Skip to content

Commit 8728ab3

Browse files
authored
Merge pull request #8743 from MicrosoftDocs/main
11/21 11:00 AMM IST Publish
2 parents ff7d49c + ce63af0 commit 8728ab3

File tree

45 files changed

+2360
-341
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

45 files changed

+2360
-341
lines changed

articles/ai-foundry/azure-ai-foundry-status-dashboard-documentation.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ During the Preview phase, we're gradually expanding service coverage and refinin
3838
Yes, subscription options (email, SMS, webhook) are supported in the dashboard.
3939

4040
**Q: Does the dashboard cover all regions and environments?**
41-
Currently, the dashboard reflects status for core production services in major regions. Expanded coverage, including specific regions, is in progress.
41+
Currently, the dashboard reflects status for core production services in [major regions](reference/region-support.md). Expanded coverage, including specific regions, is in progress.
4242

4343
**Q: How should I report discrepancies or missing status updates?**
4444
If you notice a gap between your experience and what you see on the dashboard, contact your Microsoft support representative or file a support ticket through Azure Support.

articles/ai-foundry/concepts/vulnerability-management.md

Lines changed: 53 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -6,8 +6,9 @@ ms.service: azure-ai-foundry
66
ms.custom:
77
- build-2024
88
- hub-only
9+
- dev-focus
910
ms.topic: concept-article
10-
ms.date: 08/27/2025
11+
ms.date: 11/20/2025
1112
ms.reviewer: deeikele
1213
ms.author: jburchel
1314
author: jonburchel
@@ -18,9 +19,19 @@ ai-usage: ai-assisted
1819

1920
[!INCLUDE [hub-only-alt](../includes/uses-hub-only-alt.md)]
2021

21-
Vulnerability management is the process of detecting, assessing, mitigating, and reporting security vulnerabilities in an organization's systems and software. It's a shared responsibility between you and Microsoft.
22+
Vulnerability management is the process of detecting, assessing, mitigating, and reporting security vulnerabilities in an organization's systems and software. You and Microsoft share this responsibility.
2223

23-
This article covers your responsibilities and the vulnerability management controls that [Microsoft Foundry](https://ai.azure.com/?cid=learnDocs) provides. Learn how to keep your service instance and apps up to date with the latest security updates and reduce the window of opportunity for attackers.
24+
This article describes your responsibilities and the vulnerability management controls that Foundry provides. Learn how to keep your service instance and apps up to date with the latest security updates and reduce the window of opportunity for cyberattackers.
25+
26+
## Prerequisites
27+
28+
To manage vulnerabilities in your Foundry environment, you need:
29+
30+
- An Azure subscription
31+
- A Foundry hub or project
32+
- Contributor or Owner role on the Foundry hub or project to manage compute resources
33+
- Azure CLI or access to the Foundry portal for compute management
34+
- For compute instance recreation: permissions to create and delete compute instances (`Microsoft.MachineLearningServices/workspaces/computes/write` and `Microsoft.MachineLearningServices/workspaces/computes/delete`)
2435

2536
## Microsoft-managed VM images
2637

@@ -57,65 +68,88 @@ In the Foundry portal, Docker images provide the runtime environment for [prompt
5768

5869
Although Microsoft patches base images with each release, using the latest image is a tradeoff between reproducibility and vulnerability management. You choose the environment version for your jobs or model deployments.
5970

60-
By default, dependencies are layered on top of base images when you're building an image. After you install extra dependencies on Microsoft-provided images, you're responsible for vulnerability management.
71+
By default, dependencies are layered on top of base images when you build an image. After you install extra dependencies on Microsoft-provided images, you're responsible for vulnerability management.
6172

62-
Your Foundry hub includes an Azure Container Registry instance that caches container images. When an image is built, it's pushed to the container registry. The workspace uses the cached image when you deploy the corresponding environment.
73+
Your hub includes an Azure Container Registry instance that caches container images. When you build an image, you push it to the container registry. The workspace uses the cached image when you deploy the corresponding environment.
6374

