Skip to content

Commit f741e78

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into release-ga-servicefabric-6-5
2 parents 4432f58 + e376c99 commit f741e78

File tree

62 files changed

+320
-199
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

62 files changed

+320
-199
lines changed

articles/active-directory/users-groups-roles/directory-assign-admin-roles.md

Lines changed: 48 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -88,7 +88,7 @@ The following administrator roles are available:
8888
[Intune](https://docs.microsoft.com/intune/role-based-access-control) | View all Intune audit data
8989
[Cloud App Security](https://docs.microsoft.com/cloud-app-security/manage-admins) | Has read-only permissions and can manage alerts<br>Can create and modify file policies and allow file governance actions<br> Can view all the built-in reports under Data Management
9090

91-
<!--* **[Compliance Data Administrator](#compliance-data-administrator)**: Users with this role have permissions to protect and track data in the Microsoft 365 compliance center, Microsoft 365 admin center, and Azure. Users can also manage all features within the Exchange admin center, Compliance Manager, and Teams & Skype for Business admin center and create support tickets for Azure and Microsoft 365.
91+
* **[Compliance Data Administrator](#compliance-data-administrator)**: Users with this role have permissions to protect and track data in the Microsoft 365 compliance center, Microsoft 365 admin center, and Azure. Users can also manage all features within the Exchange admin center, Compliance Manager, and Teams & Skype for Business admin center and create support tickets for Azure and Microsoft 365.
9292

9393
In | Can do
9494
----- | ----------
@@ -97,7 +97,7 @@ The following administrator roles are available:
9797
[Office 365 Security & Compliance Center](https://support.office.com/article/About-Office-365-admin-roles-da585eea-f576-4f55-a1e0-87090b6aaa9d) | Manage data governance<br>Perform legal and data investigation<br>Manage Data Subject Request
9898
[Intune](https://docs.microsoft.com/intune/role-based-access-control) | View all Intune audit data
9999
[Cloud App Security](https://docs.microsoft.com/cloud-app-security/manage-admins) | Has read-only permissions and can manage alerts<br>Can create and modify file policies and allow file governance actions<br> Can view all the built-in reports under Data Management
100-
-->
100+
101101
* **[Conditional Access Administrator](#conditional-access-administrator)**: Users with this role have the ability to manage Azure Active Directory conditional access settings.
102102
> [!NOTE]
103103
> To deploy Exchange ActiveSync conditional access policy in Azure, the user must also be a Global Administrator.
@@ -208,7 +208,7 @@ Additionally, the user can access reports related to adoption & usage of Kaizala
208208
[Azure Security Center](https://docs.microsoft.com/azure/role-based-access-control/built-in-roles) | Can view security policies, view security states, edit security policies, view alerts and recommendations, dismiss alerts and recommendations
209209
[Office 365 service health](https://docs.microsoft.com/office365/enterprise/view-service-health) | View the health of Office 365 services
210210

211-
<!--* **[Security operator](#security-operator)**: Users with this role can manage alerts and have global read-only access on security-related feature, including all information in Microsoft 365 security center, Azure Active Directory, Identity Protection, Privileged Identity Management, as well as the ability to read Azure Active Directory sign-in reports and audit logs, and in Office 365 Security & Compliance Center.
211+
* **[Security operator](#security-operator)**: Users with this role can manage alerts and have global read-only access on security-related feature, including all information in Microsoft 365 security center, Azure Active Directory, Identity Protection, Privileged Identity Management and Office 365 Security & Compliance Center. More information about Office 365 permissions is available at [Permissions in the Office 365 Security & Compliance Center](https://docs.microsoft.com/en-us/office365/securitycompliance/permissions-in-the-security-and-compliance-center).
212212

