Skip to content

Commit e71bbee

Browse files
authored
Merge pull request #234779 from MicrosoftDocs/repo_sync_working_branch
Confirm merge from repo_sync_working_branch to main to sync with https://github.com/MicrosoftDocs/azure-docs (branch main)
2 parents ff903b8 + 735297c commit e71bbee

File tree

14 files changed

+26
-175
lines changed

14 files changed

+26
-175
lines changed

articles/active-directory/conditional-access/concept-conditional-access-conditions.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -118,7 +118,7 @@ These browsers support device authentication, allowing the device to be identifi
118118
> [!NOTE]
119119
> Edge 85+ requires the user to be signed in to the browser to properly pass device identity. Otherwise, it behaves like Chrome without the accounts extension. This sign-in might not occur automatically in a Hybrid Azure AD Join scenario.
120120
>
121-
> Safari is supported for device-based Conditional Access, but it can not satisfy the **Require approved client app** or **Require app protection policy** conditions. A managed browser like Microsoft Edge will satisfy approved client app and app protection policy requirements.
121+
> Safari is supported for device-based Conditional Access on a managed device, but it can not satisfy the **Require approved client app** or **Require app protection policy** conditions. A managed browser like Microsoft Edge will satisfy approved client app and app protection policy requirements.
122122
> On iOS with 3rd party MDM solution only Microsoft Edge browser supports device policy.
123123
>
124124
> [Firefox 91+](https://support.mozilla.org/kb/windows-sso) is supported for device-based Conditional Access, but "Allow Windows single sign-on for Microsoft, work, and school accounts" needs to be enabled.

articles/active-directory/reports-monitoring/concept-audit-logs.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -66,7 +66,7 @@ With an application-centric view, you can get answers to questions such as:
6666

6767
## How do I access it?
6868

69-
The audit activity report is available in all editions of Azure AD. To access the audit logs, you need to have one of the following roles:
69+
To access the audit log for a tenant, you must have one of the following roles:
7070

7171
- Reports Reader
7272
- Security Reader
@@ -76,7 +76,7 @@ The audit activity report is available in all editions of Azure AD. To access th
7676

7777
Sign in to the Azure portal and go to **Azure AD** and select **Audit log** from the **Monitoring** section.
7878

79-
You can also access the audit log through the [Microsoft Graph API](/graph/api/resources/azure-ad-auditlog-overview).
79+
The audit activity report is available in [all editions of Azure AD](reference-reports-data-retention.md#how-long-does-azure-ad-store-the-data). If you have an Azure Active Directory P1 or P2 license, you can access the audit log through the [Microsoft Graph API](/graph/api/resources/azure-ad-auditlog-overview). See [Getting started with Azure Active Directory Premium](../fundamentals/active-directory-get-started-premium.md) to upgrade your Azure Active Directory edition. It will take a couple of days for the data to show up in Graph after you upgrade to a premium license with no data activities before the upgrade.
8080

8181
## What do the logs show?
8282

articles/active-directory/roles/delegate-by-task.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -264,7 +264,7 @@ You can further restrict permissions by assigning roles at smaller scopes or by
264264
> | ---- | --------------------- | ---------------- |
265265
> | Manage identity providers | [External Identity Provider Administrator](permissions-reference.md#external-identity-provider-administrator) | |
266266
> | Manage settings | [Global Administrator](permissions-reference.md#global-administrator) | |
267-
> | Manage terms of use | [Global Administrator](permissions-reference.md#global-administrator) | |
267+
> | Manage privacy statement and contact | [Global Administrator](permissions-reference.md#global-administrator) | |
268268
> | Read all configuration | [Global Reader](permissions-reference.md#global-reader) | |
269269
270270
## Password reset

