Skip to content

Commit fdab24d

Browse files
committed
2 parents 723691c + 1163ce0 commit fdab24d

File tree

131 files changed

+3290
-1674
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

131 files changed

+3290
-1674
lines changed

.openpublishing.redirection.json

Lines changed: 25 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -29021,6 +29021,31 @@
2902129021
"redirect_url": "/azure/security-center/faq-general",
2902229022
"redirect_document_id": false
2902329023
},
29024+
{
29025+
"source_path": "articles/security-center/security-center-alerts-iaas.md",
29026+
"redirect_url": "/azure/security-center/threat-protection",
29027+
"redirect_document_id": false
29028+
},
29029+
{
29030+
"source_path": "articles/security-center/security-center-alerts-data-services.md",
29031+
"redirect_url": "/azure/security-center/threat-protection",
29032+
"redirect_document_id": false
29033+
},
29034+
{
29035+
"source_path": "articles/security-center/security-center-alerts-compute.md",
29036+
"redirect_url": "/azure/security-center/threat-protection",
29037+
"redirect_document_id": false
29038+
},
29039+
{
29040+
"source_path": "articles/security-center/security-center-alerts-service-layer.md",
29041+
"redirect_url": "/azure/security-center/threat-protection",
29042+
"redirect_document_id": false
29043+
},
29044+
{
29045+
"source_path": "articles/security-center/security-center-alerts-integration.md",
29046+
"redirect_url": "/azure/security-center/threat-protection",
29047+
"redirect_document_id": false
29048+
},
2902429049
{
2902529050
"source_path": "articles/security-center/security-center-playbooks.md",
2902629051
"redirect_url": "/azure/security-center/workflow-automation",

articles/active-directory-domain-services/network-considerations.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -142,7 +142,7 @@ The following network security group rules are required for Azure AD DS to provi
142142

143143
## User-defined routes
144144

145-
User-defined routes aren't created by default, and aren't needed for Azure AD DS to work correctly. If you're required to use route tables, avoid making any changes to the *0.0.0.0* route. Changes to this route can disrupt Azure AD Domain Services.
145+
User-defined routes aren't created by default, and aren't needed for Azure AD DS to work correctly. If you're required to use route tables, avoid making any changes to the *0.0.0.0* route. Changes to this route disrupt Azure AD Domain Services and puts the managed domain in an unsupported state.
146146

147147
You must also route inbound traffic from the IP addresses included in the respective Azure service tags to the Azure AD Domain Services subnet. For more information on service tags and their associated IP address from, see [Azure IP Ranges and Service Tags - Public Cloud](https://www.microsoft.com/en-us/download/details.aspx?id=56519).
148148

articles/active-directory/conditional-access/concept-conditional-access-conditions.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: conditional-access
88
ms.topic: conceptual
9-
ms.date: 02/11/2020
9+
ms.date: 02/25/2020
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -61,6 +61,7 @@ Conditional Access policies by default apply to browser-based applications and a
6161
- Modern authentication clients
6262
- This option includes applications like the Office desktop and phone applications.
6363
- Exchange ActiveSync clients
64+
- By default this includes all use of the Exchange ActiveSync (EAS) protocol. Choosing **Apply policy only to supported platforms** will limit to supported platforms like iOS, Android, and Windows.
6465
- When policy blocks the use of Exchange ActiveSync the affected user will receive a single quarantine email. This email with provide information on why they are blocked and include remediation instructions if able.
6566
- Other clients
6667
- This option includes clients that use basic/legacy authentication protocols including IMAP, MAPI, POP, SMTP, and legacy Office applications that do not support modern authentication.

articles/active-directory/develop/accounts-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -47,7 +47,7 @@ An account in the Microsoft identity platform consists of:
4747
4848
## Account overview diagram
4949

50-
![Account Overview Diagram](./media/accounts-overview/accounts-overview.png)
50+
![Account Overview Diagram](./media/accounts-overview/accounts-overview.svg)
5151

5252
In the above diagram:
5353

Binary file not shown.

articles/active-directory/develop/media/accounts-overview/accounts-overview.svg

Lines changed: 603 additions & 0 deletions
Loading

articles/active-directory/develop/scenario-protected-web-api-app-configuration.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -106,7 +106,7 @@ The middleware is added to the web API by this instruction:
106106

107107
```csharp
108108
services.AddAuthentication(AzureADDefaults.JwtBearerAuthenticationScheme)
109-
.AddAzureAdBearer(options => Configuration.Bind("AzureAd", options));
109+
.AddAzureADBearer(options => Configuration.Bind("AzureAd", options));
110110
```
111111

112112
Currently, the ASP.NET Core templates create Azure Active Directory (Azure AD) web APIs that sign in users within your organization or any organization. They don't sign in users with personal accounts. But you can change the templates to use the Microsoft identity platform endpoint by adding this code to Startup.cs:

articles/aks/use-multiple-node-pools.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -25,8 +25,7 @@ You need the Azure CLI version 2.0.76 or later installed and configured. Run `az
2525
The following limitations apply when you create and manage AKS clusters that support multiple node pools:
2626

2727
* See [Quotas, virtual machine size restrictions, and region availability in Azure Kubernetes Service (AKS)][quotas-skus-regions].
28-
* You can't delete the default (first) node pool.
29-
* The HTTP application routing add-on can't be used.
28+
* You can't delete the system node pool, by default the first node pool.
3029
* The AKS cluster must use the Standard SKU load balancer to use multiple node pools, the feature is not supported with Basic SKU load balancers.
3130
* The AKS cluster must use virtual machine scale sets for the nodes.
3231
* The name of a node pool may only contain lowercase alphanumeric characters and must begin with a lowercase letter. For Linux node pools the length must be between 1 and 12 characters, for Windows node pools the length must be between 1 and 6 characters.

articles/app-service-mobile/TOC.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
- name: Mobile Apps Documentation
2-
href: index.md
2+
href: index.yml
33
- name: Overview
44
items:
55
- name: What are Mobile Apps?

articles/app-service-mobile/index.md

Lines changed: 0 additions & 203 deletions
This file was deleted.

0 commit comments

Comments
 (0)