Skip to content

Commit fad109c

Browse files
committed
rebrand
1 parent ec2802c commit fad109c

File tree

9 files changed

+86
-86
lines changed

9 files changed

+86
-86
lines changed

articles/active-directory-domain-services/notifications.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ ms.author: justinha
1616
---
1717
# Configure email notifications for issues in Microsoft Entra Domain Services
1818

19-
The health of a Microsoft Entra Domain Services (Microsoft Entra DS) managed domain is monitored by the Azure platform. The health status page in the Microsoft Entra admin center shows any alerts for the managed domain. To make sure issues are responded to in a timely manner, email notifications can be configured to report on health alerts as soon as they're detected in the Microsoft Entra DS managed domain.
19+
The health of a Microsoft Entra Domain Services managed domain is monitored by the Azure platform. The health status page in the Microsoft Entra admin center shows any alerts for the managed domain. To make sure issues are responded to in a timely manner, email notifications can be configured to report on health alerts as soon as they're detected in the Domain Services managed domain.
2020

2121
This article shows you how to configure email notification recipients for a managed domain.
2222

@@ -33,21 +33,21 @@ The following example email notification indicates a critical warning or alert w
3333
3434
### Why would I receive email notifications?
3535

36-
Microsoft Entra DS sends email notifications for important updates about the managed domain. These notifications are only for urgent issues that impact the service and should be addressed immediately. Each email notification is triggered by an alert on the managed domain. The alerts also appear in the Microsoft Entra admin center and can be viewed on the [Microsoft Entra DS health page][check-health].
36+
Domain Services sends email notifications for important updates about the managed domain. These notifications are only for urgent issues that impact the service and should be addressed immediately. Each email notification is triggered by an alert on the managed domain. The alerts also appear in the Microsoft Entra admin center and can be viewed on the [Domain Services health page][check-health].
3737

38-
Microsoft Entra DS doesn't send emails for advertisement, updates, or sales purposes.
38+
Domain Services doesn't send emails for advertisement, updates, or sales purposes.
3939

4040
### When will I receive email notifications?
4141

4242
A notification is sent immediately when a [new alert][troubleshoot-alerts] is found on a managed domain. If the alert isn't resolved, additional email notifications are sent as a reminder every four days.
4343

4444
### Who should receive the email notifications?
4545

46-
The list of email recipients for Microsoft Entra DS should be composed of people who are able to administer and make changes to the managed domain. This email list should be thought of as your "first responders" to any alerts and issues.
46+
The list of email recipients for Domain Services should be composed of people who are able to administer and make changes to the managed domain. This email list should be thought of as your "first responders" to any alerts and issues.
4747

4848
You can add up to five additional emails recipients for email notifications. If you want more than five recipients for email notifications, create a distribution list and add that to the notification list instead.
4949

50-
You can also choose to have all *Global Administrators* of the Microsoft Entra directory and every member of the *AAD DC Administrators* group receive email notifications. Microsoft Entra DS only sends notification to up to 100 email addresses, including the list of global administrators and AAD DC Administrators.
50+
You can also choose to have all *Global Administrators* of the Microsoft Entra directory and every member of the *AAD DC Administrators* group receive email notifications. Domain Services only sends notification to up to 100 email addresses, including the list of global administrators and AAD DC Administrators.
5151

5252
## Configure email notifications
5353

@@ -56,7 +56,7 @@ To review the existing email notification recipients or add additional recipient
5656
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as a [Global Administrator](../active-directory/roles/permissions-reference.md#authentication-policy-administrator).
5757
1. Search for and select **Microsoft Entra Domain Services**.
5858
1. Select your managed domain, such as *aaddscontoso.com*.
59-
1. On the left-hand side of the Microsoft Entra DS resource window, select **Notification settings**. The existing recipients for email notifications are shown.
59+
1. On the left-hand side of the Domain Services resource window, select **Notification settings**. The existing recipients for email notifications are shown.
6060
1. To add an email recipient, enter the email address in the additional recipients table.
6161
1. When done, select **Save** on the top-hand navigation.
6262

@@ -71,7 +71,7 @@ If an alert is resolved, the alert is cleared from the Microsoft Entra admin cen
7171

