Skip to content

Commit f54296e

Browse files
Merge remote-tracking branch 'upstream/main' into v-dele-175137
2 parents 4d48774 + ba9035c commit f54296e

File tree

584 files changed

+10343
-4419
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

584 files changed

+10343
-4419
lines changed

.openpublishing.redirection.active-directory.json

Lines changed: 35 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -255,6 +255,41 @@
255255
"redirect_url": "/azure/active-directory/workload-identities/workload-identity-federation-create-trust",
256256
"redirect_document_id": true
257257
},
258+
{
259+
"source_path_from_root": "/articles/active-directory/fundamentals/concept-fundamentals-security-defaults.md",
260+
"redirect_url": "/azure/active-directory/fundamentals/security-defaults",
261+
"redirect_document_id": true
262+
},
263+
{
264+
"source_path_from_root": "/articles/active-directory/devices/hybrid-azuread-join-control.md",
265+
"redirect_url": "/azure/active-directory/devices/hybrid-join-control",
266+
"redirect_document_id": true
267+
},
268+
{
269+
"source_path_from_root": "/articles/active-directory/devices/hybrid-azuread-join-manual.md",
270+
"redirect_url": "/azure/active-directory/devices/hybrid-join-manual",
271+
"redirect_document_id": true
272+
},
273+
{
274+
"source_path_from_root": "/articles/active-directory/devices/hybrid-azuread-join-plan.md",
275+
"redirect_url": "/azure/active-directory/devices/hybrid-join-plan",
276+
"redirect_document_id": true
277+
},
278+
{
279+
"source_path_from_root": "/articles/active-directory/devices/device-management-azure-portal.md",
280+
"redirect_url": "/azure/active-directory/devices/manage-device-identities",
281+
"redirect_document_id": true
282+
},
283+
{
284+
"source_path_from_root": "/articles/active-directory/devices/concept-azure-ad-register.md",
285+
"redirect_url": "/azure/active-directory/devices/concept-device-registration",
286+
"redirect_document_id": true
287+
},
288+
{
289+
"source_path_from_root": "/articles/active-directory/devices/concept-azure-ad-join.md",
290+
"redirect_url": "/azure/active-directory/devices/concept-directory-join",
291+
"redirect_document_id": true
292+
},
258293
{
259294
"source_path_from_root": "/articles/active-directory/fundamentals/10-secure-local-guest.md",
260295
"redirect_url": "/azure/active-directory/architecture/10-secure-local-guest",

.openpublishing.redirection.defender-for-cloud.json

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -413,7 +413,7 @@
413413
{
414414
"source_path_from_root": "/articles/security-center/defender-for-dns-introduction.md",
415415
"redirect_url": "/azure/defender-for-cloud/defender-for-dns-introduction",
416-
"redirect_document_id": true
416+
"redirect_document_id": false
417417
},
418418
{
419419
"source_path_from_root": "/articles/security-center/defender-for-key-vault-introduction.md",
@@ -840,6 +840,11 @@
840840
"redirect_url": "/azure/defender-for-cloud/enable-agentless-scanning-vms",
841841
"redirect_document_id": true
842842
},
843+
{
844+
"source_path_from_root": "/articles/defender-for-cloud/tutorial-enable-dns-plan.md",
845+
"redirect_url": "/azure/defender-for-cloud/defender-for-dns-introduction",
846+
"redirect_document_id": true
847+
},
843848
{
844849
"source_path_from_root": "/articles/defender-for-cloud/defender-for-storage-exclude.md",
845850
"redirect_url": "/azure/defender-for-cloud/defender-for-storage-classic-enable#exclude-a-storage-account-from-a-protected-subscription-in-the-per-transaction-plan",