articles/aks/azure-cni-overlay.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -99,7 +99,7 @@ Azure CNI Overlay has the following limitations:
9999
- Windows Server 2019 node pools are **not** supported for Overlay
100100
- Traffic from host network pods is not able to reach Windows Overlay pods.
101101
- Sovereign Clouds are not supported
102-
- Virtual Machine Scale Sets (VMAS) are not supported for Overlay
102+
- Virtual Machine Availability Sets (VMAS) are not supported for Overlay
103103
- Dualstack networking is not supported in Overlay
104104
- You can't use [DCsv2-series](/azure/virtual-machines/dcv2-series) virtual machines in node pools. To meet Confidential Computing requirements, consider using [DCasv5 or DCadsv5-series confidential VMs](/azure/virtual-machines/dcasv5-dcadsv5-series) instead.
105105

articles/applied-ai-services/metrics-advisor/faq.yml

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -66,7 +66,6 @@ sections:
6666
6767
| Granularity(min) | Retention(day) |
6868
|------------------| ------------------|
69-
| 1 | 6.94 |
7069
| 5 | 34.72|
7170
| 15 | 104.1|
7271
| 60(=hourly) | 416.67 |

articles/applied-ai-services/metrics-advisor/includes/quickstarts/csharp.md

Lines changed: 1 addition & 38 deletions
Original file line numberDiff line numberDiff line change
@@ -79,66 +79,29 @@ Create and assign persistent environment variables for your key and endpoint.
7979

8080
```CMD
8181
setx METRICS_ADVISOR_ENDPOINT "REPLACE_WITH_YOUR_ENDPOINT_HERE"
82-
```
83-
84-
```CMD
8582
setx METRICS_ADVISOR_KEY "REPLACE_WITH_YOUR_KEY_VALUE_HERE"
86-
```
87-
88-
```CMD
8983
setx METRICS_ADVISOR_API_KEY "REPLACE_WITH_YOUR_KEY_VALUE_HERE"
90-
```
91-
92-
```CMD
9384
setx SQL_CONNECTION_STRING "REPLACE_WITH_YOUR_UNIQUE_SQL_CONNECTION_STRING"
94-
```
95-
96-
```CMD
9785
setx SQL_QUERY "REPLACE_WITH_YOUR_UNIQUE_SQL_QUERY_BASED_ON_THE_UNDERLYING_STRUCTURE_OF_YOUR_DATA"
9886
```
9987

10088
# [PowerShell](#tab/powershell)
10189

10290
```powershell
10391
[System.Environment]::SetEnvironmentVariable('METRICS_ADVISOR_ENDPOINT', 'REPLACE_WITH_YOUR_ENDPOINT_HERE', 'User')
104-
```
105-
106-
```powershell
10792
[System.Environment]::SetEnvironmentVariable('METRICS_ADVISOR_KEY', 'REPLACE_WITH_YOUR_KEY_VALUE_HERE', 'User')
108-
```
109-
110-
```powershell
11193
[System.Environment]::SetEnvironmentVariable('METRICS_ADVISOR_API_KEY', 'REPLACE_WITH_YOUR_KEY_VALUE_HERE', 'User')
112-
```
113-
114-
```powershell
11594
[System.Environment]::SetEnvironmentVariable('SQL_CONNECTION_STRING', 'REPLACE_WITH_YOUR_UNIQUE_SQL_CONNECTION_STRING', 'User')
116-
```
117-
118-
```powershell
11995
[System.Environment]::SetEnvironmentVariable('SQL_QUERY', 'REPLACE_WITH_YOUR_UNIQUE_SQL_QUERY_BASED_ON_THE_UNDERLYING_STRUCTURE_OF_YOUR_DATA', 'User')
12096
```
12197

