Skip to content

Commit f15f548

Browse files
authored
Merge pull request #105530 from MicrosoftDocs/master
2/25 PM Publish
2 parents 0cc25b7 + f869377 commit f15f548

File tree

226 files changed

+3420
-2211
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

226 files changed

+3420
-2211
lines changed

.openpublishing.redirection.json

Lines changed: 30 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -29021,6 +29021,31 @@
2902129021
"redirect_url": "/azure/security-center/faq-general",
2902229022
"redirect_document_id": false
2902329023
},
29024+
{
29025+
"source_path": "articles/security-center/security-center-alerts-iaas.md",
29026+
"redirect_url": "/azure/security-center/threat-protection",
29027+
"redirect_document_id": false
29028+
},
29029+
{
29030+
"source_path": "articles/security-center/security-center-alerts-data-services.md",
29031+
"redirect_url": "/azure/security-center/threat-protection",
29032+
"redirect_document_id": false
29033+
},
29034+
{
29035+
"source_path": "articles/security-center/security-center-alerts-compute.md",
29036+
"redirect_url": "/azure/security-center/threat-protection",
29037+
"redirect_document_id": false
29038+
},
29039+
{
29040+
"source_path": "articles/security-center/security-center-alerts-service-layer.md",
29041+
"redirect_url": "/azure/security-center/threat-protection",
29042+
"redirect_document_id": false
29043+
},
29044+
{
29045+
"source_path": "articles/security-center/security-center-alerts-integration.md",
29046+
"redirect_url": "/azure/security-center/threat-protection",
29047+
"redirect_document_id": false
29048+
},
2902429049
{
2902529050
"source_path": "articles/security-center/security-center-playbooks.md",
2902629051
"redirect_url": "/azure/security-center/workflow-automation",
@@ -48901,6 +48926,11 @@
4890148926
"source_path": "articles/virtual-machines/linux/tutorial-jenkins-github-docker-cicd.md",
4890248927
"redirect_url": "/azure/jenkins/tutorial-jenkins-github-docker-cicd",
4890348928
"redirect_document_id": false
48929+
},
48930+
{
48931+
"source_path": "articles/container-instances/container-instances-jenkins.md",
48932+
"redirect_url": "/azure/jenkins/container-instances-jenkins",
48933+
"redirect_document_id": false
4890448934
}
4890548935
]
4890648936
}

articles/active-directory-domain-services/change-sku.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -44,7 +44,7 @@ For more information on these limits, see [Azure AD DS SKU features and limits][
4444

4545
To change the SKU for an Azure AD DS managed domain using the Azure portal, complete the following steps:
4646

47-
1. At the top of the Azure portal, search for and select **Azure AD Domain Services**. Choose your managed domain from the list, such as *aadds.contoso.com*.
47+
1. At the top of the Azure portal, search for and select **Azure AD Domain Services**. Choose your managed domain from the list, such as *aaddscontoso.com*.
4848
1. In the menu on the left-hand side of the Azure AD DS page, select **Settings > SKU**.
4949

5050
![Select the SKU menu option for your Azure AD DS managed domain in the Azure portal](media/change-sku/overview-change-sku.png)

articles/active-directory-domain-services/check-health.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ This article shows you how to view the Azure AD DS health status and understand
2525
The health status for an Azure AD DS managed domain is viewed using the Azure portal. Information on the last backup time and synchronization with Azure AD can be seen, along with any alerts that indicate a problem with the managed domain's health. To view the health status for an Azure AD DS managed domain, complete the following steps:
2626

2727
1. In the Azure portal, search for and select **Azure AD Domain Services**.
28-
1. Select your Azure AD DS managed domain, such as *aadds.contoso.com*.
28+
1. Select your Azure AD DS managed domain, such as *aaddscontoso.com*.
2929
1. On the left-hand side of the Azure AD DS resource window, select **Health**. The following example screenshot shows a healthy Azure AD DS managed domain and the status of the last backup and Azure AD synchronization:
3030

3131
![Health page overview in the Azure portal showing the Azure Active Directory Domain Services status](./media/check-health/health-page.png)

articles/active-directory-domain-services/create-gmsa.md

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -61,32 +61,32 @@ First, create a custom OU using the [New-ADOrganizationalUnit][New-AdOrganizatio
6161
> [!TIP]
6262
> To complete these steps to create a gMSA, [use your management VM][tutorial-create-management-vm]. This management VM should already have the required AD PowerShell cmdlets and connection to the managed domain.
6363
64-
The following example creates a custom OU named *myNewOU* in the Azure AD DS managed domain named *aadds.contoso.com*. Use your own OU and managed domain name:
64+
The following example creates a custom OU named *myNewOU* in the Azure AD DS managed domain named *aaddscontoso.com*. Use your own OU and managed domain name:
6565

