Skip to content

Commit 31eb36e

Browse files
committed
Merge branch 'main' into release-2025-openai-v1-staggered
2 parents cd5960b + 9fbc250 commit 31eb36e

30 files changed

+1313
-522
lines changed

articles/ai-foundry/agents/concepts/model-region-support.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -26,6 +26,7 @@ Azure AI Foundry Agent Service supports the following Azure OpenAI models in the
2626

2727
> [!NOTE]
2828
> * [Hub-based projects](../../what-is-azure-ai-foundry.md#project-types) are limited to the following models: gpt-4o, gpt-4o-mini, gpt-4, gpt-35-turbo
29+
> * The [spillover feature](../../openai/how-to/spillover-traffic-management.md) for provisioned throughput is compatable with agents
2930
> * For information on class A subnet support, see the setup guide on [GitHub](https://github.com/azure-ai-foundry/foundry-samples/tree/main/samples/microsoft/infrastructure-setup/15-private-network-standard-agent-setup).
3031
> * The [file search tool](../how-to/tools/file-search.md) is currently unavailable in the following regions:
3132
> * Italy north
Lines changed: 70 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,70 @@
1+
---
2+
title: Azure AI Foundry Status Dashboard (Preview)
3+
description: Discover the Azure AI Foundry Status Dashboard (Preview) for real-time updates on service health, incident reports, and planned maintenance notifications.
4+
author: jonburchel
5+
ms.author: jburchel
6+
ms.reviewer: nisi
7+
ms.date: 08/25/2025
8+
ms.topic: concept-article
9+
ms.service: azure-ai-foundry
10+
---
11+
12+
# Azure AI Foundry status dashboard
13+
14+
The Azure AI Foundry Status Dashboard provides visibility into the
15+
health and availability of key Foundry services. It's intended to help
16+
customers monitor service status, stay informed about ongoing incidents,
17+
and plan around scheduled maintenance windows.
18+
19+
This dashboard is currently in **Preview**, which means we're still
20+
expanding coverage and improving the experience based on customer
21+
feedback.
22+
23+
## Key Features
24+
25+
- **Live Status Indicators** for core Foundry services
26+
27+
- **Incident Reports** with timelines, resolutions, and root cause
28+
summaries
29+
30+
- **Planned Maintenance Notifications** with expected impact and
31+
duration
32+
33+
- **Historical Uptime** to help assess service reliability over time
34+
35+
## Frequently Asked Questions
36+
37+
**Q: Is this data real-time?**
38+
Yes. The dashboard pulls updates in real time as the engineering and operations teams publish status changes.
39+
40+
**Q: What does it mean that this dashboard is in “Preview”?**
41+
During the Preview phase, we're gradually expanding service coverage
42+
and refining the dashboard UI and update workflows. Some services might
43+
not yet appear, and update timing might vary slightly. We appreciate your
44+
patience and feedback.
45+
46+
**Q: Can I subscribe to updates?**
47+
Yes, subscription options (email, SMS, webhook) are supported in the
48+
dashboard.
49+
50+
**Q: Does the dashboard cover all regions and environments?**
51+
Currently, the dashboard reflects status for core production services in
52+
major regions. Expanded coverage, including specific regions, is in
53+
progress.
54+
55+
**Q: How should I report discrepancies or missing status updates?**
56+
If you notice a gap between your experience and what you see on the
57+
dashboard, contact your Microsoft support representative or file
58+
a support ticket through Azure Support.
59+
60+
## Feedback & Support
61+
62+
We welcome feedback on this dashboard as we work towards General
63+
Availability. If you have questions, suggestions, or run into issues,
64+
please contact your support team or Customer Success representative.
65+
66+
## Related content
67+
68+
- [Azure AI Foundry documentation](/azure/ai-foundry/)
69+
- [Azure status history](https://status.azure.com/status)
70+
- [Azure Service Health](https://azure.microsoft.com/status/)

articles/ai-foundry/concepts/rbac-azure-ai-foundry.md

Lines changed: 116 additions & 129 deletions
Large diffs are not rendered by default.

articles/ai-foundry/concepts/vulnerability-management.md

Lines changed: 28 additions & 27 deletions
Original file line numberDiff line numberDiff line change
@@ -7,79 +7,80 @@ ms.custom:
77
- build-2024
88
- hub-only
99
ms.topic: concept-article
10-
ms.date: 04/29/2025
10+
ms.date: 08/27/2025
1111
ms.reviewer: deeikele
1212
ms.author: jburchel
1313
author: jonburchel
14+
ai-usage: ai-assisted
1415
---
1516

1617
# Vulnerability management for Azure AI Foundry
1718

1819
[!INCLUDE [hub-only-alt](../includes/uses-hub-only-alt.md)]
1920

20-
Vulnerability management involves detecting, assessing, mitigating, and reporting on any security vulnerabilities that exist in an organization's systems and software. Vulnerability management is a shared responsibility between you and Microsoft.
21+
Vulnerability management is the process of detecting, assessing, mitigating, and reporting security vulnerabilities in an organization's systems and software. It's a shared responsibility between you and Microsoft.
2122