12298
# [Bash](#tab/bash)
12399

124100
```Bash
125101
echo export METRICS_ADVISOR_ENDPOINT="REPLACE_WITH_YOUR_ENDPOINT_HERE" >> /etc/environment && source /etc/environment
126-
```
127-
128-
129-
```Bash
130102
echo export METRICS_ADVISOR_KEY="REPLACE_WITH_YOUR_KEY_VALUE_HERE" >> /etc/environment && source /etc/environment
131-
```
132-
133-
```Bash
134103
echo export METRICS_ADVISOR_API_KEY="REPLACE_WITH_YOUR_KEY_VALUE_HERE" >> /etc/environment && source /etc/environment
135-
```
136-
137-
```Bash
138104
echo export SQL_CONNECTION_STRING="REPLACE_WITH_YOUR_UNIQUE_SQL_CONNECTION_STRING" >> /etc/environment && source /etc/environment
139-
```
140-
141-
```Bash
142105
echo export SQL_QUERY="REPLACE_WITH_YOUR_UNIQUE_SQL_QUERY_BASED_ON_THE_UNDERLYING_STRUCTURE_OF_YOUR_DATA" >> /etc/environment && source /etc/environment
143106
```
144107

@@ -361,4 +324,4 @@ Run the application from your application directory with the `dotnet run` comman
361324

362325
```dotnet
363326
dotnet run
364-
```
327+
```

articles/applied-ai-services/metrics-advisor/includes/quickstarts/javascript.md

Lines changed: 1 addition & 38 deletions
Original file line numberDiff line numberDiff line change
@@ -71,66 +71,29 @@ Create and assign persistent environment variables for your key and endpoint.
7171

7272
```CMD
7373
setx METRICS_ADVISOR_ENDPOINT "REPLACE_WITH_YOUR_ENDPOINT_HERE"
74-
```
75-
76-
```CMD
7774
setx METRICS_ADVISOR_KEY "REPLACE_WITH_YOUR_KEY_VALUE_HERE"
78-
```
79-
80-
```CMD
8175
setx METRICS_ADVISOR_API_KEY "REPLACE_WITH_YOUR_KEY_VALUE_HERE"
82-
```
83-
84-
```CMD
8576
setx SQL_CONNECTION_STRING "REPLACE_WITH_YOUR_UNIQUE_SQL_CONNECTION_STRING"
86-
```
87-
88-
```CMD
8977
setx SQL_QUERY "REPLACE_WITH_YOUR_UNIQUE_SQL_QUERY_BASED_ON_THE_UNDERLYING_STRUCTURE_OF_YOUR_DATA"
9078
```
9179

9280
# [PowerShell](#tab/powershell)
9381

9482
```powershell
9583
[System.Environment]::SetEnvironmentVariable('METRICS_ADVISOR_ENDPOINT', 'REPLACE_WITH_YOUR_ENDPOINT_HERE', 'User')
96-
```
97-
98-
```powershell
9984
[System.Environment]::SetEnvironmentVariable('METRICS_ADVISOR_KEY', 'REPLACE_WITH_YOUR_KEY_VALUE_HERE', 'User')
100-
```
101-
102-
```powershell
10385
[System.Environment]::SetEnvironmentVariable('METRICS_ADVISOR_API_KEY', 'REPLACE_WITH_YOUR_KEY_VALUE_HERE', 'User')
104-
```
105-
106-
```powershell
10786
[System.Environment]::SetEnvironmentVariable('SQL_CONNECTION_STRING', 'REPLACE_WITH_YOUR_UNIQUE_SQL_CONNECTION_STRING', 'User')
108-
```
109-
110-
```powershell
11187
[System.Environment]::SetEnvironmentVariable('SQL_QUERY', 'REPLACE_WITH_YOUR_UNIQUE_SQL_QUERY_BASED_ON_THE_UNDERLYING_STRUCTURE_OF_YOUR_DATA', 'User')
11288
```
11389

11490
# [Bash](#tab/bash)
11591

11692
```Bash
11793
echo export METRICS_ADVISOR_ENDPOINT="REPLACE_WITH_YOUR_ENDPOINT_HERE" >> /etc/environment && source /etc/environment
118-
```
119-
120-
121-
```Bash
12294
echo export METRICS_ADVISOR_KEY="REPLACE_WITH_YOUR_KEY_VALUE_HERE" >> /etc/environment && source /etc/environment
123-
```
124-
125-
```Bash
12695
echo export METRICS_ADVISOR_API_KEY="REPLACE_WITH_YOUR_KEY_VALUE_HERE" >> /etc/environment && source /etc/environment
127-
```
128-
129-
```Bash
13096
echo export SQL_CONNECTION_STRING="REPLACE_WITH_YOUR_UNIQUE_SQL_CONNECTION_STRING" >> /etc/environment && source /etc/environment
131-
```
132-
133-
```Bash
13497
echo export SQL_QUERY="REPLACE_WITH_YOUR_UNIQUE_SQL_QUERY_BASED_ON_THE_UNDERLYING_STRUCTURE_OF_YOUR_DATA" >> /etc/environment && source /etc/environment
13598
```
13699

@@ -418,4 +381,4 @@ Run the application with the `node` command on your quickstart file.
418381

419382
```console
420383
node index.js
421-
```
384+
```

