Skip to content

Commit 056e049

Browse files
authored
Merge pull request #178102 from alexbuckgit/alexbuckgit/docutune-autopr-20211031-023112-8143247
DocuTune: Rejoin broken lines
2 parents 8c3731e + 120bbbb commit 056e049

20 files changed

+143
-408
lines changed

articles/active-directory-b2c/azure-sentinel.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -104,8 +104,7 @@ In the following example, you receive a notification if someone tries to force a
104104

105105
6. Select **Next: Incident settings (Preview)**. You'll configure and add the automated response later.
106106

107-
7. Go to the **Review and create** tab to review all the
108-
settings for your new alert rule. When the **Validation passed** message appears, select **Create** to initialize your alert rule.
107+
7. Go to the **Review and create** tab to review all the settings for your new alert rule. When the **Validation passed** message appears, select **Create** to initialize your alert rule.
109108

110109
![Screenshot that shows the tab for reviewing and creating an rule.](./media/azure-sentinel/review-create.png)
111110

articles/active-directory/fundamentals/protect-m365-from-on-premises-attacks.md

Lines changed: 52 additions & 147 deletions
Large diffs are not rendered by default.

articles/active-directory/fundamentals/security-operations-privileged-identity-management.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -21,8 +21,7 @@ The security of business assets depends on the integrity of the privileged accou
2121

2222
For cloud services, prevention and response are the joint responsibilities of the cloud service provider and the customer.
2323

24-
Traditionally, organizational security has focused on the entry and exit points of a network as the security perimeter. However, SaaS apps and personal devices have made this approach less effective. In Azure
25-
Active Directory (Azure AD), we replace the network security perimeter with authentication in your organization's identity layer. As users are assigned to privileged administrative roles, their access must be protected in on-premises, cloud, and hybrid environments
24+
Traditionally, organizational security has focused on the entry and exit points of a network as the security perimeter. However, SaaS apps and personal devices have made this approach less effective. In Azure Active Directory (Azure AD), we replace the network security perimeter with authentication in your organization's identity layer. As users are assigned to privileged administrative roles, their access must be protected in on-premises, cloud, and hybrid environments.
2625

2726
You're entirely responsible for all layers of security for your on-premises IT environment. When you use Azure cloud services, prevention and response are joint responsibilities of Microsoft as the cloud service provider and you as the customer.
2827

articles/active-directory/manage-apps/f5-aad-integration.md

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -25,9 +25,7 @@ SHA addresses this blind spot by enabling organizations to continue using their
2525

2626
Having Azure AD pre-authenticate access to BIG-IP published services provides many benefits:
2727

28-
- Password-less authentication through [Windows Hello](/windows/security/identity-protection/hello-for-business/hello-overview),
29-
[MS Authenticator](https://support.microsoft.com/account-billing/download-and-install-the-microsoft-authenticator-app-351498fc-850a-45da-b7b6-27e523b8702a), [Fast Identity Online (FIDO) keys](../authentication/howto-authentication-passwordless-security-key.md),
30-
and [Certificate-based authentication](../authentication/active-directory-certificate-based-authentication-get-started.md)
28+
- Password-less authentication through [Windows Hello](/windows/security/identity-protection/hello-for-business/hello-overview), [MS Authenticator](https://support.microsoft.com/account-billing/download-and-install-the-microsoft-authenticator-app-351498fc-850a-45da-b7b6-27e523b8702a), [Fast Identity Online (FIDO) keys](../authentication/howto-authentication-passwordless-security-key.md), and [Certificate-based authentication](../authentication/active-directory-certificate-based-authentication-get-started.md)
3129

3230
- Preemptive [Conditional Access](../conditional-access/overview.md) and [Azure AD Multi-Factor Authentication (MFA)](../authentication/concept-mfa-howitworks.md)
3331

articles/active-directory/saas-apps/sentry-tutorial.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -87,8 +87,7 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
8787
> [!NOTE]
8888
> These values are not real. Update these values with the actual values Identifier, Reply URL, and Sign-on URL. For more information about finding these values, see the [Sentry documentation](https://docs.sentry.io/product/accounts/sso/azure-sso/#installation). You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
8989

