You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/ai-foundry/azure-ai-foundry-status-dashboard-documentation.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -38,7 +38,7 @@ During the Preview phase, we're gradually expanding service coverage and refinin
38
38
Yes, subscription options (email, SMS, webhook) are supported in the dashboard.
39
39
40
40
**Q: Does the dashboard cover all regions and environments?**
41
-
Currently, the dashboard reflects status for core production services in major regions. Expanded coverage, including specific regions, is in progress.
41
+
Currently, the dashboard reflects status for core production services in [major regions](reference/region-support.md). Expanded coverage, including specific regions, is in progress.
42
42
43
43
**Q: How should I report discrepancies or missing status updates?**
44
44
If you notice a gap between your experience and what you see on the dashboard, contact your Microsoft support representative or file a support ticket through Azure Support.
Vulnerability management is the process of detecting, assessing, mitigating, and reporting security vulnerabilities in an organization's systems and software. It's a shared responsibility between you and Microsoft.
22
+
Vulnerability management is the process of detecting, assessing, mitigating, and reporting security vulnerabilities in an organization's systems and software. You and Microsoft share this responsibility.
22
23
23
-
This article covers your responsibilities and the vulnerability management controls that [Microsoft Foundry](https://ai.azure.com/?cid=learnDocs) provides. Learn how to keep your service instance and apps up to date with the latest security updates and reduce the window of opportunity for attackers.
24
+
This article describes your responsibilities and the vulnerability management controls that Foundry provides. Learn how to keep your service instance and apps up to date with the latest security updates and reduce the window of opportunity for cyberattackers.
25
+
26
+
## Prerequisites
27
+
28
+
To manage vulnerabilities in your Foundry environment, you need:
29
+
30
+
- An Azure subscription
31
+
- A Foundry hub or project
32
+
- Contributor or Owner role on the Foundry hub or project to manage compute resources
33
+
- Azure CLI or access to the Foundry portal for compute management
34
+
- For compute instance recreation: permissions to create and delete compute instances (`Microsoft.MachineLearningServices/workspaces/computes/write` and `Microsoft.MachineLearningServices/workspaces/computes/delete`)
24
35
25
36
## Microsoft-managed VM images
26
37
@@ -57,65 +68,88 @@ In the Foundry portal, Docker images provide the runtime environment for [prompt
57
68
58
69
Although Microsoft patches base images with each release, using the latest image is a tradeoff between reproducibility and vulnerability management. You choose the environment version for your jobs or model deployments.
59
70
60
-
By default, dependencies are layered on top of base images when you're building an image. After you install extra dependencies on Microsoft-provided images, you're responsible for vulnerability management.
71
+
By default, dependencies are layered on top of base images when you build an image. After you install extra dependencies on Microsoft-provided images, you're responsible for vulnerability management.
61
72
62
-
Your Foundry hub includes an Azure Container Registry instance that caches container images. When an image is built, it's pushed to the container registry. The workspace uses the cached image when you deploy the corresponding environment.
73
+
Your hub includes an Azure Container Registry instance that caches container images. When you build an image, you push it to the container registry. The workspace uses the cached image when you deploy the corresponding environment.
63
74
64
75
The hub doesn't delete any image from your container registry. Review the need for each image over time. To monitor and maintain environment hygiene, use [Microsoft Defender for Container Registry](/azure/defender-for-cloud/defender-for-container-registries-usage) to scan your images for vulnerabilities. To automate processes based on Microsoft Defender triggers, see [Automate remediation responses](/azure/defender-for-cloud/workflow-automation).
65
76
66
77
67
78
## Vulnerability management on compute hosts
68
79
69
-
Managed compute nodes in Foundry portal use Microsoft-managed OS VM images. When you provision a node, it pulls the latest VM image. This behavior applies to compute instances, serverless compute clusters, and managed inference compute.
80
+
Managed compute nodes in the Foundry portal use Microsoft-managed OS VM images. When you provision a node, it pulls the latest VM image. This behavior applies to compute instances, serverless compute clusters, and managed inference compute.
70
81
71
-
Although OS VM images are regularly patched, Microsoft doesn't actively scan compute nodes for vulnerabilities while they're in use. For an extra layer of protection, consider network isolation for your compute nodes.
82
+
Although Microsoft regularly patches OS VM images, it doesn't actively scan compute nodes for vulnerabilities while they're in use. For an extra layer of protection, consider network isolation for your compute nodes.
72
83
73
84
Ensuring that your environment is up to date and that compute nodes use the latest OS version is a shared responsibility between you and Microsoft. The service doesn't update busy nodes to the latest VM image. Considerations are slightly different for each compute type, as listed in the following sections.