213213
In | Can do
214214
--- | ---
@@ -220,7 +220,8 @@ Additionally, the user can access reports related to adoption & usage of Kaizala
220220
[Intune](https://docs.microsoft.com/intune/role-based-access-control) | All permissions of the Security Reader role
221221
[Cloud App Security](https://docs.microsoft.com/cloud-app-security/manage-admins) | All permissions of the Security Reader role
222222
[Office 365 service health](https://docs.microsoft.com/office365/enterprise/view-service-health) | View the health of Office 365 services
223-
-->
223+
<!--* **[Security Operator](#security-operator)**: Users with this role can manage alerts and have global read-only access on security-related feature, including all information in Microsoft 365 security center, Azure Active Directory, Identity Protection, Privileged Identity Management.-->
224+
224225
* **[Security Reader](#security-reader)**: Users with this role have global read-only access on security-related feature, including all information in Microsoft 365 security center, Azure Active Directory, Identity Protection, Privileged Identity Management, as well as the ability to read Azure Active Directory sign-in reports and audit logs, and in Office 365 Security & Compliance Center. More information about Office 365 permissions is available at [Permissions in the Office 365 Security & Compliance Center](https://support.office.com/article/Permissions-in-the-Office-365-Security-Compliance-Center-d10608af-7934-490a-818e-e68f17d0e9c1).
225226

226227
In | Can do
@@ -563,6 +564,28 @@ Can read and manage compliance configuration and reports in Azure AD and Office
563564
| microsoft.office365.skypeForBusiness/allEntities/allTasks | Manage all aspects of Skype for Business Online. |
564565
| microsoft.office365.supportTickets/allEntities/allTasks | Create and manage Office 365 support tickets. |
565566

567+
### Compliance Data Administrator
568+
Creates and manages compliance content.
569+
570+
> [!NOTE]
571+
> This role has additional permissions outside of Azure Active Directory. For more information, see role description above.
572+
>
573+
>
574+
575+
| **Actions** | **Description** |
576+
| --- | --- |
577+
| microsoft.aad.cloudAppSecurity/allEntities/allTasks | Read and configure Microsoft Cloud App Security. |
578+
| microsoft.azure.informationProtection/allEntities/allTasks | Manage all aspects of Azure Information Protection. |
579+
| microsoft.azure.serviceHealth/allEntities/allTasks | Read and configure Azure Service Health. |
580+
| microsoft.azure.supportTickets/allEntities/allTasks | Create and manage Azure support tickets. |
581+
| microsoft.office365.webPortal/allEntities/basic/read | Read basic properties on all resources in microsoft.office365.webPortal. |
582+
| microsoft.office365.complianceManager/allEntities/allTasks | Manage all aspects of Office 365 Compliance Manager |
583+
| microsoft.office365.exchange/allEntities/allTasks | Manage all aspects of Exchange Online. |
584+
| microsoft.office365.serviceHealth/allEntities/allTasks | Read and configure Office 365 Service Health. |
585+
| microsoft.office365.sharepoint/allEntities/allTasks | Create and delete all resources, and read and update standard properties in microsoft.office365.sharepoint. |
586+
| microsoft.office365.skypeForBusiness/allEntities/allTasks | Manage all aspects of Skype for Business Online. |
587+
| microsoft.office365.supportTickets/allEntities/allTasks | Create and manage Office 365 support tickets. |
588+
566589
### Conditional Access Administrator
567590
Can manage conditional access capabilities.
568591

@@ -1079,6 +1102,25 @@ Can read security information and reports, and manage configuration in Azure AD
10791102
| microsoft.office365.protectionCenter/allEntities/update | Update all resources in microsoft.office365.protectionCenter. |
10801103
| microsoft.office365.serviceHealth/allEntities/allTasks | Read and configure Office 365 Service Health. |
10811104