6666
```powershell
67-
New-ADOrganizationalUnit -Name "myNewOU" -Path "DC=contoso,DC=COM"
67+
New-ADOrganizationalUnit -Name "myNewOU" -Path "DC=aaddscontoso,DC=COM"
6868
```
6969

7070
Now create a gMSA using the [New-ADServiceAccount][New-ADServiceAccount] cmdlet. The following example parameters are defined:
7171

7272
* **-Name** is set to *WebFarmSvc*
7373
* **-Path** parameter specifies the custom OU for the gMSA created in the previous step.
74-
* DNS entries and service principal names are set for *WebFarmSvc.aadds.contoso.com*
75-
* Principals in *CONTOSO-SERVER$* are allowed to retrieve the password use the identity.
74+
* DNS entries and service principal names are set for *WebFarmSvc.aaddscontoso.com*
75+
* Principals in *AADDSCONTOSO-SERVER$* are allowed to retrieve the password use the identity.
7676

7777
Specify your own names and domain names.
7878

7979
```powershell
8080
New-ADServiceAccount -Name WebFarmSvc `
81-
-DNSHostName WebFarmSvc.aadds.contoso.com `
82-
-Path "OU=MYNEWOU,DC=contoso,DC=com" `
81+
-DNSHostName WebFarmSvc.aaddscontoso.com `
82+
-Path "OU=MYNEWOU,DC=aaddscontoso,DC=com" `
8383
-KerberosEncryptionType AES128, AES256 `
8484
-ManagedPasswordIntervalInDays 30 `
85-
-ServicePrincipalNames http/WebFarmSvc.aadds.contoso.com/aadds.contoso.com, `
86-
http/WebFarmSvc.aadds.contoso.com/contoso, `
87-
http/WebFarmSvc/aadds.contoso.com, `
88-
http/WebFarmSvc/contoso `
89-
-PrincipalsAllowedToRetrieveManagedPassword CONTOSO-SERVER$
85+
-ServicePrincipalNames http/WebFarmSvc.aaddscontoso.com/aaddscontoso.com, `
86+
http/WebFarmSvc.aaddscontoso.com/aaddscontoso, `
87+
http/WebFarmSvc/aaddscontoso.com, `
88+
http/WebFarmSvc/aaddscontoso `
89+
-PrincipalsAllowedToRetrieveManagedPassword AADDSCONTOSO-SERVER$
9090
```
9191

9292
Applications and services can now be configured to use the gMSA as needed.

articles/active-directory-domain-services/create-ou.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -62,11 +62,11 @@ To create a custom OU, you use the Active Directory Administrative Tools from a
6262
1. Sign in to your management VM. For steps on how to connect using the Azure portal, see [Connect to a Windows Server VM][connect-windows-server-vm].
6363
1. From the Start screen, select **Administrative Tools**. A list of available management tools is shown that were installed in the tutorial to [create a management VM][tutorial-create-management-vm].
6464
1. To create and manage OUs, select **Active Directory Administrative Center** from the list of administrative tools.
65-
1. In the left pane, choose your Azure AD DS managed domain, such as *aadds.contoso.com*. A list of existing OUs and resources is shown:
65+
1. In the left pane, choose your Azure AD DS managed domain, such as *aaddscontoso.com*. A list of existing OUs and resources is shown:
6666

6767
![Select your Azure AD DS managed domain in the Active Directory Administrative Center](./media/active-directory-domain-services-admin-guide/create-ou-adac-overview.png)
6868

69-
1. The **Tasks** pane is shown on the right side of the Active Directory Administrative Center. Under the domain, such as *aadds.contoso.com*, select **New > Organizational Unit**.
69+
1. The **Tasks** pane is shown on the right side of the Active Directory Administrative Center. Under the domain, such as *aaddscontoso.com*, select **New > Organizational Unit**.
7070