.openpublishing.redirection.json

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -9093,6 +9093,11 @@
90939093
"redirect_url": "/azure/vpn-gateway/point-to-site-vpn-client-cert-windows",
90949094
"redirect_document_id": false
90959095
},
9096+
{
9097+
"source_path_from_root": "/articles/vpn-gateway/vpn-gateway-forced-tunneling-rm.md",
9098+
"redirect_url": "/azure/vpn-gateway/about-site-to-site-tunneling",
9099+
"redirect_document_id": false
9100+
},
90969101
{
90979102
"source_path_from_root": "/articles/azure-vmware/public-ip-usage.md",
90989103
"redirect_url": "/azure/azure-vmware/enable-public-ip-nsx-edge",
@@ -23853,11 +23858,6 @@
2385323858
"redirect_url": "/azure/sentinel/data-connectors-reference",
2385423859
"redirect_document_id": false
2385523860
},
23856-
{
23857-
"source_path_from_root": "/articles/sentinel/data-connectors/cisco-meraki.md",
23858-
"redirect_url": "/azure/sentinel/data-connectors-reference",
23859-
"redirect_document_id": false
23860-
},
2386123861
{
2386223862
"source_path_from_root": "/articles/networking/scripts/virtual-network-powershell-sample-peer-two-virtual-networks.md",
2386323863
"redirect_url": "/azure/virtual-network/tutorial-connect-virtual-networks-powershell",

articles/active-directory-b2c/whats-new-docs.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: "What's new in Azure Active Directory business-to-customer (B2C)"
33
description: "New and updated documentation for the Azure Active Directory business-to-customer (B2C)."
4-
ms.date: 06/05/2023
4+
ms.date: 08/01/2023
55
ms.service: active-directory
66
ms.subservice: B2C
77
ms.topic: reference

articles/active-directory-domain-services/faqs.yml

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ metadata:
1111
ms.subservice: domain-services
1212
ms.workload: identity
1313
ms.topic: faq
14-
ms.date: 05/09/2023
14+
ms.date: 08/01/2023
1515
ms.author: justinha
1616
title: Frequently asked questions (FAQs) about Azure Active Directory (AD) Domain Services
1717
summary: This page answers frequently asked questions about Azure Active Directory Domain Services.
@@ -159,6 +159,10 @@ sections:
159159
Why do my domain controllers change names?
160160
answer: |
161161
It is possible that during the maintenance of domain controllers there is a change in their names. To avoid problems with this type of change, it is recommended to not use the names of the domain controllers hardcoded in applications and/or other domain resources, but the FQDN of the domain. This way, no matter what the names of the domain controllers are, you won't need to reconfigure anything after a name change.
162+
- question: |
163+
Is the password of the KRBTGT account in a managed domain rolled periodically? If so, what is the frequency?
164+
answer: |
165+
The password of the KRBTGT account in a managed domain is rolled over every seven (7) days.
162166
163167
- name: Billing and availability
164168
questions:

articles/active-directory-domain-services/join-windows-vm-template.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ ms.subservice: domain-services
1111
ms.workload: identity
1212
ms.custom: devx-track-arm-template
1313
ms.topic: how-to
14-
ms.date: 01/29/2023
14+
ms.date: 08/01/2023
1515
ms.author: justinha
1616
---
1717

@@ -31,7 +31,7 @@ To complete this tutorial, you need the following resources and privileges:
3131
* If needed, [create an Azure Active Directory tenant][create-azure-ad-tenant] or [associate an Azure subscription with your account][associate-azure-ad-tenant].
3232
* An Azure Active Directory Domain Services managed domain enabled and configured in your Azure AD tenant.
3333
* If needed, the first tutorial [creates and configures an Azure Active Directory Domain Services managed domain][create-azure-ad-ds-instance].
34-
* A user account that's a part of the managed domain.
34+
* A user account that's a part of the *AAD DC administrators* group.
3535

3636
## Azure Resource Manager template overview
3737

articles/active-directory-domain-services/network-considerations.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: domain-services
1010
ms.workload: identity
1111
ms.topic: conceptual
12-
ms.date: 07/31/2023
12+
ms.date: 08/01/2023
1313
ms.author: justinha
1414
ms.reviewer: xyuan
1515

@@ -149,7 +149,7 @@ If needed, you can [create the required network security group and rules using A
149149
150150
### Outbound connectivity
151151