1105+
### Security Operator
1106+
Creates and manages security events.
1107+
1108+
> [!NOTE]
1109+
> This role has additonal permissions outside of Azure Active Directory. For more information, see role description above.
1110+
>
1111+
>
1112+
1113+
| **Actions** | **Description** |
1114+
| --- | --- |
1115+
| microsoft.aad.cloudAppSecurity/allEntities/allTasks | Read and configure Microsoft Cloud App Security. |
1116+
| microsoft.aad.identityProtection/allEntities/read | Read all resources in microsoft.aad.identityProtection. |
1117+
| microsoft.aad.privilegedIdentityManagement/allEntities/read | Read all resources in microsoft.aad.privilegedIdentityManagement. |
1118+
| microsoft.azure.advancedThreatProtection/allEntities/read | Read and configure Azure AD Advanced Threat Protection. |
1119+
| microsoft.intune/allEntities/allTasks | Manage all aspects of Intune. |
1120+
| microsoft.office365.securityComplianceCenter/allEntities/allTasks | Read and configure Security & Compliance Center. |
1121+
| microsoft.office365.usageReports/allEntities/read | Read Office 365 usage reports. |
1122+
| microsoft.windows.defenderAdvancedThreatProtection/allEntities/read | Read and configure Windows Defender Advanced Threat Protection. |
1123+
10821124
### Security Reader
10831125
Can read security information and reports in Azure AD and Office 365.
10841126

@@ -1264,6 +1306,7 @@ Cloud Application Administrator | Cloud application administrator | 158c047a-c90
12641306
Cloud Device Administrator | Cloud device administrator | 7698a772-787b-4ac8-901f-60d6b08affd2
12651307
Company Administrator | Global administrator | 62e90394-69f5-4237-9190-012177145e10
12661308
Compliance Administrator | Compliance administrator | 17315797-102d-40b4-93e0-432062caca18
1309+
Compliance Data Administrator | Compliance data administrator | e6d1a23a-da11-4be4-9570-befc86d067a7
12671310
Conditional Access Administrator | Conditional Access administrator | b1be1c3e-b65d-4f19-8427-f6fa0d97feb9
12681311
CRM Service Administrator | Dynamics 365 administrator | 44367163-eba1-44c3-98af-f5787879f96a
12691312
Customer LockBox Access Approver | Customer Lockbox access approver | 5c4f9dcd-47dc-4cf7-8c9a-9e4207cbfc91
@@ -1293,6 +1336,7 @@ Reports Reader | Reports reader | 4a5d8f65-41da-4de4-8968-e035b65339cf
12931336
Search Administrator | Search administrator | 0964bb5e-9bdb-4d7b-ac29-58e794862a40
12941337
Search Editor | Search editor | 8835291a-918c-4fd7-a9ce-faa49f0cf7d9
12951338
Security Administrator | Security administrator | 194ae4cb-b126-40b2-bd5b-6091b380977d
1339+
Security Operator | Security operator | 5f2222b1-57c3-48ba-8ad5-d4759f1fde6f
12961340
Security Reader | Security reader | 5d6b6bb7-de71-4623-b4af-96380a352509
12971341
Service Support Administrator | Service administrator | f023fd81-a637-4b56-95fd-791ac0226033
12981342
SharePoint Service Administrator | Sharepoint administrator | f28a1f50-f6e7-4571-818b-6a12f2af6b6c

articles/aks/configure-kubenet.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -58,7 +58,7 @@ The following basic calculations compare the difference in network models:
5858
5959
### Virtual network peering and ExpressRoute connections
6060

61-
To provide on-premises connectivity, both *kubenet* and *Azure-CNI* network approaches can use [Azure virtual network peering][vnet-peering] or [ExpressRoute connections][express-route]. Plan your IP address ranges carefully to prevent overlap and incorrect traffic routing. For example, many on-premises networks use a *10.0.0.0/8* address range that is advertised over the ExpressRoute connection. It's recommended to create your AKS clusters into Azure virtual network subnets outside of this address range, such as *172.26.0.0/16*.
61+
To provide on-premises connectivity, both *kubenet* and *Azure-CNI* network approaches can use [Azure virtual network peering][vnet-peering] or [ExpressRoute connections][express-route]. Plan your IP address ranges carefully to prevent overlap and incorrect traffic routing. For example, many on-premises networks use a *10.0.0.0/8* address range that is advertised over the ExpressRoute connection. It's recommended to create your AKS clusters into Azure virtual network subnets outside of this address range, such as *172.16.0.0/16*.
6262

