Skip to content

Commit 41986f8

Browse files
Merge pull request #309547 from habibaum/updates-as-per-standards
Updates as per standards
2 parents 83c5d09 + a5b2672 commit 41986f8

9 files changed

Lines changed: 17 additions & 17 deletions

articles/migrate/insights-overview.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -129,7 +129,7 @@ To review detailed security risks for Servers and Software, perform the followin
129129

130130
To review detailed security risks for servers, follow these steps:
131131

132-
1. Open the **Insights** (preview) pane.
132+
1. Go to the **Insights** (preview) pane.
133133
1. In the **Servers card**, select the link that shows the number of servers with security risks.
134134

135135
:::image type="content" source="./media/security-insights-overview/servers-risk-type.png" alt-text="Screenshot shows the servers with security risks." lightbox="./media/security-insights-overview/servers-risk-type.png":::
@@ -157,7 +157,7 @@ Alternatively, you can filter servers with security risks from the **Explore inv
157157

158158
To review software with identified security risks, follow these steps:
159159

160-
1. Open the **Insights** (preview) pane.
160+
1. Go to the **Insights** (preview) pane.
161161
1. In the **Software** card, select the link that shows the number of software items with security risks.
162162

163163
:::image type="content" source="./media/security-insights-overview/software-with-security-risks.png" alt-text="Screenshot shows the number of software security risks." lightbox="./media/security-insights-overview/software-with-security-risks.png":::
@@ -207,7 +207,7 @@ Security insights are enabled by default for all users. To manage access, create
207207
| | `Microsoft.OffAzure/vmwareSites/machines/inventoryinsights/vulnerabilities/*` | Read vulnerabilities of VMware machine |
208208

209209

210-
You can also implement built-in roles for Azure Migrate to manage access to view Insights. [Learn more](/azure/migrate/prepare-azure-accounts?view=migrate)
210+
You can also implement built-in roles for Azure Migrate to manage access to view Insights. [Learn more](/azure/migrate/prepare-azure-accounts)
211211

212212
Below error message is displayed when a user does not have permissions to view Insights:
213213

@@ -221,7 +221,7 @@ Below error message is displayed when a user does not have permissions to view I
221221
Azure offers integrated solutions to identify and mitigate security risks and strengthen cloud security posture:
222222

223223
- [Microsoft Defender for Cloud](/azure/defender-for-cloud/defender-for-cloud-introduction) delivers unified security management and advanced threat protection. It continuously evaluates resources for misconfigurations and vulnerabilities, providing actionable recommendations to harden your infrastructure. By aligning with industry compliance standards, it ensures your workloads remain secure and compliant.
224-
- [Azure Update Manager](/azure/update-manager/overview?view=migrate) streamlines operating system patching without additional infrastructure. It automates update schedules to minimize security risks from unpatched systems and offers detailed compliance reporting. With granular control over deployments, it helps maintain system integrity and resilience against evolving threats.
224+
- [Azure Update Manager](/azure/update-manager/overview) streamlines operating system patching without additional infrastructure. It automates update schedules to minimize security risks from unpatched systems and offers detailed compliance reporting. With granular control over deployments, it helps maintain system integrity and resilience against evolving threats.
225225

226226
## Next steps
227227

articles/migrate/prepare-azure-accounts.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -99,7 +99,7 @@ Follow these steps to check your access
9999

100100
### Remove access
101101
1. Azure Migrate owner can only remove Azure Migrate Decide and Plan Expert and Azure Migrate Execute Expert role assignments. Subscription or resource group owners can remove the Azure Migrate owner role assignment.
102-
2. Open Access control (IAM) at scope subscription or resource group.
102+
2. Go to Access control (IAM) at scope subscription or resource group.
103103
3. Select role assignments
104104
4. Select the role assignment that you would like to remove
105105
:::image type="content" source="./media/prepare-azure-accounts/remove-access.png" alt-text="Azure portal Access control IAM page showing role assignments table with a selected user row highlighted in blue and a red Delete button prominently displayed in the top toolbar, demonstrating the process to remove role assignments from users in the resource management interface." lightbox="./media/prepare-azure-accounts/remove-access.png":::

articles/migrate/prepare-for-agentless-migration.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -141,7 +141,7 @@ The preparation script executes the following changes based on the OS type of th
141141