6475
The hub doesn't delete any image from your container registry. Review the need for each image over time. To monitor and maintain environment hygiene, use [Microsoft Defender for Container Registry](/azure/defender-for-cloud/defender-for-container-registries-usage) to scan your images for vulnerabilities. To automate processes based on Microsoft Defender triggers, see [Automate remediation responses](/azure/defender-for-cloud/workflow-automation).
6576

6677

6778
## Vulnerability management on compute hosts
6879

69-
Managed compute nodes in Foundry portal use Microsoft-managed OS VM images. When you provision a node, it pulls the latest VM image. This behavior applies to compute instances, serverless compute clusters, and managed inference compute.
80+
Managed compute nodes in the Foundry portal use Microsoft-managed OS VM images. When you provision a node, it pulls the latest VM image. This behavior applies to compute instances, serverless compute clusters, and managed inference compute.
7081

71-
Although OS VM images are regularly patched, Microsoft doesn't actively scan compute nodes for vulnerabilities while they're in use. For an extra layer of protection, consider network isolation for your compute nodes.
82+
Although Microsoft regularly patches OS VM images, it doesn't actively scan compute nodes for vulnerabilities while they're in use. For an extra layer of protection, consider network isolation for your compute nodes.
7283

7384
Ensuring that your environment is up to date and that compute nodes use the latest OS version is a shared responsibility between you and Microsoft. The service doesn't update busy nodes to the latest VM image. Considerations are slightly different for each compute type, as listed in the following sections.
7485

7586
### Compute instance
7687

77-
Compute instances get the latest VM image at provisioning. Microsoft releases new VM images monthly. After you deploy a compute instance, it doesn't receive ongoing image updates. To stay current with the latest software updates and security patches, use one of these methods:
88+
Compute instances get the latest VM image when you provision them. Microsoft releases new VM images monthly. After you deploy a compute instance, it doesn't receive ongoing image updates. To stay current with the latest software updates and security patches, use one of these methods:
7889

7990
* Re-create a compute instance to get the latest OS image (recommended).
8091

81-
If you use this method, you'll lose data and customizations (such as installed packages) stored on the instance's OS disk and temporary disk.
92+
If you use this method, you lose data and customizations (such as installed packages) stored on the instance's OS disk and temporary disk.
8293

83-
Learn more about image releases in the [Azure Machine Learning compute instance image release notes](/azure/machine-learning/azure-machine-learning-ci-image-release-notes).
94+
For more information about image releases, see the [Azure Machine Learning compute instance image release notes](/azure/machine-learning/azure-machine-learning-ci-image-release-notes).
8495

8596
* Regularly update OS and Python packages.
8697

87-
* Use Linux package management tools to update the package list with the latest versions:
98+
Connect to your compute instance terminal and run the following commands to update packages:
99+
100+
* Update the package list with the latest versions:
88101

89102
```bash
90103
sudo apt-get update
91104
```
92105

93-
* Use Linux package management tools to upgrade packages to the latest versions. Package conflicts might occur when you use this approach.
106+
Expected output: Package lists are refreshed from repositories.
107+
108+
* Upgrade packages to the latest versions. Package conflicts might occur when you use this approach:
94109

95110
```bash
96111
sudo apt-get upgrade
97112
```
98113

99-
* Use Python package management tools to upgrade packages and check for updates:
114+
Expected output: Packages are downloaded and installed. You might be prompted to confirm installation.
115+
116+
* Check for outdated Python packages:
100117

101118
```bash
102119
pip list --outdated
103120
```
104121

122+
Expected output: List of packages with available updates, or empty output if all packages are current.
123+
124+
**Reference**: [apt-get documentation](https://manpages.ubuntu.com/manpages/focal/man8/apt-get.8.html), [pip list documentation](https://pip.pypa.io/en/stable/cli/pip_list/)
125+
126+
To verify updates were applied successfully, run:
127+
128+
```bash
129+
# Check for remaining upgradable packages
130+
sudo apt list --upgradable
131+
```
132+
133+
Expected output: No packages listed means all updates are applied.
134+
105135
Install and run additional scanning software on the compute instance to scan for security issues:
106136

