Skip to content

Commit e7b5f50

Browse files
committed
Syncing with main. Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into work-windowsdesktop-nov22
2 parents b9901e8 + 6f54343 commit e7b5f50

File tree

263 files changed

+4378
-3421
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

263 files changed

+4378
-3421
lines changed

.openpublishing.publish.config.json

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -970,6 +970,7 @@
970970
"articles/applied-ai-services/.openpublishing.redirection.applied-ai-old.json",
971971
"articles/cognitive-services/.openpublishing.redirection.cognitive-services.json",
972972
".openpublishing.redirection.baremetal-infrastructure.json",
973-
"articles/iot-dps/.openpublishing.redirection.iot-dps.json"
973+
"articles/iot-dps/.openpublishing.redirection.iot-dps.json",
974+
"articles/cloud-shell/.openpublishing.redirection.cloud-shell.json"
974975
]
975976
}

.openpublishing.redirection.active-directory.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -45,6 +45,11 @@
4545
"redirect_url": "/azure/active-directory/saas-apps/tutorial-list",
4646
"redirect_document_id": false
4747
},
48+
{
49+
"source_path_from_root": "/articles/active-directory/saas-apps/icertisicm-tutorial.md",
50+
"redirect_url": "/azure/active-directory/saas-apps/tutorial-list",
51+
"redirect_document_id": false
52+
},
4853
{
4954
"source_path_from_root": "/articles/active-directory/governance/tutorial-onboard-custom-workflow-graph.md",
5055
"redirect_url": "/graph/tutorial-lifecycle-workflows-onboard-custom-workflow",

.openpublishing.redirection.defender-for-iot.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,10 @@
11
{
22
"redirections": [
3+
{
4+
"source_path_from_root": "/articles/defender-for-iot/organizations/tutorial-getting-started-eiot-sensor.md",
5+
"redirect_url": "/azure/defender-for-iot/organizations/concept-enterprise",
6+
"redirect_document_id": false
7+
},
38
{
49
"source_path_from_root": "/articles/defender-for-iot/organizations/resources-frequently-asked-questions.md",
510
"redirect_url": "/azure/defender-for-iot/organizations/faqs-general",