articles/applied-ai-services/metrics-advisor/includes/quickstarts/python.md

Lines changed: 1 addition & 38 deletions
Original file line numberDiff line numberDiff line change
@@ -55,66 +55,29 @@ Create and assign persistent environment variables for your key and endpoint.
5555

5656
```CMD
5757
setx METRICS_ADVISOR_ENDPOINT "REPLACE_WITH_YOUR_ENDPOINT_HERE"
58-
```
59-
60-
```CMD
6158
setx METRICS_ADVISOR_KEY "REPLACE_WITH_YOUR_KEY_VALUE_HERE"
62-
```
63-
64-
```CMD
6559
setx METRICS_ADVISOR_API_KEY "REPLACE_WITH_YOUR_KEY_VALUE_HERE"
66-
```
67-
68-
```CMD
6960
setx SQL_CONNECTION_STRING "REPLACE_WITH_YOUR_UNIQUE_SQL_CONNECTION_STRING"
70-
```
71-
72-
```CMD
7361
setx SQL_QUERY "REPLACE_WITH_YOUR_UNIQUE_SQL_QUERY_BASED_ON_THE_UNDERLYING_STRUCTURE_OF_YOUR_DATA"
7462
```
7563

7664
# [PowerShell](#tab/powershell)
7765

7866
```powershell
7967
[System.Environment]::SetEnvironmentVariable('METRICS_ADVISOR_ENDPOINT', 'REPLACE_WITH_YOUR_ENDPOINT_HERE', 'User')
80-
```
81-
82-
```powershell
8368
[System.Environment]::SetEnvironmentVariable('METRICS_ADVISOR_KEY', 'REPLACE_WITH_YOUR_KEY_VALUE_HERE', 'User')
84-
```
85-
86-
```powershell
8769
[System.Environment]::SetEnvironmentVariable('METRICS_ADVISOR_API_KEY', 'REPLACE_WITH_YOUR_KEY_VALUE_HERE', 'User')
88-
```
89-
90-
```powershell
9170
[System.Environment]::SetEnvironmentVariable('SQL_CONNECTION_STRING', 'REPLACE_WITH_YOUR_UNIQUE_SQL_CONNECTION_STRING', 'User')
92-
```
93-
94-
```powershell
9571
[System.Environment]::SetEnvironmentVariable('SQL_QUERY', 'REPLACE_WITH_YOUR_UNIQUE_SQL_QUERY_BASED_ON_THE_UNDERLYING_STRUCTURE_OF_YOUR_DATA', 'User')
9672
```
9773