142142
The Windows VM agent can be manually installed with a Windows installer package. To manually install the Windows VM Agent, [download the VM Agent installer](https://go.microsoft.com/fwlink/?LinkID=394789). You can also search for a specific version in the [GitHub Windows IaaS VM Agent releases](https://github.com/Azure/WindowsVMAgent/releases). The VM Agent is supported on Windows Server 2008 (64 bit) and later.
143143

144-
To check if the Azure VM Agent was successfully installed, open Task Manager, select the **Details** tab, and look for the process name *WindowsAzureGuestAgent.exe*. The presence of this process indicates that the VM agent is installed. You can also use [PowerShell to detect the VM agent.](/azure/virtual-machines/extensions/agent-windows#powershell)
144+
To check if the Azure VM Agent was successfully installed, go to **Task Manager**, select the **Details** tab, and look for the process name *WindowsAzureGuestAgent.exe*. The presence of this process indicates that the VM agent is installed. You can also use [PowerShell to detect the VM agent.](/azure/virtual-machines/extensions/agent-windows#powershell)
145145

146146
![Successful Installation of Azure VM Agent](./media/concepts-prepare-vmware-agentless-migration/installation-azure-vm-agent.png)
147147

articles/migrate/quickstart-create-migrate-project.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ The template used in this quickstart is from [Azure Quickstart Templates](https:
3838

3939
To deploy the template, the **Subscription**, **Resource group**, **Project name**, and **Location** are required.
4040

41-
1. To sign in to Azure and open the template, select the **Deploy to Azure** image.
41+
1. To sign in to Azure and go to the template, select the **Deploy to Azure** image.
4242

4343
:::image type="content" source="~/reusable-content/ce-skilling/azure/media/template-deployments/deploy-to-azure-button.svg" alt-text="Button to deploy the Resource Manager template to Azure." border="false" link="https://portal.azure.com/#create/Microsoft.Template/uri/https%3A%2F%2Fraw.githubusercontent.com%2FAzure%2Fazure-quickstart-templates%2Fmaster%2Fquickstarts%2Fmicrosoft.migrate%2Fmigrate-project-create%2Fazuredeploy.json":::
4444

articles/migrate/quickstart-create-project.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -66,7 +66,7 @@ After you create the project, perform the following steps to try out the new age
6666

6767
Ensure that you install Az CLI to execute the required commands by following the steps provided in the documentation [here](/cli/azure/install-azure-cli).
6868

69-
After you install the Az CLI (in PowerShell), open PowerShell on your system as an Administrator and execute the following commands:
69+
After you install the Az CLI (in PowerShell), go to PowerShell on your system as an Administrator and execute the following commands:
7070

7171
1. Log in to the Azure tenant and set the Subscription.
7272
- az log in --tenant <TENANT_ID>
@@ -125,7 +125,7 @@ To delete a project, follow these steps:
125125

126126
> [!NOTE]
127127
> - When you delete, both the project and the metadata about discovered servers are deleted.
128-
> - If you're using the older version of Azure Migrate, open the Azure resource group in which the project was created. Select the project you want to delete (the resource type is **Migration project**).
128+
> - If you're using the older version of Azure Migrate, go to the Azure resource group in which the project was created. Select the project you want to delete (the resource type is **Migration project**).
129129
> - If you're using dependency analysis with an Azure Log Analytics workspace:
130130
> - If you've attached a Log Analytics workspace to the Server Assessment tool, the workspace isn't automatically deleted. The same Log Analytics workspace can be used for multiple scenarios.
131131
> - If you want to delete the Log Analytics workspace, do that manually.

articles/migrate/server-redeploy.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ Before you begin, complete the Azure VM assessment in Azure Migrate either throu
3838

3939
Follow the steps to generate Infrastructure as Code (IaC) for your assessed workloads or applications in Azure Migrate:
4040