22-
This article discusses these responsibilities and outlines the vulnerability management controls that [Azure AI Foundry](https://ai.azure.com/?cid=learnDocs) provides. You learn how to keep your service instance and applications up to date with the latest security updates, and how to minimize the window of opportunity for attackers.
23+
This article covers your responsibilities and the vulnerability management controls that [Azure AI Foundry](https://ai.azure.com/?cid=learnDocs) provides. Learn how to keep your service instance and apps up to date with the latest security updates and reduce the window of opportunity for attackers.
2324

2425
## Microsoft-managed VM images
2526

26-
Microsoft manages host OS virtual machine (VM) images for compute instances and serverless compute clusters. The update frequency is monthly and includes the following details:
27+
Microsoft manages host OS virtual machine (VM) images for compute instances and serverless compute clusters. Updates are monthly and include the following details:
2728

28-
* For each new VM image version, the latest updates are sourced from the original publisher of the OS. Using the latest updates helps ensure that you get all applicable OS-related patches. For Azure AI Foundry, the publisher is Canonical for all the Ubuntu images.
29+
* For each new VM image version, Microsoft sources the latest OS updates from the original publisher. Using the latest updates helps ensure you get all applicable OS patches. For Azure AI Foundry, Canonical publishes all Ubuntu images.
2930

3031
* VM images are updated monthly.
3132

32-
* In addition to patches that the original publisher applies, Microsoft updates system packages when updates are available.
33+
* In addition to the publisher's patches, Microsoft updates system packages as updates become available.
3334

3435
* Microsoft checks and validates any machine learning packages that might require an upgrade. In most circumstances, new VM images contain the latest package versions.
3536

3637
* All VM images are built on secure subscriptions that run vulnerability scanning regularly. Microsoft flags any unaddressed vulnerabilities and fixes them within the next release.
3738

38-
* The frequency is a monthly interval for most images. For compute instances, the image release is aligned with the release cadence of the Azure Machine Learning SDK that's preinstalled in the environment.
39+
* Most images use a monthly release cadence. For compute instances, the image release aligns with the release cadence of the Azure Machine Learning SDK that's preinstalled in the environment.
3940

40-
In addition to the regular release cadence, Microsoft applies hotfixes if vulnerabilities surface. Microsoft rolls out hotfixes within 72 hours for serverless compute clusters and within a week for compute instances.
41+
Microsoft also applies hotfixes when vulnerabilities surface. Microsoft rolls out hotfixes within 72 hours for serverless compute clusters and within a week for compute instances.
4142

4243
> [!NOTE]
43-
> The host OS is not the OS version that you might specify for an environment when you're training or deploying a model. Environments run inside Docker. Docker runs on the host OS.
44+
> The host OS isn't the OS version you specify for an environment when you train or deploy a model. Environments run inside Docker. Docker runs on the host OS.
4445
4546
## Microsoft-managed container images
4647

47-
[Base docker images](https://github.com/Azure/AzureML-Containers) that Microsoft maintains for Azure AI Foundry get security patches frequently to address newly discovered vulnerabilities.
48+
[Base Docker images](https://github.com/Azure/AzureML-Containers) that Microsoft maintains for Azure AI Foundry receive frequent security patches to fix newly discovered vulnerabilities.
4849

49-
Microsoft releases updates for supported images every two weeks to address vulnerabilities. As a commitment, we aim to have no vulnerabilities older than 30 days in the latest version of supported images.
50+
Microsoft updates supported images every two weeks to fix vulnerabilities. The goal is zero vulnerabilities older than 30 days in the latest supported images.
5051

51-
Patched images are released under a new immutable tag and an updated `:latest` tag. Using the `:latest` tag or pinning to a particular image version might be a tradeoff between security and environment reproducibility for your machine learning job.
52+
Microsoft releases patched images with a new immutable tag and an updated `:latest` tag. Using the `:latest` tag or pinning a specific image version is a tradeoff between security and environment reproducibility for your machine learning job.
5253

5354
## Managing environments and container images
5455

55-
In Azure AI Foundry portal, Docker images are used to provide a runtime environment for [prompt flow deployments](../how-to/flow-deploy.md). The images are built from a base image that Azure AI Foundry provides.
56+
In the Azure AI Foundry portal, Docker images provide the runtime environment for [prompt flow deployments](../how-to/flow-deploy.md). These images start from an Azure AI Foundry base image.
5657

57-
Although Microsoft patches base images with each release, whether you use the latest image might be tradeoff between reproducibility and vulnerability management. It's your responsibility to choose the environment version that you use for your jobs or model deployments.
58+
Although Microsoft patches base images with each release, using the latest image is a tradeoff between reproducibility and vulnerability management. You choose the environment version for your jobs or model deployments.
5859

59-
By default, dependencies are layered on top of base images when you're building an image. After you install more dependencies on top of the Microsoft-provided images, vulnerability management becomes your responsibility.
60+
By default, dependencies are layered on top of base images when you're building an image. After you install extra dependencies on Microsoft-provided images, you're responsible for vulnerability management.
6061