9874
# [Bash](#tab/bash)
9975

10076
```Bash
10177
echo export METRICS_ADVISOR_ENDPOINT="REPLACE_WITH_YOUR_ENDPOINT_HERE" >> /etc/environment && source /etc/environment
102-
```
103-
104-
105-
```Bash
10678
echo export METRICS_ADVISOR_KEY="REPLACE_WITH_YOUR_KEY_VALUE_HERE" >> /etc/environment && source /etc/environment
107-
```
108-
109-
```Bash
11079
echo export METRICS_ADVISOR_API_KEY="REPLACE_WITH_YOUR_KEY_VALUE_HERE" >> /etc/environment && source /etc/environment
111-
```
112-
113-
```Bash
11480
echo export SQL_CONNECTION_STRING="REPLACE_WITH_YOUR_UNIQUE_SQL_CONNECTION_STRING" >> /etc/environment && source /etc/environment
115-
```
116-
117-
```Bash
11881
echo export SQL_QUERY="REPLACE_WITH_YOUR_UNIQUE_SQL_QUERY_BASED_ON_THE_UNDERLYING_STRUCTURE_OF_YOUR_DATA" >> /etc/environment && source /etc/environment
11982
```
12083

@@ -320,4 +283,4 @@ Run the application with the `python` command on your quickstart file.
320283