107-
* Use [Trivy](https://github.com/aquasecurity/trivy) to discover OS and Python package-level vulnerabilities.
108-
* Use [ClamAV](https://www.clamav.net/) to discover malware. It comes preinstalled on compute instances.
137+
* Use [Trivy](https://github.com/aquasecurity/trivy) to discover OS and Python package-level vulnerabilities. For quick start and usage examples, see the [Trivy documentation](https://aquasecurity.github.io/trivy/).
138+
* Use [ClamAV](https://www.clamav.net/) to discover malware. It comes preinstalled on compute instances. For usage guidance, see the [ClamAV documentation](https://docs.clamav.net/manual/Usage.html).
139+
140+
For automation examples combining Trivy and ClamAV, see [Compute instance sample setup scripts](https://github.com/Azure/azureml-examples/tree/main/setup/setup-ci).
109141

110142
Installing the Microsoft Defender for Servers agent isn't supported.
111143
112144
### Endpoints
113145
114146
Endpoints automatically receive OS host image updates with vulnerability fixes. Microsoft updates images at least once a month.
115147
116-
Compute nodes automatically upgrade to the latest VM image version when it's released. You don't need to do anything.
148+
Compute nodes automatically upgrade to the latest VM image version when it's released. You don't need to take any action.
117149
118-
## Next steps
150+
## Related content
119151
120-
* [Foundry hubs](ai-resources.md)
121-
* [Create and manage compute instances](../how-to/create-manage-compute.md)
152+
- [Foundry hubs](ai-resources.md)
153+
- [Create and manage compute instances](../how-to/create-manage-compute.md)
154+
- [Azure Machine Learning compute instance image release notes](/azure/machine-learning/azure-machine-learning-ci-image-release-notes)
155+
- [Vulnerability management best practices](/azure/cloud-adoption-framework/ready/azure-best-practices/ai-machine-learning-enterprise-security)

articles/ai-foundry/default/mcp/build-your-own-mcp-server.md

Lines changed: 12 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -26,13 +26,15 @@ This approach enables you to securely integrate internal APIs and services into
2626
- For local development and debugging:
2727
- [Visual Studio Code](https://code.visualstudio.com/)
2828
- [Azure Functions extension](https://marketplace.visualstudio.com/items?itemName=ms-azuretools.vscode-azurefunctions) for Visual Studio Code
29-
- An Azure API Center resource (optional, required only for organizational tool catalog registration).
29+
- An [Azure API Center resource](/azure/api-center/overview) (optional, required only for organizational tool catalog registration).
3030

3131
## Build an MCP server by using Azure Functions
3232

3333
Azure Functions is a serverless compute service that provides scale-to-zero capability, burst scaling, and enterprise features including identity-based access and virtual networking. The lightweight programming model makes it straightforward to build MCP servers so you can focus on implementing your business logic rather than infrastructure management.
3434

35-
1. Run the `azd init` command in your target folder to initialize the project from [this sample MCP server template](https://github.com/Azure-Samples/remote-mcp-functions-python):
35+
1. Open a terminal or command prompt and navigate to the folder where you want to create your project.
36+
37+
1. Run the `azd init` command to initialize the project from [this sample MCP server template](https://github.com/Azure-Samples/remote-mcp-functions-python):
3638