.openpublishing.redirection.json

Lines changed: 13 additions & 33 deletions
Original file line numberDiff line numberDiff line change
@@ -9,21 +9,21 @@
99
"source_path_from_root": "/articles/api-management/developer-portal-use-community-widgets.md",
1010
"redirect_url": "/azure/api-management/developer-portal-extend-custom-functionality",
1111
"redirect_document_id": false
12-
},
12+
},
1313
{
1414
"source_path": "articles/sentinel/whats-new-archive.md",
1515
"redirect_url": "/azure/sentinel/whats-new",
16-
"redirect_document_id": false
16+
"redirect_document_id": false
1717
},
1818
{
1919
"source_path": "articles/backup/sap-hana-db-manage.md",
2020
"redirect_url": "/azure/backup/sap-hana-database-manage",
21-
"redirect_document_id": false
21+
"redirect_document_id": false
2222
},
2323
{
2424
"source_path": "articles/backup/sap-hana-db-restore.md",
2525
"redirect_url": "/azure/backup/sap-hana-database-restore",
26-
"redirect_document_id": false
26+
"redirect_document_id": false
2727
},
2828
{
2929
"source_path": "articles/backup/sap-hana-db-about.md",
@@ -93,32 +93,32 @@
9393
{
9494
"source_path": "articles/site-recovery/switch-replication-appliance-preview.md",
9595
"redirect_url": "/azure/site-recovery/switch-replication-appliance-modernized",
96-
"redirect_document_id": false
96+
"redirect_document_id": false
9797
},
9898
{
9999
"source_path": "articles/site-recovery/upgrade-mobility-service-preview.md",
100100
"redirect_url": "/azure/site-recovery/upgrade-mobility-service-modernized",
101-
"redirect_document_id": false
101+
"redirect_document_id": false
102102
},
103103
{
104104
"source_path": "articles/site-recovery/vmware-azure-set-up-replication-tutorial-preview.md",
105105
"redirect_url": "/azure/site-recovery/vmware-azure-set-up-replication-tutorial-modernized",
106-
"redirect_document_id": false
106+
"redirect_document_id": false
107107
},
108108
{
109109
"source_path": "articles/site-recovery/vmware-azure-architecture-preview.md",
110110
"redirect_url": "/azure/site-recovery/vmware-azure-architecture-modernized",
111-
"redirect_document_id": false
111+
"redirect_document_id": false
112112
},
113113
{
114114
"source_path": "articles/physical-server-azure-architecture-preview.md",
115115
"redirect_url": "/azure/physical-server-azure-architecture-modernized",
116-
"redirect_document_id": false
116+
"redirect_document_id": false
117117
},
118118
{
119119
"source_path": "articles/vmware-azure-tutorial-failover-failback-preview.md",
120120
"redirect_url": "/azure/vmware-azure-tutorial-failover-failback-modernized",
121-
"redirect_document_id": false
121+
"redirect_document_id": false
122122
},
123123
{
124124
"source_path": "articles/automanage/automanage-virtual-machines.md",
@@ -6353,12 +6353,12 @@
63536353
"redirect_url": "/azure/azure-cache-for-redis/scripts/create-manage-cache",
63546354
"redirect_document_id": false
63556355
},
6356-
{
6356+
{
63576357
"source_path_from_root": "/articles/storage/blobs/anonymous-read-access-client.md",
63586358
"redirect_url": "/azure/storage/blobs/anonymous-read-access-prevent",
63596359
"redirect_document_id": false
63606360
},
6361-
{
6361+
{
63626362
"source_path_from_root": "/articles/storage/common/storage-auth-abac-attributes.md",
63636363
"redirect_url": "/azure/storage/blobs/storage-auth-abac-attributes",
63646364
"redirect_document_id": false
@@ -10493,21 +10493,6 @@
1049310493
"redirect_url": "/azure/cloud-services/diagnostics-performance-counters",
1049410494
"redirect_document_id": false
1049510495
},
10496-
{
10497-
"source_path_from_root": "/articles/cloud-shell/features-powershell.md",
10498-
"redirect_url": "/azure/cloud-shell/features",
10499-
"redirect_document_id": false
10500-
},
10501-
{
10502-
"source_path_from_root": "/articles/cloud-shell/index.md",
10503-
"redirect_url": "/azure/cloud-shell/overview",
10504-
"redirect_document_id": false
10505-
},
10506-
{
10507-
"source_path_from_root": "/articles/cloud-shell/persisting-shell-storage-powershell.md",
10508-
"redirect_url": "/azure/cloud-shell/persisting-shell-storage",
10509-
"redirect_document_id": false
10510-
},
1051110496
{
1051210497
"source_path_from_root": "/articles/jenkins/azure-container-agents-plugin-run-container-as-an-agent.md",
1051310498
"redirect_url": "/azure/container-instances/container-instances-jenkins",
@@ -25437,7 +25422,7 @@
2543725422
"source_path_from_root": "/articles/virtual-machines/scripts/virtual-machines-cli-sample-copy-managed-disks-to-same-or-different-subscription.md",
2543825423
"redirect_url": "/previous-versions/azure/virtual-machines/scripts/virtual-machines-cli-sample-copy-managed-disks-to-same-or-different-subscription",
2543925424
"redirect_document_id": false
25440-
},
25425+
},
2544125426
{
2544225427
"source_path_from_root": "/articles/virtual-machines/disks-cross-tenant-cmk.md",
2544325428
"redirect_url": "/azure/virtual-machines/disks-cross-tenant-customer-managed-keys",
@@ -29494,11 +29479,6 @@
2949429479
"redirect_url": "/azure/virtual-network/ip-services/create-custom-ip-address-prefix-ipv6-powershell",
2949529480
"redirect_document_id": false
2949629481
},
29497-
{
29498-
"source_path_from_root": "/articles/cloud-shell/example-terraform-bash.md",
29499-
"redirect_url": "/azure/developer/terraform/quickstart-configure",
29500-
"redirect_document_id": false
29501-
},
2950229482
{
2950329483
"source_path_from_root": "/articles/aks/managed-cluster-snapshot.md",
2950429484
"redirect_url": "/azure/aks/intro-kubernetes",