61-
Associated with your Azure AI Foundry hub is an Azure Container Registry instance that functions as a cache for container images. Any image that materializes is pushed to the container registry. The workspace uses it when deployment is triggered for the corresponding environment.
62+
Your Azure AI Foundry hub includes an Azure Container Registry instance that caches container images. When an image is built, it's pushed to the container registry. The workspace uses the cached image when you deploy the corresponding environment.
6263

63-
The hub doesn't delete any image from your container registry. You're responsible for evaluating the need for an image over time. To monitor and maintain environment hygiene, you can use [Microsoft Defender for Container Registry](/azure/defender-for-cloud/defender-for-container-registries-usage) to help scan your images for vulnerabilities. To automate your processes based on triggers from Microsoft Defender, see [Automate remediation responses](/azure/defender-for-cloud/workflow-automation).
64+
The hub doesn't delete any image from your container registry. Review the need for each image over time. To monitor and maintain environment hygiene, use [Microsoft Defender for Container Registry](/azure/defender-for-cloud/defender-for-container-registries-usage) to scan your images for vulnerabilities. To automate processes based on Microsoft Defender triggers, see [Automate remediation responses](/azure/defender-for-cloud/workflow-automation).
6465

6566

6667
## Vulnerability management on compute hosts
6768

68-
Managed compute nodes in Azure AI Foundry portal use Microsoft-managed OS VM images. When you provision a node, it pulls the latest updated VM image. This behavior applies to compute instance, serverless compute cluster, and managed inference compute options.
69+
Managed compute nodes in Azure AI Foundry portal use Microsoft-managed OS VM images. When you provision a node, it pulls the latest VM image. This behavior applies to compute instances, serverless compute clusters, and managed inference compute.
6970

70-
Although OS VM images are regularly patched, Microsoft doesn't actively scan compute nodes for vulnerabilities while they're in use. For an extra layer of protection, consider network isolation of your computes.
71+
Although OS VM images are regularly patched, Microsoft doesn't actively scan compute nodes for vulnerabilities while they're in use. For an extra layer of protection, consider network isolation for your compute nodes.
7172

72-
Ensuring that your environment is up to date and that compute nodes use the latest OS version is a shared responsibility between you and Microsoft. Nodes that aren't idle can't be updated to the latest VM image. Considerations are slightly different for each compute type, as listed in the following sections.
73+
Ensuring that your environment is up to date and that compute nodes use the latest OS version is a shared responsibility between you and Microsoft. The service doesn't update busy nodes to the latest VM image. Considerations are slightly different for each compute type, as listed in the following sections.
7374

7475
### Compute instance
7576

76-
Compute instances get the latest VM images at the time of provisioning. Microsoft releases new VM images on a monthly basis. After you deploy a compute instance, it isn't actively updated. To keep current with the latest software updates and security patches, you can use one of these methods:
77+
Compute instances get the latest VM image at provisioning. Microsoft releases new VM images monthly. After you deploy a compute instance, it doesn't receive ongoing image updates. To stay current with the latest software updates and security patches, use one of these methods:
7778

7879
* Re-create a compute instance to get the latest OS image (recommended).
7980

80-
If you use this method, you'll lose data and customizations (such as installed packages) that are stored on the instance's OS and temporary disks.
81+
If you use this method, you'll lose data and customizations (such as installed packages) stored on the instance's OS disk and temporary disk.
8182

82-
For more information about image releases, see the [Azure Machine Learning compute instance image release notes](/azure/machine-learning/azure-machine-learning-ci-image-release-notes).
83+
Learn more about image releases in the [Azure Machine Learning compute instance image release notes](/azure/machine-learning/azure-machine-learning-ci-image-release-notes).
8384

8485
* Regularly update OS and Python packages.
8586

@@ -101,18 +102,18 @@ Compute instances get the latest VM images at the time of provisioning. Microsof
101102
pip list --outdated
102103
```
103104

104-
You can install and run additional scanning software on the compute instance to scan for security issues:
105+
Install and run additional scanning software on the compute instance to scan for security issues:
105106

106107
* Use [Trivy](https://github.com/aquasecurity/trivy) to discover OS and Python package-level vulnerabilities.
107108
* Use [ClamAV](https://www.clamav.net/) to discover malware. It comes preinstalled on compute instances.
108109

109-
Microsoft Defender for Servers agent installation is currently not supported.
110+
Installing the Microsoft Defender for Servers agent isn't supported.
110111
111112
### Endpoints
112113
113-
Endpoints automatically receive OS host image updates that include vulnerability fixes. The update frequency of images is at least once a month.
114+
Endpoints automatically receive OS host image updates with vulnerability fixes. Microsoft updates images at least once a month.
114115
115-
Compute nodes are automatically upgraded to the latest VM image version when that version is released. You don't need to take any action.
116+
Compute nodes automatically upgrade to the latest VM image version when it's released. You don't need to do anything.
116117
117118
## Next steps
118119

0 commit comments

Comments
 (0)