7171
![Select the option to create a new OU in the Active Directory Administrative Center](./media/active-directory-domain-services-admin-guide/create-ou-adac-new-ou.png)
7272

articles/active-directory-domain-services/delete-aadds.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ If you no longer need a managed domain, you can delete an Azure Active Directory
3131
To delete an Azure AD DS managed domain, complete the following steps:
3232

3333
1. In the Azure portal, search for and select **Azure AD Domain Services**.
34-
1. Select the name of your Azure AD DS managed domain, such as *aadds.contoso.com*.
34+
1. Select the name of your Azure AD DS managed domain, such as *aaddscontoso.com*.
3535
1. On the **Overview** page, select **Delete**. To confirm the deletion, type the domain name of the managed domain again, then select **Delete**.
3636

3737
It can take 15-20 minutes or more to delete the Azure AD DS managed domain.

articles/active-directory-domain-services/deploy-azure-app-proxy.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -70,7 +70,7 @@ With a VM ready to be used as the Azure AD Application Proxy connector, now copy
7070
> [!NOTE]
7171
> The global administrator account used to register the connector must belong to the same directory where you enable the Application Proxy service.
7272
>
73-
> For example, if the Azure AD domain is *contoso.com*, the global administrator should be `admin@contoso.com` or another valid alias on that domain.
73+
> For example, if the Azure AD domain is *aaddscontoso.com*, the global administrator should be `admin@aaddscontoso.com` or another valid alias on that domain.
7474
7575
* If Internet Explorer Enhanced Security Configuration is turned on for the VM where you install the connector, the registration screen might be blocked. To allow access, follow the instructions in the error message, or turn off Internet Explorer Enhanced Security during the install process.
7676
* If connector registration fails, see [Troubleshoot Application Proxy](../active-directory/manage-apps/application-proxy-troubleshoot.md).
@@ -95,16 +95,16 @@ For more information, see [Configure Kerberos constrained delegation (KCD) in Az
9595
9696
Use the [Get-ADComputer][Get-ADComputer] to retrieve the settings for the computer on which the Azure AD Application Proxy connector is installed. From your domain-joined management VM and logged in as user account that's a member of the *Azure AD DC administrators* group, run the following cmdlets.
9797

98-
The following example gets information about the computer account named *appproxy.contoso.com*. Provide your own computer name for the Azure AD Application Proxy VM configured in the previous steps.
98+
The following example gets information about the computer account named *appproxy.aaddscontoso.com*. Provide your own computer name for the Azure AD Application Proxy VM configured in the previous steps.
9999

100100
```powershell
101-
$ImpersonatingAccount = Get-ADComputer -Identity appproxy.contoso.com
101+
$ImpersonatingAccount = Get-ADComputer -Identity appproxy.aaddscontoso.com
102102
```
103103

104-
For each application server that runs the apps behind Azure AD Application Proxy use the [Set-ADComputer][Set-ADComputer] PowerShell cmdlet to configure resource-based KCD. In the following example, the Azure AD Application Proxy connector is granted permissions to use the *appserver.contoso.com* computer:
104+
For each application server that runs the apps behind Azure AD Application Proxy use the [Set-ADComputer][Set-ADComputer] PowerShell cmdlet to configure resource-based KCD. In the following example, the Azure AD Application Proxy connector is granted permissions to use the *appserver.aaddscontoso.com* computer:
105105

106106
```powershell
107-
Set-ADComputer appserver.contoso.com -PrincipalsAllowedToDelegateToAccount $ImpersonatingAccount
107+
Set-ADComputer appserver.aaddscontoso.com -PrincipalsAllowedToDelegateToAccount $ImpersonatingAccount
108108
```
109109

110110
If you deploy multiple Azure AD Application Proxy connectors, you must configure resource-based KCD for each connector instance.

articles/active-directory-domain-services/deploy-kcd.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -52,7 +52,7 @@ Resource-based KCD is configured using PowerShell. You use the [Set-ADComputer][
5252

5353
## Configure resource-based KCD for a computer account
5454

55-
In this scenario, let's assume you have a web app that runs on the computer named *contoso-webapp.aadds.contoso.com*. The web app needs to access a web API that runs on the computer named *contoso-api.aadds.contoso.com* in the context of domain users. Complete the following steps to configure this scenario:
55+
In this scenario, let's assume you have a web app that runs on the computer named *contoso-webapp.aaddscontoso.com*. The web app needs to access a web API that runs on the computer named *contoso-api.aaddscontoso.com* in the context of domain users. Complete the following steps to configure this scenario:
5656