.openpublishing.redirection.security-benchmark.json

Lines changed: 0 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -386,11 +386,6 @@
386386
"redirect_url": "/security/benchmark/azure/baselines/batch-security-baseline",
387387
"redirect_document_id": false
388388
},
389-
{
390-
"source_path_from_root": "/articles/cloud-shell/security-baseline.md",
391-
"redirect_url": "/security/benchmark/azure/baselines/cloud-shell-security-baseline",
392-
"redirect_document_id": false
393-
},
394389
{
395390
"source_path_from_root": "/articles/cognitive-services/security-baseline.md",
396391
"redirect_url": "/security/benchmark/azure/baselines/cognitive-services-security-baseline",

articles/active-directory/develop/msal-node-migration.md

Lines changed: 2 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -25,14 +25,11 @@ ms.custom: has-adal-ref
2525

2626
## Update app registration settings
2727

28-
When working with ADAL Node, you were likely using the **Azure AD v1.0 endpoint**. Apps migrating from ADAL to MSAL should also consider switching to **Azure AD v2.0 endpoint**.
28+
When working with ADAL Node, you were likely using the **Azure AD v1.0 endpoint**. Apps migrating from ADAL to MSAL should switch to **Azure AD v2.0 endpoint**.
2929

3030
1. Review the [differences between v1 and v2 endpoints](../azuread-dev/azure-ad-endpoint-comparison.md)
3131
1. Update, if necessary, your existing app registrations accordingly.
3232

33-
> [!NOTE]
34-
> In order to ensure backward compatibility, MSAL Node supports both v1.0 end v2.0 endpoints.
35-
3633
## Install and import MSAL
3734

3835
1. install MSAL Node package via NPM:
@@ -177,7 +174,7 @@ authenticationContext.acquireTokenWithAuthorizationCode(
177174
);
178175
```
179176

180-
MSAL Node supports both **v1.0** and **v2.0** endpoints. The v2.0 endpoint employs a *scope-centric* model to access resources. Thus, when you request an access token for a resource, you also need to specify the scope for that resource:
177+
The v2.0 endpoint employs a *scope-centric* model to access resources. Thus, when you request an access token for a resource, you also need to specify the scope for that resource:
181178

182179
```javascript
183180
const tokenRequest = {

articles/active-directory/identity-protection/concept-identity-protection-policies.md

Lines changed: 2 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: identity-protection
88
ms.topic: conceptual
9-
ms.date: 10/04/2022
9+
ms.date: 11/11/2022
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -51,13 +51,10 @@ If risks are detected on a sign-in, users can perform the required access contro
5151
Identity Protection analyzes signals about user accounts and calculates a risk score based on the probability that the user has been compromised. If a user has risky sign-in behavior, or their credentials have been leaked, Identity Protection will use these signals to calculate the user risk level. Administrators can configure user risk-based Conditional Access policies to enforce access controls based on user risk, including requirements such as:
5252

5353
- Block access
54-
- Allow access but require a secure password change using [Azure AD self-service password reset](../authentication/howto-sspr-deployment.md).
54+
- Allow access but require a secure password change.
5555

5656
A secure password change will remediate the user risk and close the risky user event to prevent unnecessary noise for administrators.
5757

58-
> [!NOTE]
59-
> Users must have previously registered for self-service password reset before triggering the user risk policy.
60-
6158
## Identity Protection policies
6259

6360
While Identity Protection also offers a user interface for creating user risk policy and sign-in risk policy, we highly recommend that you [use Azure AD Conditional Access to create risk-based policies](howto-identity-protection-configure-risk-policies.md) for the following benefits:

articles/active-directory/identity-protection/concept-identity-protection-risks.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: identity-protection
88
ms.topic: conceptual
9-
ms.date: 08/16/2022
9+
ms.date: 11/10/2022
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -85,7 +85,8 @@ Premium detections are visible only to Azure AD Premium P2 customers. Customers
8585
| Risk detection | Detection type | Description |
8686
| --- | --- | --- |
8787
| Possible attempt to access Primary Refresh Token (PRT) | Offline | This risk detection type is detected by Microsoft Defender for Endpoint (MDE). A Primary Refresh Token (PRT) is a key artifact of Azure AD authentication on Windows 10, Windows Server 2016, and later versions, iOS, and Android devices. A PRT is a JSON Web Token (JWT) that's specially issued to Microsoft first-party token brokers to enable single sign-on (SSO) across the applications used on those devices. Attackers can attempt to access this resource to move laterally into an organization or perform credential theft. This detection will move users to high risk and will only fire in organizations that have deployed MDE. This detection is low-volume and will be seen infrequently by most organizations. However, when it does occur it's high risk and users should be remediated. |
88-
| Anomalous user activity | Offline | This risk detection indicates that suspicious patterns of activity have been identified for an authenticated user. The post-authentication behavior of users is assessed for anomalies. This behavior is based on actions occurring for the account, along with any sign-in risk detected. |
88+
| Anomalous user activity | Offline | This risk detection baselines normal administrative user behavior in Azure AD, and spots anomalous patterns of behavior like suspicious changes to the directory. The detection is triggered against the administrator making the change or the object that was changed. |
89+
8990