7272
### Why can I not edit the notification settings?
7373

74-
If you're unable to access the notification settings page in the Microsoft Entra admin center, you don't have the permissions to edit the managed domain. Contact a global administrator to either get permissions to edit Microsoft Entra DS resource or be removed from the recipient list.
74+
If you're unable to access the notification settings page in the Microsoft Entra admin center, you don't have the permissions to edit the managed domain. Contact a global administrator to either get permissions to edit Domain Services resource or be removed from the recipient list.
7575

7676
### I don't seem to be receiving email notifications even though I provided my email address. Why?
7777

articles/active-directory-domain-services/overview.md

Lines changed: 28 additions & 28 deletions
Original file line numberDiff line numberDiff line change
@@ -14,29 +14,29 @@ ms.author: justinha
1414

1515
ms.custom: contperf-fy21q1
1616

17-
#Customer intent: As an IT administrator or decision maker, I want to understand what Microsoft Entra DS is and how it can benefit my organization.
17+
#Customer intent: As an IT administrator or decision maker, I want to understand what Domain Services is and how it can benefit my organization.
1818
---
1919

2020
# What is Microsoft Entra Domain Services?
2121

22-
Microsoft Entra Domain Services (Microsoft Entra DS) provides managed domain services such as domain join, group policy, lightweight directory access protocol (LDAP), and Kerberos/NTLM authentication. You use these domain services without the need to deploy, manage, and patch domain controllers (DCs) in the cloud.
22+
Microsoft Entra Domain Services provides managed domain services such as domain join, group policy, lightweight directory access protocol (LDAP), and Kerberos/NTLM authentication. You use these domain services without the need to deploy, manage, and patch domain controllers (DCs) in the cloud.
2323

24-
A Microsoft Entra DS managed domain lets you run legacy applications in the cloud that can't use modern authentication methods, or where you don't want directory lookups to always go back to an on-premises AD DS environment. You can lift and shift those legacy applications from your on-premises environment into a managed domain, without needing to manage the AD DS environment in the cloud.
24+
A Domain Services managed domain lets you run legacy applications in the cloud that can't use modern authentication methods, or where you don't want directory lookups to always go back to an on-premises AD DS environment. You can lift and shift those legacy applications from your on-premises environment into a managed domain, without needing to manage the AD DS environment in the cloud.
2525

26-
Microsoft Entra DS integrates with your existing Microsoft Entra tenant. This integration lets users sign in to services and applications connected to the managed domain using their existing credentials. You can also use existing groups and user accounts to secure access to resources. These features provide a smoother lift-and-shift of on-premises resources to Azure.
26+
Domain Services integrates with your existing Microsoft Entra tenant. This integration lets users sign in to services and applications connected to the managed domain using their existing credentials. You can also use existing groups and user accounts to secure access to resources. These features provide a smoother lift-and-shift of on-premises resources to Azure.
2727

2828
> [!div class="nextstepaction"]
29-
> [To get started, create a Microsoft Entra DS managed domain using the Microsoft Entra admin center][tutorial-create]
29+
> [To get started, create a Domain Services managed domain using the Microsoft Entra admin center][tutorial-create]
3030
31-
Take a look at our short video to learn more about Microsoft Entra DS.
31+
Take a look at our short video to learn more about Domain Services.
3232

3333
> [!VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RE4LblD]
3434
3535
<a name='how-does-azure-ad-ds-work'></a>
3636

37-
## How does Microsoft Entra DS work?
37+
## How does Domain Services work?
3838

39-
When you create a Microsoft Entra DS managed domain, you define a unique namespace. This namespace is the domain name, such as *aaddscontoso.com*. Two Windows Server domain controllers (DCs) are then deployed into your selected Azure region. This deployment of DCs is known as a replica set.
39+
When you create a Domain Services managed domain, you define a unique namespace. This namespace is the domain name, such as *aaddscontoso.com*. Two Windows Server domain controllers (DCs) are then deployed into your selected Azure region. This deployment of DCs is known as a replica set.
4040

4141
You don't need to manage, configure, or update these DCs. The Azure platform handles the DCs as part of the managed domain, including backups and encryption at rest using Azure Disk Encryption.
4242

@@ -46,58 +46,58 @@ In a hybrid environment with an on-premises AD DS environment, [Microsoft Entra
4646

4747
![Synchronization in Microsoft Entra Domain Services with Microsoft Entra ID and on-premises AD DS using AD Connect](./media/active-directory-domain-services-design-guide/sync-topology.png)
4848

