Skip to content

Commit e98e19e

Browse files
Merge pull request #1880 from HeidiSteen/heidist-uuf2
Misc UUF items
2 parents 941a164 + d829147 commit e98e19e

File tree

2 files changed

+7
-7
lines changed

2 files changed

+7
-7
lines changed

articles/search/cognitive-search-defining-skillset.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: azure-ai-search
88
ms.custom:
99
- ignite-2023
1010
ms.topic: conceptual
11-
ms.date: 10/04/2024
11+
ms.date: 12/06/2024
1212
---
1313

1414
# Create a skillset in Azure AI Search
@@ -269,9 +269,9 @@ Although skill output can be optionally cached for reuse purposes, it's usually
269269

270270
## Tips for a first skillset
271271

272-
+ Try the [Import data wizard](search-import-data-portal.md).
272+
+ Try the [Import data wizard](search-get-started-portal.md) or [Import and vectorize data wizard](search-get-started-portal-import-vectors.md).
273273

274-
The wizard automates several steps that can be challenging the first time around. It defines the skillset, index, and indexer, including field mappings and output field mappings. It also defines projections in a knowledge store if you're using one. For some skills, such as OCR or image analysis, the wizard adds utility skills that merge the image and text content that was separated during document cracking.
274+
The wizards automate several steps that can be challenging the first time around. It defines the skillset, index, and indexer, including field mappings and output field mappings. It also defines projections in a knowledge store if you're using one. For some skills, such as OCR or image analysis, the wizard adds utility skills that merge the image and text content that was separated during document cracking.
275275

276276
After the wizard runs, you can open each object in the Azure portal to view its JSON definition.
277277

articles/search/search-security-manage-encryption-keys.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ author: HeidiSteen
88
ms.author: heidist
99
ms.service: azure-ai-search
1010
ms.topic: how-to
11-
ms.date: 10/07/2024
11+
ms.date: 12/06/2024
1212
ms.custom:
1313
- references_regions
1414
- ignite-2023
@@ -21,13 +21,13 @@ Azure AI Search automatically encrypts data at rest with [service-managed keys](
2121
This article walks you through the steps of setting up customer-managed key (CMK) or "bring-your-own-key" (BYOK) encryption.
2222

2323
> [!NOTE]
24-
> If an index is CMK encrypted, it is only accessible if the search service has access to the key. If access is revoked, the index is unusable and the service cannot be scaled until the index is deleted or access to the key is restored.
24+
> If an index is CMK encrypted, it's only accessible if the search service has access to the key. If access is revoked, the index is unusable and the service cannot be scaled until the index is deleted or access to the key is restored.
2525
2626
## CMK encrypted objects
2727

28-
CMK encryption is enacted on individual objects. If you require CMK across your search service, [set an enforcement policy](#set-up-a-policy-to-enforce-cmk-compliance).
28+
CMK encryption is applied to individual objects. If you require CMK across your search service, [set an enforcement policy](#set-up-a-policy-to-enforce-cmk-compliance).
2929

30-
CMK encryption becomes operational when an object is created. You can't encrypt objects that already exist. CMK encryption occurs whenever an object is saved to disk, either data at rest for long-term storage or temporary data for short-term storage. With CMK, the disk never sees unencrypted data.
30+
CMK encryption is applied when an object is created, which means you can't encrypt objects that already exist. CMK encryption occurs each time an object is saved to disk, for both data at rest (long-term storage) or temporary cached data (short-term storage). With CMK, the disk never sees unencrypted data.
3131

3232
Objects that can be encrypted include indexes, synonym lists, indexers, data sources, and skillsets. Encryption is computationally expensive to decrypt so only sensitive content is encrypted.
3333

0 commit comments

Comments
 (0)