321284
```console
322285
python quickstart-file.py
323-
```
286+
```

articles/applied-ai-services/metrics-advisor/includes/quickstarts/rest-api.md

Lines changed: 1 addition & 38 deletions
Original file line numberDiff line numberDiff line change
@@ -46,66 +46,29 @@ Create and assign persistent environment variables for your key and endpoint.
4646

4747
```CMD
4848
setx METRICS_ADVISOR_ENDPOINT "REPLACE_WITH_YOUR_ENDPOINT_HERE"
49-
```
50-
51-
```CMD
5249
setx METRICS_ADVISOR_KEY "REPLACE_WITH_YOUR_KEY_VALUE_HERE"
53-
```
54-
55-
```CMD
5650
setx METRICS_ADVISOR_API_KEY "REPLACE_WITH_YOUR_KEY_VALUE_HERE"
57-
```
58-
59-
```CMD
6051
setx SQL_CONNECTION_STRING "REPLACE_WITH_YOUR_UNIQUE_SQL_CONNECTION_STRING"
61-
```
62-
63-
```CMD
6452
setx SQL_QUERY "REPLACE_WITH_YOUR_UNIQUE_SQL_QUERY_BASED_ON_THE_UNDERLYING_STRUCTURE_OF_YOUR_DATA"
6553
```
6654

6755
# [PowerShell](#tab/powershell)
6856

6957
```powershell
7058
[System.Environment]::SetEnvironmentVariable('METRICS_ADVISOR_ENDPOINT', 'REPLACE_WITH_YOUR_ENDPOINT_HERE', 'User')
71-
```
72-
73-
```powershell
7459
[System.Environment]::SetEnvironmentVariable('METRICS_ADVISOR_KEY', 'REPLACE_WITH_YOUR_KEY_VALUE_HERE', 'User')
75-
```
76-
77-
```powershell
7860
[System.Environment]::SetEnvironmentVariable('METRICS_ADVISOR_API_KEY', 'REPLACE_WITH_YOUR_KEY_VALUE_HERE', 'User')
79-
```
80-
81-
```powershell
8261
[System.Environment]::SetEnvironmentVariable('SQL_CONNECTION_STRING', 'REPLACE_WITH_YOUR_UNIQUE_SQL_CONNECTION_STRING', 'User')
83-
```
84-
85-
```powershell
8662
[System.Environment]::SetEnvironmentVariable('SQL_QUERY', 'REPLACE_WITH_YOUR_UNIQUE_SQL_QUERY_BASED_ON_THE_UNDERLYING_STRUCTURE_OF_YOUR_DATA', 'User')
8763
```
8864

8965
# [Bash](#tab/bash)
9066

9167
```Bash
9268
echo export METRICS_ADVISOR_ENDPOINT="REPLACE_WITH_YOUR_ENDPOINT_HERE" >> /etc/environment && source /etc/environment
93-
```
94-
95-
96-
```Bash
9769
echo export METRICS_ADVISOR_KEY="REPLACE_WITH_YOUR_KEY_VALUE_HERE" >> /etc/environment && source /etc/environment
98-
```
99-
100-
```Bash
10170
echo export METRICS_ADVISOR_API_KEY="REPLACE_WITH_YOUR_KEY_VALUE_HERE" >> /etc/environment && source /etc/environment
102-
```
103-
104-
```Bash
10571
echo export SQL_CONNECTION_STRING="REPLACE_WITH_YOUR_UNIQUE_SQL_CONNECTION_STRING" >> /etc/environment && source /etc/environment
106-
```
107-
108-
```Bash
10972
echo export SQL_QUERY="REPLACE_WITH_YOUR_UNIQUE_SQL_QUERY_BASED_ON_THE_UNDERLYING_STRUCTURE_OF_YOUR_DATA" >> /etc/environment && source /etc/environment
11073
```
11174

@@ -456,4 +419,4 @@ if __name__ == '__main__':
456419
'x-api-key': api_key}).content)
457420
print(alert_config)
458421
anomaly_alerting_configuration_id = alert_config['anomalyAlertingConfigurationId']
459-
```
422+
```

articles/defender-for-cloud/concept-cloud-security-posture-management.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ For commercial and national cloud coverage, see the [features supported in diffe
2323

2424
Defender for Cloud offers foundational multicloud CSPM capabilities for free. These capabilities are automatically enabled by default on any subscription or account that has onboarded to Defender for Cloud. The foundational CSPM includes asset discovery, continuous assessment and security recommendations for posture hardening, compliance with Microsoft Cloud Security Benchmark (MCSB), and a [Secure score](secure-score-access-and-track.md) which measure the current status of your organization's posture.
2525

26-
The optional Defender CSPM plan, provides advanced posture management capabilities such as [Attack path analysis](how-to-manage-attack-path.md), [Cloud security explorer](how-to-manage-cloud-security-explorer.md), advanced threat hunting, [security governance capabilities](concept-regulatory-compliance.md), and also tools to assess your [security compliance](review-security-recommendations.md) with a wide range of benchmarks, regulatory standards, and any custom security policies required in your organization, industry, or region.
26+
The optional Defender CSPM plan, provides advanced posture management capabilities such as [Attack path analysis](how-to-manage-attack-path.md), [Cloud security explorer](how-to-manage-cloud-security-explorer.md), advanced threat hunting, [security governance capabilities](governance-rules.md), and also tools to assess your [security compliance](review-security-recommendations.md) with a wide range of benchmarks, regulatory standards, and any custom security policies required in your organization, industry, or region.
2727

2828
### Plan pricing
2929

@@ -58,7 +58,7 @@ The following table summarizes each plan and their cloud availability.
5858
| Workflow automation | :::image type="icon" source="./media/icons/yes-icon.png"::: | :::image type="icon" source="./media/icons/yes-icon.png"::: | Azure, AWS, GCP, on-premises |
5959
| Remediation tracking | :::image type="icon" source="./media/icons/yes-icon.png"::: | :::image type="icon" source="./media/icons/yes-icon.png"::: | Azure, AWS, GCP, on-premises |
6060
| Microsoft Cloud Security Benchmark | :::image type="icon" source="./media/icons/yes-icon.png"::: | :::image type="icon" source="./media/icons/yes-icon.png"::: | Azure, AWS |
61-
| [Governance](concept-regulatory-compliance.md) | - | :::image type="icon" source="./media/icons/yes-icon.png"::: | Azure, AWS, GCP, on-premises |
61+
| [Governance](governance-rules.md) | - | :::image type="icon" source="./media/icons/yes-icon.png"::: | Azure, AWS, GCP, on-premises |
6262
| [Regulatory compliance](concept-regulatory-compliance.md) | - | :::image type="icon" source="./media/icons/yes-icon.png"::: | Azure, AWS, GCP, on-premises |
6363
| [Cloud security explorer](how-to-manage-cloud-security-explorer.md) | - | :::image type="icon" source="./media/icons/yes-icon.png"::: | Azure, AWS |
6464
| [Attack path analysis](how-to-manage-attack-path.md) | - | :::image type="icon" source="./media/icons/yes-icon.png"::: | Azure, AWS |

0 commit comments

Comments
 (0)