49-
Microsoft Entra DS replicates identity information from Microsoft Entra ID, so it works with Microsoft Entra tenants that are cloud-only, or synchronized with an on-premises AD DS environment. The same set of Microsoft Entra DS features exists for both environments.
49+
Domain Services replicates identity information from Microsoft Entra ID, so it works with Microsoft Entra tenants that are cloud-only, or synchronized with an on-premises AD DS environment. The same set of Domain Services features exists for both environments.
5050

5151
* If you have an existing on-premises AD DS environment, you can synchronize user account information to provide a consistent identity for users. To learn more, see [How objects and credentials are synchronized in a managed domain][synchronization].
52-
* For cloud-only environments, you don't need a traditional on-premises AD DS environment to use the centralized identity services of Microsoft Entra DS.
52+
* For cloud-only environments, you don't need a traditional on-premises AD DS environment to use the centralized identity services of Domain Services.
5353

54-
You can expand a managed domain to have more than one replica set per Microsoft Entra tenant. Replica sets can be added to any peered virtual network in any Azure region that supports Microsoft Entra DS. Additional replica sets in different Azure regions provide geographical disaster recovery for legacy applications if an Azure region goes offline. For more information, see [Replica sets concepts and features for managed domains][concepts-replica-sets].
54+
You can expand a managed domain to have more than one replica set per Microsoft Entra tenant. Replica sets can be added to any peered virtual network in any Azure region that supports Domain Services. By adding replica sets in different Azure regions, you can provide geographical disaster recovery for legacy applications if an Azure region goes offline. For more information, see [Replica sets concepts and features for managed domains][concepts-replica-sets].
5555

56-
Take a look at this video about how Microsoft Entra DS integrates with your applications and workloads to provide identity services in the cloud:
56+
Take a look at this video about how Domain Services integrates with your applications and workloads to provide identity services in the cloud:
5757

5858
<br />
5959

6060
>[!VIDEO https://www.youtube.com/embed/T1Nd9APNceQ]
6161
62-
To see Microsoft Entra DS deployment scenarios in action, you can explore the following examples:
62+
To see Domain Services deployment scenarios in action, you can explore the following examples:
6363

64-
* [Microsoft Entra DS for hybrid organizations](scenarios.md#azure-ad-ds-for-hybrid-organizations)
65-
* [Microsoft Entra DS for cloud-only organizations](scenarios.md#azure-ad-ds-for-cloud-only-organizations)
64+
* [Domain Services for hybrid organizations](scenarios.md#azure-ad-ds-for-hybrid-organizations)
65+
* [Domain Services for cloud-only organizations](scenarios.md#azure-ad-ds-for-cloud-only-organizations)
6666

6767
<a name='azure-ad-ds-features-and-benefits'></a>
6868

69-
## Microsoft Entra DS features and benefits
69+
## Domain Services features and benefits
7070

71-
To provide identity services to applications and VMs in the cloud, Microsoft Entra DS is fully compatible with a traditional AD DS environment for operations such as domain-join, secure LDAP (LDAPS), Group Policy, DNS management, and LDAP bind and read support. LDAP write support is available for objects created in the managed domain, but not resources synchronized from Microsoft Entra ID.
71+
To provide identity services to applications and VMs in the cloud, Domain Services is fully compatible with a traditional AD DS environment for operations such as domain-join, secure LDAP (LDAPS), Group Policy, DNS management, and LDAP bind and read support. LDAP write support is available for objects created in the managed domain, but not resources synchronized from Microsoft Entra ID.
7272

73-
To learn more about your identity options, [compare Microsoft Entra DS with Microsoft Entra ID, AD DS on Azure VMs, and AD DS on-premises][compare].
73+
To learn more about your identity options, [compare Domain Services with Microsoft Entra ID, AD DS on Azure VMs, and AD DS on-premises][compare].
7474

75-
The following features of Microsoft Entra DS simplify deployment and management operations:
75+
The following features of Domain Services simplify deployment and management operations:
7676