5757
1. [Create a custom OU](create-ou.md). You can delegate permissions to manage this custom OU to users within the Azure AD DS managed domain.
5858
1. [Domain-join the virtual machines][create-join-windows-vm], both the one that runs the web app, and the one that runs the web API, to the Azure AD DS managed domain. Create these computer accounts in the custom OU from the previous step.
@@ -63,8 +63,8 @@ In this scenario, let's assume you have a web app that runs on the computer name
6363
1. Finally, configure resource-based KCD using the [Set-ADComputer][Set-ADComputer] PowerShell cmdlet. From your domain-joined management VM and logged in as user account that's a member of the *Azure AD DC administrators* group, run the following cmdlets. Provide your own computer names as needed:
6464

6565
```powershell
66-
$ImpersonatingAccount = Get-ADComputer -Identity contoso-webapp.aadds.contoso.com
67-
Set-ADComputer contoso-api.aadds.contoso.com -PrincipalsAllowedToDelegateToAccount $ImpersonatingAccount
66+
$ImpersonatingAccount = Get-ADComputer -Identity contoso-webapp.aaddscontoso.com
67+
Set-ADComputer contoso-api.aaddscontoso.com -PrincipalsAllowedToDelegateToAccount $ImpersonatingAccount
6868
```
6969
7070
## Configure resource-based KCD for a user account

articles/active-directory-domain-services/deploy-sp-profile-sync.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -58,7 +58,7 @@ From your Azure AD DS management VM, complete the following steps:
5858
5959
1. From the Start screen, select **Administrative Tools**. A list of available management tools is shown that were installed in the tutorial to [create a management VM][tutorial-create-management-vm].
6060
1. To manage group membership, select **Active Directory Administrative Center** from the list of administrative tools.
61-
1. In the left pane, choose your Azure AD DS managed domain, such as *aadds.contoso.com*. A list of existing OUs and resources is shown.
61+
1. In the left pane, choose your Azure AD DS managed domain, such as *aaddscontoso.com*. A list of existing OUs and resources is shown.
6262
1. Select the **Users** OU, then choose the *AAD DC Service Accounts* security group.
6363
1. Select **Members**, then choose **Add...**.
6464
1. Enter the name of the SharePoint service account, then select **OK**. In the following example, the SharePoint service account is named *spadmin*:

articles/active-directory-domain-services/join-centos-linux-vm.md

Lines changed: 13 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -59,13 +59,13 @@ sudo vi /etc/hosts
5959

6060
In the *hosts* file, update the *localhost* address. In the following example:
6161

62-
* *aadds.contoso.com* is the DNS domain name of your Azure AD DS managed domain.
62+
* *aaddscontoso.com* is the DNS domain name of your Azure AD DS managed domain.
6363
* *centos* is the hostname of your CentOS VM that you're joining to the managed domain.
6464

6565
Update these names with your own values:
6666

6767
```console
68-
127.0.0.1 centos.aadds.contoso.com centos
68+
127.0.0.1 centos.aaddscontoso.com centos
6969
```
7070

7171
When done, save and exit the *hosts* file using the `:wq` command of the editor.
@@ -82,30 +82,30 @@ sudo yum install realmd sssd krb5-workstation krb5-libs oddjob oddjob-mkhomedir
8282

8383
Now that the required packages are installed on the VM, join the VM to the Azure AD DS managed domain.
8484

85-
1. Use the `realm discover` command to discover the Azure AD DS managed domain. The following example discovers the realm *AADDS.CONTOSO.COM*. Specify your own Azure AD DS managed domain name in ALL UPPERCASE:
85+
1. Use the `realm discover` command to discover the Azure AD DS managed domain. The following example discovers the realm *AADDSCONTOSO.COM*. Specify your own Azure AD DS managed domain name in ALL UPPERCASE:
8686

8787
```console
88-
sudo realm discover AADDS.CONTOSO.COM
88+
sudo realm discover AADDSCONTOSO.COM
8989
```
9090

9191
If the `realm discover` command can't find your Azure AD DS managed domain, review the following troubleshooting steps:
9292

93-
* Make sure that the domain is reachable from the VM. Try `ping aadds.contoso.com` to see if a positive reply is returned.
93+
* Make sure that the domain is reachable from the VM. Try `ping aaddscontoso.com` to see if a positive reply is returned.
9494
* Check that the VM is deployed to the same, or a peered, virtual network in which the Azure AD DS managed domain is available.
9595
* Confirm that the DNS server settings for the virtual network have been updated to point to the domain controllers of the Azure AD DS managed domain.
9696