74
85
75
86
### Compute instance
76
87
77
-
Compute instances get the latest VM image at provisioning. Microsoft releases new VM images monthly. After you deploy a compute instance, it doesn't receive ongoing image updates. To stay current with the latest software updates and security patches, use one of these methods:
88
+
Compute instances get the latest VM image when you provision them. Microsoft releases new VM images monthly. After you deploy a compute instance, it doesn't receive ongoing image updates. To stay current with the latest software updates and security patches, use one of these methods:
78
89
79
90
* Re-create a compute instance to get the latest OS image (recommended).
80
91
81
-
If you use this method, you'll lose data and customizations (such as installed packages) stored on the instance's OS disk and temporary disk.
92
+
If you use this method, you lose data and customizations (such as installed packages) stored on the instance's OS disk and temporary disk.
82
93
83
-
Learn more about image releases in the [Azure Machine Learning compute instance image release notes](/azure/machine-learning/azure-machine-learning-ci-image-release-notes).
94
+
For more information about image releases, see the [Azure Machine Learning compute instance image release notes](/azure/machine-learning/azure-machine-learning-ci-image-release-notes).
84
95
85
96
* Regularly update OS and Python packages.
86
97
87
-
* Use Linux package management tools to update the package list with the latest versions:
98
+
Connect to your compute instance terminal and run the following commands to update packages:
99
+
100
+
* Update the package list with the latest versions:
88
101
89
102
```bash
90
103
sudo apt-get update
91
104
```
92
105
93
-
* Use Linux package management tools to upgrade packages to the latest versions. Package conflicts might occur when you use this approach.
106
+
Expected output: Package lists are refreshed from repositories.
107
+
108
+
* Upgrade packages to the latest versions. Package conflicts might occur when you use this approach:
94
109
95
110
```bash
96
111
sudo apt-get upgrade
97
112
```
98
113
99
-
* Use Python package management tools to upgrade packages and check for updates:
114
+
Expected output: Packages are downloaded and installed. You might be prompted to confirm installation.
115
+
116
+
* Check for outdated Python packages:
100
117
101
118
```bash
102
119
pip list --outdated
103
120
```
104
121
122
+
Expected output: List of packages with available updates, or empty output if all packages are current.
123
+
124
+
**Reference**: [apt-get documentation](https://manpages.ubuntu.com/manpages/focal/man8/apt-get.8.html), [pip list documentation](https://pip.pypa.io/en/stable/cli/pip_list/)
125
+
126
+
To verify updates were applied successfully, run:
127
+
128
+
```bash
129
+
# Check for remaining upgradable packages
130
+
sudo apt list --upgradable
131
+
```
132
+
133
+
Expected output: No packages listed means all updates are applied.
134
+
105
135
Install and run additional scanning software on the compute instance to scan for security issues:
106
136
107
-
* Use [Trivy](https://github.com/aquasecurity/trivy) to discover OS and Python package-level vulnerabilities.
108
-
* Use [ClamAV](https://www.clamav.net/) to discover malware. It comes preinstalled on compute instances.
137
+
* Use [Trivy](https://github.com/aquasecurity/trivy) to discover OS and Python package-level vulnerabilities. For quick start and usage examples, see the [Trivy documentation](https://aquasecurity.github.io/trivy/).
138
+
* Use [ClamAV](https://www.clamav.net/) to discover malware. It comes preinstalled on compute instances. For usage guidance, see the [ClamAV documentation](https://docs.clamav.net/manual/Usage.html).
139
+
140
+
For automation examples combining Trivy and ClamAV, see [Compute instance sample setup scripts](https://github.com/Azure/azureml-examples/tree/main/setup/setup-ci).
109
141
110
142
Installing the Microsoft Defender for Servers agent isn't supported.
111
143
112
144
### Endpoints
113
145
114
146
Endpoints automatically receive OS host image updates with vulnerability fixes. Microsoft updates images at least once a month.
115
147
116
-
Compute nodes automatically upgrade to the latest VM image version when it's released. You don't need to do anything.
148
+
Compute nodes automatically upgrade to the latest VM image version when it's released. You don't need to take any action.
117
149
118
-
## Next steps
150
+
## Related content
119
151
120
-
* [Foundry hubs](ai-resources.md)
121
-
* [Create and manage compute instances](../how-to/create-manage-compute.md)
152
+
- [Foundry hubs](ai-resources.md)
153
+
- [Create and manage compute instances](../how-to/create-manage-compute.md)
Copy file name to clipboardExpand all lines: articles/ai-foundry/default/mcp/build-your-own-mcp-server.md
+12-2Lines changed: 12 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -26,13 +26,15 @@ This approach enables you to securely integrate internal APIs and services into
26
26
- For local development and debugging:
27
27
-[Visual Studio Code](https://code.visualstudio.com/)
28
28
-[Azure Functions extension](https://marketplace.visualstudio.com/items?itemName=ms-azuretools.vscode-azurefunctions) for Visual Studio Code
29
-
- An Azure API Center resource (optional, required only for organizational tool catalog registration).
