Skip to content

Commit 784d3c3

Browse files
authored
Merge pull request #17527 from MicrosoftDocs/repo_sync_working_branch
Confirm merge from repo_sync_working_branch to main to sync with https://github.com/MicrosoftDocs/azure-stack-docs (branch main)
2 parents bf49833 + 1b3137a commit 784d3c3

File tree

2 files changed

+5
-5
lines changed

2 files changed

+5
-5
lines changed

azure-local/concepts/firewall-requirements.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -113,7 +113,7 @@ Ensure that the following firewall rules are configured in your on-premises fire
113113

114114
| Rule | Action | Source | Destination | Service | Ports |
115115
|:--|:--|:--|:--|:--|:--|
116-
| Allow inbound/outbound connectivity to the Active Directory Web services (ADWS) and Active Directory Management Gateway Service | Allow | Active Directory Services | Azure Local | TCP | 9389 |
116+
| Allow inbound/outbound connectivity to the Active Directory Web services (ADWS) and Active Directory Management Gateway Service | Allow | Azure Local | Active Directory Services | TCP | 9389 |
117117

118118
### Network Time Protocol
119119

@@ -198,4 +198,4 @@ This section shows how to configure Microsoft Defender firewall to allow IP addr
198198
For more information, see also:
199199
200200
- The Windows Firewall and WinRM 2.0 ports section of [Installation and configuration for Windows Remote Management](/windows/win32/winrm/installation-and-configuration-for-windows-remote-management#windows-firewall-and-winrm-20-ports).
201-
- [About Azure Local deployment](../deploy/deployment-introduction.md).
201+
- [About Azure Local deployment](../deploy/deployment-introduction.md).

azure-local/plan/configure-custom-settings-active-directory.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -66,7 +66,7 @@ $DeploymentUser="deploymentuser"
6666
#Assign required permissions
6767
$userSecurityIdentifier = Get-ADuser -Identity $Deploymentuser
6868
$userSID = [System.Security.Principal.SecurityIdentifier] $userSecurityIdentifier.SID
69-
$acl = Get-Acl -Path $ouPath
69+
$acl = Get-Acl -Path "AD:$ouPath"
7070
$userIdentityReference = [System.Security.Principal.IdentityReference] $userSID
7171
$adRight = [System.DirectoryServices.ActiveDirectoryRights]::CreateChild -bor [System.DirectoryServices.ActiveDirectoryRights]::DeleteChild
7272
$genericAllRight = [System.DirectoryServices.ActiveDirectoryRights]::GenericAll
@@ -86,7 +86,7 @@ $rule3 = New-Object System.DirectoryServices.ActiveDirectoryAccessRule($userIden
8686
$acl.AddAccessRule($rule1)
8787
$acl.AddAccessRule($rule2)
8888
$acl.AddAccessRule($rule3)
89-
Set-Acl -Path $ouPath -AclObject $acl
89+
Set-Acl -Path "AD:$ouPath" -AclObject $acl
9090
```
9191

9292
## Required DNS records
@@ -162,4 +162,4 @@ Get-NetAdapter "vManagement*"|Set-DnsClient -RegisterThisConnectionsAddress $fal
162162

163163
Proceed to:
164164
- [Download the Azure Stack HCI OS software](../deploy/download-23h2-software.md).
165-
- [Install the Azure Stack HCI OS software](../deploy/deployment-install-os.md).
165+
- [Install the Azure Stack HCI OS software](../deploy/deployment-install-os.md).

0 commit comments

Comments
 (0)