3739
```bash
3840
azd init --template remote-mcp-functions-python -e mcpserver-python
@@ -155,6 +157,14 @@ For detailed configuration steps, see [Connect to a Model Context Protocol serve
155157

156158
After connecting your MCP server, agents in your Foundry project can call the tools and functions exposed by your custom server. Test the connection by creating an agent and verifying it can successfully invoke your MCP server's capabilities.
157159

160+
## Troubleshooting
161+
162+
Here are some common issues you might encounter when building and connecting your MCP server:
163+
164+
- **MCP server connection fails**: Ensure that your Azure Function is running and accessible. Check the function logs in the Azure portal for any errors.
165+
- **Authentication errors**: Verify that you're using the correct system key or API key. If using API Key authentication, ensure the key is correctly configured in the Foundry connection settings.
166+
- **Tool not found**: If you registered your MCP server in the organizational catalog, make sure you've added it to your agent. If using a custom tool, verify the endpoint URL and tool name.
167+
158168
## Related content
159169

160170
- [Get started with Agent Service](../../agents/quickstart.md)

articles/ai-foundry/foundry-local/get-started.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -13,6 +13,7 @@ reviewer: samuel100
1313
ms.custom:
1414
- build-2025
1515
- build-aifnd
16+
- peer-review-program
1617
keywords:
1718
- Foundry Tools
1819
- cognitive

articles/ai-foundry/how-to/add-foundry-to-network-security-perimeter.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -31,14 +31,14 @@ This article gives only the Foundry-specific pointers you need. All procedural d
3131
- NSP governs data plane traffic. Control plane (management) operations may still succeed unless separately restricted.
3232
- Use a managed identity (system or user‑assigned) with appropriate role assignments for any data source access (for example Azure Blob Storage used for batch inputs/outputs).
3333
- Co-locate dependent services (Azure OpenAI, Azure Storage, Azure AI Search, etc.) in the same NSP when you need mutual access with minimal outbound allow rules.
34-
- Foundry Agent Service: Supported; Secured Standard Agents with full network isolation rely on Private Link and do not require or support NSP.
34+
- Foundry Agent Service is supported. Secured Standard Agents with full network isolation rely on Private Link and do not require or support NSP.
3535
- Private Link takes precedence over NSP evaluation when both are configured; traffic resolves through Private Link first.
3636

3737
For more information, see [Network security perimeter concepts](/azure/private-link/network-security-perimeter-concepts).
3838

3939
## Prerequisites
4040

41-
Create an existing Foundry resource (or plan to create one) and required managed identity assignments.
41+
An existing Foundry resource (or plan to create one) and required managed identity assignments.
4242

4343
If any prerequisite behavior is unclear or changes, consult the latest Azure OpenAI + NSP article for parity details in [Azure OpenAI NSP guidance](/azure/ai-foundry/openai/how-to/network-security-perimeter).
4444

@@ -49,7 +49,7 @@ Portal (summary):
4949
2. Select **Associated resources** (or **Resources** depending on UI iteration) > **Add / Associate**.
5050
3. Choose the target profile, pick your Foundry resource, set access mode (start with Learning), and confirm.
5151

52-
CLI (for automation) and full creation steps: see the NSP quickstarts (CLI or PowerShell):
52+
For CLI (for automation) and full creation steps, see the NSP quickstarts (CLI or PowerShell):
5353
- [Create a network security perimeter (CLI)](/azure/private-link/create-network-security-perimeter-cli)
5454
- [Create a network security perimeter (PowerShell)](/azure/private-link/create-network-security-perimeter-powershell)
5555

@@ -58,7 +58,7 @@ After association, traffic evaluation begins per the selected access mode.
5858

5959
## Access modes (Learning vs Enforced)
6060

61-
Start in Learning to observe would‑be denies. Switch to Enforced once required inbound/outbound rules are defined. Reference [NSP access modes](/azure/private-link/network-security-perimeter-concepts#access-modes) for more details.
61+
Start in Learning to observe would‑be denies. Switch to Enforced once required inbound/outbound rules are defined. Reference [NSP access modes](/azure/private-link/network-security-perimeter-concepts) for more details.
6262

6363
## Interaction with `publicNetworkAccess`
6464

0 commit comments

Comments
 (0)