look at the following tutorials to learn more about Azure Maps:
100
+
In this quickstart, you created an Azure Maps account and a demo application. Take a look at the following tutorials to learn more about Azure Maps:
101
101
102
102
> [!div class="nextstepaction"]
103
103
> [Search nearby points of interest with Azure Maps](tutorial-search-location.md)
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/custom-security-policies.md
+16-18Lines changed: 16 additions & 18 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,7 +2,7 @@
2
2
title: Create custom security policies in Microsoft Defender for Cloud | Microsoft Docs
3
3
description: Azure custom policy definitions monitored by Microsoft Defender for Cloud.
4
4
ms.topic: how-to
5
-
ms.date: 11/09/2021
5
+
ms.date: 12/23/2021
6
6
zone_pivot_groups: manage-asc-initiatives
7
7
---
8
8
@@ -23,34 +23,32 @@ As discussed in [the Azure Policy documentation](../governance/policy/concepts/d
23
23
24
24
## To add a custom initiative to your subscription
25
25
26
-
1. From Defender for Cloud's menu, select**Security policy**.
26
+
1. From Defender for Cloud's menu, open**Environment settings**.
27
27
28
-
1. Select a subscription or Management Group to which you would like to add a custom initiative.
29
-
30
-
[](media/custom-security-policies/custom-policy-selecting-a-subscription.png#lightbox)
28
+
1. Select the relevant subscription or management group to which you would like to add a custom initiative.
31
29
32
30
> [!NOTE]
33
31
> For your custom initiatives to be evaluated and displayed in Defender for Cloud, you must add them at the subscription level (or higher). We recommend that you select the widest scope available.
34
32
35
-
1.In the Security policy page, under Your custom initiatives, click**Add a custom initiative**.
33
+
1.Open the **Security policy** page, and in the **Your custom initiatives** area, select**Add a custom initiative**.
36
34
37
-
[](media/custom-security-policies/custom-policy-add-initiative.png#lightbox)
35
+
:::image type="content" source="media/custom-security-policies/accessing-security-policy-page.png" alt-text="Screenshot of accessing the security policy page in Microsoft Defender for Cloud." lightbox="media/custom-security-policies/accessing-security-policy-page.png":::
38
36
39
-
The following page appears:
37
+
1. In the Add custom initiatives page, review the list of custom policies already created in your organization.
40
38
41
-

39
+
- If you see one you want to assign to your subscription, select **Add**.
40
+
- If there isn't an initiative in the list that meets your needs, create a new custom initiative:
42
41
43
-
1. In the Add custom initiatives page, review the list of custom policies already created in your organization. If you see one you want to assign to your subscription, click **Add**. If there isn't an initiative in the list that meets your needs, skip this step.
42
+
1. Select **Create new**.
43
+
1. Enter the definition's location and name.
44
+
1. Select the policies to include and select **Add**.
45
+
1. Enter any desired parameters.
46
+
1. Select **Save**.
47
+
1. In the Add custom initiatives page, click refresh. Your new initiative will be available.
48
+
1. Select **Add** and assign it to your subscription.
44
49
45
-
1. To create a new custom initiative:
50
+

46
51
47
-
1. Click **Create new**.
48
-
1. Enter the definition's location and name.
49
-
1. Select the policies to include and click **Add**.
50
-
1. Enter any desired parameters.
51
-
1. Click **Save**.
52
-
1. In the Add custom initiatives page, click refresh. Your new initiative will be shown as available.
53
-
1. Click **Add** and assign it to your subscription.
54
52
55
53
> [!NOTE]
56
54
> Creating new initiatives requires subscription owner credentials. For more information about Azure roles, see [Permissions in Microsoft Defender for Cloud](permissions.md).
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/os-coverage.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -33,7 +33,7 @@ Also ensure your Log Analytics agent is [properly configured to send data to Def
33
33
To learn more about the specific Defender for Cloud features available on Windows and Linux, see [Feature coverage for machines](supported-machines-endpoint-solutions-clouds.md).
34
34
35
35
> [!NOTE]
36
-
> Even though **Microsoft Defender for servers** is designed to protect servers, most of its are supported for Windows 10 machines. One feature that isn't currently supported is [Defender for Cloud's integrated EDR solution: Microsoft Defender for Endpoint](integration-defender-for-endpoint.md).
36
+
> Even though **Microsoft Defender for servers** is designed to protect servers, most of its features are supported for Windows 10 machines. One feature that isn't currently supported is [Defender for Cloud's integrated EDR solution: Microsoft Defender for Endpoint](integration-defender-for-endpoint.md).
0 commit comments