77-
* **Simplified deployment experience:** Microsoft Entra DS is enabled for your Microsoft Entra tenant using a single wizard in the Microsoft Entra admin center.
78-
* **Integrated with Microsoft Entra ID:** User accounts, group memberships, and credentials are automatically available from your Microsoft Entra tenant. New users, groups, or changes to attributes from your Microsoft Entra tenant or your on-premises AD DS environment are automatically synchronized to Microsoft Entra DS.
79-
* Accounts in external directories linked to your Microsoft Entra ID aren't available in Microsoft Entra DS. Credentials aren't available for those external directories, so can't be synchronized into a managed domain.
80-
* **Use your corporate credentials/passwords:** Passwords for users in Microsoft Entra DS are the same as in your Microsoft Entra tenant. Users can use their corporate credentials to domain-join machines, sign in interactively or over remote desktop, and authenticate against the managed domain.
77+
* **Simplified deployment experience:** Domain Services is enabled for your Microsoft Entra tenant using a single wizard in the Microsoft Entra admin center.
78+
* **Integrated with Microsoft Entra ID:** User accounts, group memberships, and credentials are automatically available from your Microsoft Entra tenant. New users, groups, or changes to attributes from your Microsoft Entra tenant or your on-premises AD DS environment are automatically synchronized to Domain Services.
79+
* Accounts in external directories linked to your Microsoft Entra ID aren't available in Domain Services. Credentials aren't available for those external directories, so can't be synchronized into a managed domain.
80+
* **Use your corporate credentials/passwords:** Passwords for users in Domain Services are the same as in your Microsoft Entra tenant. Users can use their corporate credentials to domain-join machines, sign in interactively or over remote desktop, and authenticate against the managed domain.
8181
* **NTLM and Kerberos authentication:** With support for NTLM and Kerberos authentication, you can deploy applications that rely on Windows-integrated authentication.
82-
* **High availability:** Microsoft Entra DS includes multiple domain controllers, which provide high availability for your managed domain. This high availability guarantees service uptime and resilience to failures.
82+
* **High availability:** Domain Services includes multiple domain controllers, which provide high availability for your managed domain. This high availability guarantees service uptime and resilience to failures.
8383
* In regions that support [Azure Availability Zones][availability-zones], these domain controllers are also distributed across zones for additional resiliency.
8484
* [Replica sets][concepts-replica-sets] can also be used to provide geographical disaster recovery for legacy applications if an Azure region goes offline.
8585

8686
Some key aspects of a managed domain include the following:
8787

8888
* The managed domain is a stand-alone domain. It isn't an extension of an on-premises domain.
89-
* If needed, you can create one-way outbound forest trusts from Microsoft Entra DS to an on-premises AD DS environment. For more information, see [Forest concepts and features for Microsoft Entra DS][forest-trusts].
89+
* If needed, you can create one-way outbound forest trusts from Domain Services to an on-premises AD DS environment. For more information, see [Forest concepts and features for Domain Services][forest-trusts].
9090
* Your IT team doesn't need to manage, patch, or monitor domain controllers for this managed domain.
9191

9292
For hybrid environments that run AD DS on-premises, you don't need to manage AD replication to the managed domain. User accounts, group memberships, and credentials from your on-premises directory are synchronized to Microsoft Entra ID via [Microsoft Entra Connect][azure-ad-connect]. These user accounts, group memberships, and credentials are automatically available within the managed domain.
9393

9494
## Next steps
9595

96-
To learn more about Microsoft Entra DS compares with other identity solutions and how synchronization works, see the following articles:
96+
To learn more about Domain Services compares with other identity solutions and how synchronization works, see the following articles:
9797

98-
* [Compare Microsoft Entra DS with Microsoft Entra ID, Active Directory Domain Services on Azure VMs, and Active Directory Domain Services on-premises][compare]
98+
* [Compare Domain Services with Microsoft Entra ID, Active Directory Domain Services on Azure VMs, and Active Directory Domain Services on-premises][compare]
9999
* [Learn how Microsoft Entra Domain Services synchronizes with your Microsoft Entra directory][synchronization]
100-
* To learn how to administrator a managed domain, see [management concepts for user accounts, passwords, and administration in Microsoft Entra DS][administration-concepts].
100+
* To learn how to administrator a managed domain, see [management concepts for user accounts, passwords, and administration in Domain Services][administration-concepts].
101101

102102
To get started, [create a managed domain using the Microsoft Entra admin center][tutorial-create].
103103

0 commit comments

Comments
 (0)