9091
#### Nonpremium user risk detections
9192

articles/active-directory/identity-protection/concept-identity-protection-user-experience.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: identity-protection
88
ms.topic: conceptual
9-
ms.date: 01/21/2022
9+
ms.date: 11/11/2022
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -42,7 +42,7 @@ When an administrator has configured a policy for sign-in risks, affected users
4242

4343
### Risky sign-in self-remediation
4444

45-
1. The user is informed that something unusual was detected about their sign-in. This could be something like, such as signing in from a new location, device, or app.
45+
1. The user is informed that something unusual was detected about their sign-in. This behavior could be something like, such as signing in from a new location, device, or app.
4646

4747
![Something unusual prompt](./media/concept-identity-protection-user-experience/120.png)
4848

@@ -84,7 +84,7 @@ If your organization has users who are delegated access to another tenant and th
8484
1. An organization has a managed service provider (MSP) or cloud solution provider (CSP) who takes care of configuring their cloud environment.
8585
1. One of the MSPs technicians credentials are leaked and triggers high risk. That technician is blocked from signing in to other tenants.
8686
1. The technician can self-remediate and sign in if the home tenant has enabled the appropriate policies [requiring password change for high risk users](../conditional-access/howto-conditional-access-policy-risk-user.md) or [MFA for risky users](../conditional-access/howto-conditional-access-policy-risk.md).
87-
1. If the home tenant hasn't enabled self-remediation policies, an administrator in the technician's home tenant will have to [remediate the risk](howto-identity-protection-remediate-unblock.md#remediation).
87+
1. If the home tenant hasn't enabled self-remediation policies, an administrator in the technician's home tenant will have to [remediate the risk](howto-identity-protection-remediate-unblock.md#risk-remediation).
8888

8989
## See also
9090

articles/active-directory/identity-protection/concept-workload-identity-risk.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: identity-protection
88
ms.topic: conceptual
9-
ms.date: 02/07/2022
9+
ms.date: 11/10/2022
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -54,8 +54,8 @@ We detect risk on workload identities across sign-in behavior and offline indica
5454
| Admin confirmed account compromised | Offline | This detection indicates an admin has selected 'Confirm compromised' in the Risky Workload Identities UI or using riskyServicePrincipals API. To see which admin has confirmed this account compromised, check the account’s risk history (via UI or API). |
5555
| Leaked Credentials | Offline | This risk detection indicates that the account's valid credentials have been leaked. This leak can occur when someone checks in the credentials in public code artifact on GitHub, or when the credentials are leaked through a data breach. <br><br> When the Microsoft leaked credentials service acquires credentials from GitHub, the dark web, paste sites, or other sources, they're checked against current valid credentials in Azure AD to find valid matches. |
5656
| Malicious application | Offline | This detection indicates that Microsoft has disabled an application for violating our terms of service. We recommend [conducting an investigation](https://go.microsoft.com/fwlink/?linkid=2208429) of the application.|
57-
| Suspicious application | Offline | This detection indicates that Microsoft has identified an application that may be violating our terms of service, but has not disabled it. We recommend [conducting an investigation](https://go.microsoft.com/fwlink/?linkid=2208429) of the application.|
58-
| Anomalous service principal activity | Offline | This risk detection indicates that suspicious patterns of activity have been identified for an authenticated service principal. The post-authentication behavior of service principals is assessed for anomalies. This behavior is based on actions occurring for the account, along with any sign-in risk detected. |
57+
| Suspicious application | Offline | This detection indicates that Microsoft has identified an application that may be violating our terms of service, but hasn't disabled it. We recommend [conducting an investigation](https://go.microsoft.com/fwlink/?linkid=2208429) of the application.|
58+
| Anomalous service principal activity | Offline | This risk detection baselines normal administrative service principal behavior in Azure AD, and spots anomalous patterns of behavior like suspicious changes to the directory. The detection is triggered against the administrative service principal making the change or the object that was changed. |
5959

6060
## Identify risky workload identities
6161

0 commit comments

Comments
 (0)