6363
### Choose a network model to use
6464

@@ -88,15 +88,15 @@ To get started with using *kubenet* and your own virtual network subnet, first c
8888
az group create --name myResourceGroup --location eastus
8989
```
9090

91-
If you don't have an existing virtual network and subnet to use, create these network resources using the [az network vnet create][az-network-vnet-create] command. In the following example, the virtual network is named *myVnet* with the address prefix of *10.0.0.0/8*. A subnet is created named *myAKSSubnet* with the address prefix *10.240.0.0/16*.
91+
If you don't have an existing virtual network and subnet to use, create these network resources using the [az network vnet create][az-network-vnet-create] command. In the following example, the virtual network is named *myVnet* with the address prefix of *192.168.0.0/16*. A subnet is created named *myAKSSubnet* with the address prefix *192.168.1.0/24*.
9292

9393
```azurecli-interactive
9494
az network vnet create \
9595
--resource-group myResourceGroup \
9696
--name myAKSVnet \
97-
--address-prefixes 10.0.0.0/8 \
97+
--address-prefixes 192.168.0.0/16 \
9898
--subnet-name myAKSSubnet \
99-
--subnet-prefix 10.240.0.0/16
99+
--subnet-prefix 192.168.1.0/24
100100
```
101101

102102
## Create a service principal and assign permissions
@@ -146,7 +146,7 @@ The following IP address ranges are also defined as part of the cluster create p
146146

147147
* The *--pod-cidr* should be a large address space that isn't in use elsewhere in your network environment. This range includes any on-premises network ranges if you connect, or plan to connect, your Azure virtual networks using Express Route or a Site-to-Site VPN connection.
148148
* This address range must be large enough to accommodate the number of nodes that you expect to scale up to. You can't change this address range once the cluster is deployed if you need more addresses for additional nodes.
149-
* The pod IP address range is used to assign a */24* address space to each node in the cluster. In the following example, the *--pod-cidr* of *192.168.0.0/16* assigns the first node *192.168.0.0/24*, the second node *192.168.1.0/24*, and the third node *192.168.2.0/24*.
149+
* The pod IP address range is used to assign a */24* address space to each node in the cluster. In the following example, the *--pod-cidr* of *10.244.0.0/16* assigns the first node *10.244.0.0/24*, the second node *10.244.1.0/24*, and the third node *10.244.2.0/24*.
150150
* As the cluster scales or upgrades, the Azure platform continues to assign a pod IP address range to each new node.
151151

152152
* The *--docker-bridge-address* lets the AKS nodes communicate with the underlying management platform. This IP address must not be within the virtual network IP address range of your cluster, and shouldn't overlap with other address ranges in use on your network.
@@ -159,7 +159,7 @@ az aks create \
159159
--network-plugin kubenet \
160160
--service-cidr 10.0.0.0/16 \
161161
--dns-service-ip 10.0.0.10 \
162-
--pod-cidr 192.168.0.0/16 \
162+
--pod-cidr 10.244.0.0/16 \
163163
--docker-bridge-address 172.17.0.1/16 \
164164
--vnet-subnet-id $SUBNET_ID \
165165
--service-principal <appId> \

articles/app-service/operating-system-functionality.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -61,7 +61,7 @@ It is important to monitor your disk utilization as your application grows. If t
6161

6262
- The app may throw an error indicating not enough space on the disk.
6363
- You may see disk errors when browsing to the Kudu console.
64-
- Deployment from VSTS or Visual Studio may fail with `ERROR_NOT_ENOUGH_DISK_SPACE: Web deployment task failed. (Web Deploy detected insufficient space on disk)`.
64+
- Deployment from Azure DevOps or Visual Studio may fail with `ERROR_NOT_ENOUGH_DISK_SPACE: Web deployment task failed. (Web Deploy detected insufficient space on disk)`.
6565
- Your app may suffer slow performance.
6666

6767
<a id="NetworkDrives"></a>

articles/azure-cache-for-redis/cache-faq.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -247,7 +247,7 @@ You can use any of the commands listed at [Redis commands](https://redis.io/comm
247247
* `redis-cli -h <Azure Cache for Redis name>.redis.cache.windows.net -a <key>`
248248

249249
> [!NOTE]
250-