41-
1. Open the assessment report in the Azure Migrate portal after you complete the workload or application assessment.
41+
1. Go to the assessment report in the Azure Migrate portal after you complete the workload or application assessment.
4242
1. Select **Generate IaC** at the top of the report to start the code generation process.
4343

4444

@@ -69,7 +69,7 @@ Follow the steps to generate Infrastructure as Code (IaC) for your assessed work
6969

7070
:::image type="content" source="./media/server-redeploy/generate-code.png" alt-text="The screenshot shows how to select Generate Code after review is complete." lightbox="./media/server-redeploy/generate-code.png":::
7171

72-
11. When the download completes, extract the ZIP file and open the folder in an IDE such as **Visual Studio Code** to explore the generated code.
72+
11. When the download completes, extract the ZIP file and go to the folder in an IDE such as **Visual Studio Code** to explore the generated code.
7373

7474
## Deploy the IaaS application IaC
7575

articles/migrate/troubleshoot-appliance.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -292,8 +292,8 @@ You get the error "WS-Management service cannot process the request. The WMI ser
292292
1. The wmimgmt console opens where you can find **WMI Control (Local)** in the left pane. Right-click it, and select **Properties** from the menu.
293293
1. In the **WMI Control (Local) Properties** dialog, select the **Securities** tab.
294294
1. On the **Securities** tab, expand the **Root** folder in the namespace tree and select the **cimv2** namespace.
295-
1. Select **Security** to open the **Security for ROOT\cimv2** dialog.
296-
1. Under the **Group or users names** section, select **Add** to open the **Select Users, Computers, Service Accounts or Groups** dialog.
295+
1. Select **Security** to go to the **Security for ROOT\cimv2** dialog.
296+
1. Under the **Group or users names** section, select **Add** to go to the **Select Users, Computers, Service Accounts or Groups** dialog.
297297
1. Search for the user account, select it, and select **OK** to return to the **Security for ROOT\cimv2** dialog.
298298
1. In the **Group or users names** section, select the user account just added. Check if the following permissions are allowed:<br/>
299299
- Enable account <br/>

articles/migrate/troubleshoot-changed-block-tracking-replication.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -96,7 +96,7 @@ The component trying to replicate data to Azure is either down or not responding
9696
2. Check if the gateway service is running on the appliance:
9797
1. Sign in to the Azure Migrate appliance using remote desktop.
9898

99-
2. Open the Microsoft services MMC snap-in (run > services.msc), and check if the Microsoft Azure Gateway Service is running. If the service is stopped or not running, start the service. Alternatively, you can open command prompt or PowerShell and enter 'Net Start asrgwy'.
99+
2. Go to the Microsoft services MMC snap-in (run > services.msc), and check if the Microsoft Azure Gateway Service is running. If the service is stopped or not running, start the service. Alternatively, you can open command prompt or PowerShell and enter 'Net Start asrgwy'.
100100

101101
3. Check for connectivity issues between Azure Migrate appliance and Appliance Storage Account:
102102

articles/migrate/tutorial-migrate-physical-virtual-machines.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -160,13 +160,13 @@ This section introduces a new process, which is simplified experience. Users fol
160160

161161
It introduces an upgraded agent-based migration stack for physical and VMware environments. Customers benefit from the ability to migrate newer Linux distributions to Azure, use WS2022 for the replication appliance, and utilize a unified OS support matrix.
162162

163-
## Navigate to Azure Migrate project
163+
## Access the Azure Migrate project
164164

165165
Follow the steps to navigate to the Azure Migrate project:
166166

167-
**Step 1**: Navigate to Azure Migrate project
167+
**Step 1**: Go to Azure Migrate project
168168

169-
1. Open [Azure portal](https://portal.azure.com).
169+
1. Go to [Azure portal](https://portal.azure.com).
170170
1. Search for the **Azure Migrate** service.
171171
1. Create a new project or select an existing one. [Learn more](/azure/migrate/).
172172

0 commit comments

Comments
 (0)