152-
For Outbound connectivity, you can either keep **AllowVnetOutbound** and **AllowInternetOutBound** or restrict Outbound traffic by using ServiceTags listed in the following table. The ServiceTag for AzureUpdateDelivery must be added via [PowerShell](powershell-create-instance.md).
152+
For Outbound connectivity, you can either keep **AllowVnetOutbound** and **AllowInternetOutBound** or restrict Outbound traffic by using ServiceTags listed in the following table. The ServiceTag for AzureUpdateDelivery must be added via [PowerShell](powershell-create-instance.md). Make sure no other NSG with higher priority denies the Outbound connectivity. If Outbound connectivity is denied, replication won't work between replica sets.
153153

154154

155155
| Outbound port number | Protocol | Source | Destination | Action | Required | Purpose |

articles/active-directory-domain-services/tutorial-create-instance.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: domain-services
99
ms.workload: identity
1010
ms.topic: tutorial
11-
ms.date: 07/31/2023
11+
ms.date: 08/01/2023
1212
ms.author: justinha
1313

1414
#Customer intent: As an identity administrator, I want to create an Azure Active Directory Domain Services managed domain so that I can synchronize identity information with my Azure Active Directory tenant and provide Domain Services connectivity to virtual machines and applications in Azure.
@@ -67,7 +67,7 @@ When you create a managed domain, you specify a DNS name. There are some conside
6767
* **Non-routable domain suffixes:** We generally recommend that you avoid a non-routable domain name suffix, such as *contoso.local*. The *.local* suffix isn't routable and can cause issues with DNS resolution.
6868

6969
> [!TIP]
70-
> If you create a custom domain name, take care with existing DNS namespaces. It's recommended to use a domain name separate from any existing Azure or on-premises DNS name space.
70+
> If you create a custom domain name, take care with existing DNS namespaces. Although it's supported, you may want to use a domain name separate from any existing Azure or on-premises DNS namespace.
7171
>
7272
> For example, if you have an existing DNS name space of *contoso.com*, create a managed domain with the custom domain name of *aaddscontoso.com*. If you need to use secure LDAP, you must register and own this custom domain name to generate the required certificates.
7373
>

articles/active-directory/architecture/multi-tenant-user-management-introduction.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -67,7 +67,7 @@ The following conceptual and how-to articles provide information about Azure AD
6767
- [B2B and Office 365 external sharing](../external-identities/o365-external-user.md) explains the similarities and differences among sharing resources through B2B, Office 365, and SharePoint/OneDrive.
6868
- [Properties on an Azure AD B2B collaboration user](../external-identities/user-properties.md) describes the properties and states of the external user object in Azure AD. The description provides details before and after invitation redemption.
6969
- [B2B user tokens](../external-identities/user-token.md) provides examples of the bearer tokens for B2B for an external user.
70-
- [Conditional access for B2B](../external-identities/authentication-conditional-access.md) describes how Conditional Access and MFA work for external users.
70+
- [Conditional Access for B2B](../external-identities/authentication-conditional-access.md) describes how Conditional Access and MFA work for external users.
7171
- [Cross-tenant access settings](../external-identities/cross-tenant-access-overview.md) provides granular control over how external Azure AD organizations collaborate with you (inbound access) and how your users collaborate with external Azure AD organizations (outbound access).
7272
- [Cross-tenant synchronization overview](../multi-tenant-organizations/cross-tenant-synchronization-overview.md) explains how to automate creating, updating, and deleting Azure AD B2B collaboration users across tenants in an organization.
7373

articles/active-directory/architecture/ops-guide-auth.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -134,7 +134,7 @@ If you're managing devices with MDM or Microsoft Intune, but not using device co
134134

135135
#### Device trust access policies recommended reading
136136

137-
- [How To: Plan your hybrid Azure Active Directory join implementation](../devices/hybrid-azuread-join-plan.md)
137+
- [How To: Plan your hybrid Azure Active Directory join implementation](../devices/hybrid-join-plan.md)
138138
- [Identity and device access configurations](/microsoft-365/enterprise/microsoft-365-policies-configurations)
139139

140140
### Windows Hello for Business

0 commit comments

Comments
 (0)