29
+
- An [Azure API Center resource](/azure/api-center/overview) (optional, required only for organizational tool catalog registration).
30
30
31
31
## Build an MCP server by using Azure Functions
32
32
33
33
Azure Functions is a serverless compute service that provides scale-to-zero capability, burst scaling, and enterprise features including identity-based access and virtual networking. The lightweight programming model makes it straightforward to build MCP servers so you can focus on implementing your business logic rather than infrastructure management.
34
34
35
-
1. Run the `azd init` command in your target folder to initialize the project from [this sample MCP server template](https://github.com/Azure-Samples/remote-mcp-functions-python):
35
+
1. Open a terminal or command prompt and navigate to the folder where you want to create your project.
36
+
37
+
1. Run the `azd init` command to initialize the project from [this sample MCP server template](https://github.com/Azure-Samples/remote-mcp-functions-python):
@@ -155,6 +157,14 @@ For detailed configuration steps, see [Connect to a Model Context Protocol serve
155
157
156
158
After connecting your MCP server, agents in your Foundry project can call the tools and functions exposed by your custom server. Test the connection by creating an agent and verifying it can successfully invoke your MCP server's capabilities.
157
159
160
+
## Troubleshooting
161
+
162
+
Here are some common issues you might encounter when building and connecting your MCP server:
163
+
164
+
-**MCP server connection fails**: Ensure that your Azure Function is running and accessible. Check the function logs in the Azure portal for any errors.
165
+
-**Authentication errors**: Verify that you're using the correct system key or API key. If using API Key authentication, ensure the key is correctly configured in the Foundry connection settings.
166
+
-**Tool not found**: If you registered your MCP server in the organizational catalog, make sure you've added it to your agent. If using a custom tool, verify the endpoint URL and tool name.
167
+
158
168
## Related content
159
169
160
170
-[Get started with Agent Service](../../agents/quickstart.md)
Copy file name to clipboardExpand all lines: articles/ai-foundry/how-to/add-foundry-to-network-security-perimeter.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -31,14 +31,14 @@ This article gives only the Foundry-specific pointers you need. All procedural d
31
31
- NSP governs data plane traffic. Control plane (management) operations may still succeed unless separately restricted.
32
32
- Use a managed identity (system or user‑assigned) with appropriate role assignments for any data source access (for example Azure Blob Storage used for batch inputs/outputs).
33
33
- Co-locate dependent services (Azure OpenAI, Azure Storage, Azure AI Search, etc.) in the same NSP when you need mutual access with minimal outbound allow rules.
34
-
- Foundry Agent Service: Supported; Secured Standard Agents with full network isolation rely on Private Link and do not require or support NSP.
34
+
- Foundry Agent Service is supported. Secured Standard Agents with full network isolation rely on Private Link and do not require or support NSP.
35
35
- Private Link takes precedence over NSP evaluation when both are configured; traffic resolves through Private Link first.
36
36
37
37
For more information, see [Network security perimeter concepts](/azure/private-link/network-security-perimeter-concepts).
38
38
39
39
## Prerequisites
40
40
41
-
Create an existing Foundry resource (or plan to create one) and required managed identity assignments.
41
+
An existing Foundry resource (or plan to create one) and required managed identity assignments.
42
42
43
43
If any prerequisite behavior is unclear or changes, consult the latest Azure OpenAI + NSP article for parity details in [Azure OpenAI NSP guidance](/azure/ai-foundry/openai/how-to/network-security-perimeter).
3. Choose the target profile, pick your Foundry resource, set access mode (start with Learning), and confirm.
51
51
52
-
CLI (for automation) and full creation steps: see the NSP quickstarts (CLI or PowerShell):
52
+
For CLI (for automation) and full creation steps, see the NSP quickstarts (CLI or PowerShell):
53
53
-[Create a network security perimeter (CLI)](/azure/private-link/create-network-security-perimeter-cli)
54
54
-[Create a network security perimeter (PowerShell)](/azure/private-link/create-network-security-perimeter-powershell)
55
55
@@ -58,7 +58,7 @@ After association, traffic evaluation begins per the selected access mode.
58
58
59
59
## Access modes (Learning vs Enforced)
60
60
61
-
Start in Learning to observe would‑be denies. Switch to Enforced once required inbound/outbound rules are defined. Reference [NSP access modes](/azure/private-link/network-security-perimeter-concepts#access-modes) for more details.
61
+
Start in Learning to observe would‑be denies. Switch to Enforced once required inbound/outbound rules are defined. Reference [NSP access modes](/azure/private-link/network-security-perimeter-concepts) for more details.
0 commit comments