> The Redis command-line tools do not work with the SSL port, but you can use a utility such as `stunnel` to securely connect the tools to the SSL port by following the directions in the [Announcing ASP.NET Session State Provider for Redis Preview Release](https://blogs.msdn.com/b/webdev/archive/2014/05/12/announcing-asp-net-session-state-provider-for-redis-preview-release.aspx) blog post.
250+
> The Redis command-line tools do not work with the SSL port, but you can use a utility such as `stunnel` to securely connect the tools to the SSL port by following the directions in the [How to use the Redis command-line tool with Azure Cache for Redis](https://docs.microsoft.com/en-us/azure/azure-cache-for-redis/cache-how-to-redis-cli-tool) article.
251251
>
252252
>
253253

articles/azure-government/documentation-government-services-monitoringandmanagement.md

Lines changed: 7 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -158,7 +158,9 @@ For more information on using PowerShell, see [public documentation](../azure-mo
158158
## Application Insights
159159

160160
> [!NOTE]
161-
> Codeless agent/extension based monitoring for Azure App Services is **currently not supported**. Snapshot Debugger is also not currently available in Azure Government. As soon as this functionality becomes available this article will be updated.
161+
> Codeless agent/extension based monitoring for Azure App Services is **currently not supported**. As soon as this functionality becomes available this article will be updated.
162+
163+
This section describes the supplemental configuration that is required to use Application Insights in Azure Government. To learn more about Azure Monitor and Application Insights checkout the [full documentation](https://docs.microsoft.com/azure/azure-monitor/overview).
162164

163165
### Enable Application Insights for ASP.NET & ASP.NET Core with Visual Studio
164166

@@ -173,6 +175,10 @@ Currently for Azure Government customers, the only way to enable Application Ins
173175

174176
3. Make the appropriate Application Insights SDK endpoint modifications for either [ASP.NET](https://docs.microsoft.com/azure/azure-government/documentation-government-services-monitoringandmanagement#net-with-applicationinsightsconfig) or [ASP.NET Core](https://docs.microsoft.com/azure/azure-government/documentation-government-services-monitoringandmanagement#net-core) depending on your project type.
175177

178+
### Snapshot Debugger
179+
180+
Snapshot Debugger is now available for Azure Government customers. To use Snapshot Debugger the only additional prerequisite is to insure that you are using [Snapshot Collector version 1.3.5](https://www.nuget.org/packages/Microsoft.ApplicationInsights.SnapshotCollector/1.3.5-pre-1906.403) or later. Then simply follow the standard [Snapshot Debugger documentation](https://docs.microsoft.com/azure/azure-monitor/app/snapshot-debugger).
181+
176182
### SDK endpoint modifications
177183

178184
In order to send data from Application Insights to the Azure Government region, you will need to modify the default endpoint addresses that are used by the Application Insights SDKs. Each SDK requires slightly different modifications.

articles/azure-maps/how-to-request-real-time-data.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -110,9 +110,9 @@ Let's use "522" as our metro ID, which is the metro ID for "Seattle–Tacoma–B
110110
}
111111
112112
113-
## Real-time availability and vacancy information for bike docking station
113+
## Real-time data for bike docking station
114114
115-
The [Get Transit Dock Info API](https://aka.ms/AzureMapsMobilityTransitDock) of the Azure Maps Mobility Service, allows to request static and real-time information for a given bike or scooter docking station. We will make a request to get real-time data for a docking station for bikes.
115+
The [Get Transit Dock Info API](https://aka.ms/AzureMapsMobilityTransitDock) of the Azure Maps Mobility Service, allows to request static and real-time information such as availability and vacancy information for a given bike or scooter docking station. We will make a request to get real-time data for a docking station for bikes.
116116
117117
In order to make a request to the Get Transit Dock Info API, you will need the **dockId** for that station. You can get the dock ID by making a search request to the [Get Nearby Transit API](https://aka.ms/AzureMapsMobilityNearbyTransit) and setting the **objectType** parameter to "bikeDock". Follow the steps below to get real-time data of a docking station for bikes.
118118

0 commit comments

Comments
 (0)