9797
1. Now initialize Kerberos using the `kinit` command. Specify a user that belongs to the *AAD DC Administrators* group. If needed, [add a user account to a group in Azure AD](../active-directory/fundamentals/active-directory-groups-members-azure-portal.md).
9898

99-
Again, the Azure AD DS managed domain name must be entered in ALL UPPERCASE. In the following example, the account named `contosoadmin@aadds.contoso.com` is used to initialize Kerberos. Enter your own user account that's a member of the *AAD DC Administrators* group:
99+
Again, the Azure AD DS managed domain name must be entered in ALL UPPERCASE. In the following example, the account named `contosoadmin@aaddscontoso.com` is used to initialize Kerberos. Enter your own user account that's a member of the *AAD DC Administrators* group:
100100

101101
```console
102-
kinit contosoadmin@AADDS.CONTOSO.COM
102+
kinit contosoadmin@AADDSCONTOSO.COM
103103
```
104104

105-
1. Finally, join the machine to the Azure AD DS managed domain using the `realm join` command. Use the same user account that's a member of the *AAD DC Administrators* group that you specified in the previous `kinit` command, such as `contosoadmin@AADDS.CONTOSO.COM`:
105+
1. Finally, join the machine to the Azure AD DS managed domain using the `realm join` command. Use the same user account that's a member of the *AAD DC Administrators* group that you specified in the previous `kinit` command, such as `contosoadmin@AADDSCONTOSO.COM`:
106106

107107
```console
108-
sudo realm join --verbose AADDS.CONTOSO.COM -U 'contosoadmin@AADDS.CONTOSO.COM'
108+
sudo realm join --verbose AADDSCONTOSO.COM -U 'contosoadmin@AADDSCONTOSO.COM'
109109
```
110110

111111
It takes a few moments to join the VM to the Azure AD DS managed domain. The following example output shows the VM has successfully joined to the Azure AD DS managed domain:
@@ -150,11 +150,11 @@ To grant members of the *AAD DC Administrators* group administrative privileges
150150
sudo visudo
151151
```
152152

153-
1. Add the following entry to the end of */etc/sudoers* file. The *AAD DC Administrators* group contains whitespace in the name, so include the backslash escape character in the group name. Add your own domain name, such as *aadds.contoso.com*:
153+
1. Add the following entry to the end of */etc/sudoers* file. The *AAD DC Administrators* group contains whitespace in the name, so include the backslash escape character in the group name. Add your own domain name, such as *aaddscontoso.com*:
154154

155155
```console
156156
# Add 'AAD DC Administrators' group members as admins.
157-
%AAD\ DC\ Administrators@aadds.contoso.com ALL=(ALL) NOPASSWD:ALL
157+
%AAD\ DC\ Administrators@aaddscontoso.com ALL=(ALL) NOPASSWD:ALL
158158
```
159159

160160
When done, save and exit the editor using the `:wq` command of the editor.
@@ -163,10 +163,10 @@ To grant members of the *AAD DC Administrators* group administrative privileges
163163

164164
To verify that the VM has been successfully joined to the Azure AD DS managed domain, start a new SSH connection using a domain user account. Confirm that a home directory has been created, and that group membership from the domain is applied.
165165

166-
1. Create a new SSH connection from your console. Use a domain account that belongs to the managed domain using the `ssh -l` command, such as `contosoadmin@contoso.com` and then enter the address of your VM, such as *centos.aadds.contoso.com*. If you use the Azure Cloud Shell, use the public IP address of the VM rather than the internal DNS name.
166+
1. Create a new SSH connection from your console. Use a domain account that belongs to the managed domain using the `ssh -l` command, such as `contosoadmin@aaddscontoso.com` and then enter the address of your VM, such as *centos.aaddscontoso.com*. If you use the Azure Cloud Shell, use the public IP address of the VM rather than the internal DNS name.
167167

168168
```console
169-
ssh -l contosoadmin@AADDS.CONTOSO.com centos.aadds.contoso.com
169+
ssh -l contosoadmin@AADDSCONTOSO.com centos.aaddscontoso.com
170170
```
171171

172172
1. When you've successfully connected to the VM, verify that the home directory was initialized correctly:

0 commit comments

Comments
 (0)