90-
1. On the **Set up single sign-on with SAML** page, in the **SAML Signing Certificate** section, click the copy icon to copy the **App
91-
Metadata URL** value, and then save it on your computer.
90+
1. On the **Set up single sign-on with SAML** page, in the **SAML Signing Certificate** section, click the copy icon to copy the **App Metadata URL** value, and then save it on your computer.
9291

9392
![The Certificate download link](common/copy-metadataurl.png)
9493

articles/azure-government/azure-secure-isolation-guidance.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -248,8 +248,7 @@ These logical isolation options are discussed in the rest of this section.
248248
#### Hypervisor isolation
249249
Hypervisor isolation in Azure is based on [Microsoft Hyper-V](/windows-server/virtualization/hyper-v/hyper-v-technology-overview) technology, which enables Azure Hypervisor-based isolation to benefit from decades of Microsoft experience in operating system security and investments in Hyper-V technology for virtual machine isolation. You can review independent third-party assessment reports about Hyper-V security functions, including the [National Information Assurance Partnership (NIAP) Common Criteria Evaluation and Validation Scheme (CCEVS) reports](https://www.niap-ccevs.org/Product/PCL.cfm?par303=Microsoft%20Corporation) such as the [report published in Feb-2021](https://www.niap-ccevs.org/Product/Compliant.cfm?PID=11087) that is discussed herein.
250250

251-
The Target of Evaluation (TOE) was composed of Microsoft Windows Server, Microsoft Windows 10 version 1909 (November 2019 Update),
252-
and Microsoft Windows Server 2019 (version 1809) Hyper-V (“Windows”). TOE enforces the following security policies as described in the report:
251+
The Target of Evaluation (TOE) was composed of Microsoft Windows Server, Microsoft Windows 10 version 1909 (November 2019 Update), and Microsoft Windows Server 2019 (version 1809) Hyper-V (“Windows”). TOE enforces the following security policies as described in the report:
253252

254253
- **Security Audit** – Windows has the ability to collect audit data, review audit logs, protect audit logs from overflow, and restrict access to audit logs. Audit information generated by the system includes the date and time of the event, the user identity that caused the event to be generated, and other event-specific data. Authorized administrators can review, search, and sort audit records. Authorized administrators can also configure the audit system to include or exclude potentially auditable events to be audited based on a wide range of characteristics. In the context of this evaluation, the protection profile requirements cover generating audit events, authorized review of stored audit records, and providing secure storage for audit event entries.
255254
- **Cryptographic Support** – Windows provides validated cryptographic functions that support encryption/decryption, cryptographic signatures, cryptographic hashing, and random number generation. Windows implements these functions in support of IPsec, TLS, and HTTPS protocol implementation. Windows also ensures that its Guest VMs have access to entropy data so that virtualized operating systems can ensure the implementation of strong cryptography.

articles/azure-government/compare-azure-government-global-azure.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -420,8 +420,7 @@ The following Azure managed disks **features are not currently available** in Az
420420

421421
### [Azure NetApp Files](../azure-netapp-files/index.yml)
422422

423-
For Azure NetApp Files feature availability in Azure Government and how to access the Azure NetApp Files service within Azure Government,
424-
see [Azure NetApp Files for Azure Government](../azure-netapp-files/azure-government.md).
423+
For Azure NetApp Files feature availability in Azure Government and how to access the Azure NetApp Files service within Azure Government, see [Azure NetApp Files for Azure Government](../azure-netapp-files/azure-government.md).
425424

426425
### [Azure Import/Export](../import-export/storage-import-export-service.md)
427426

articles/azure-government/compliance/compliance-tic.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -163,8 +163,7 @@ Virtual network injection enables customers to selectively deploy dedicated inst
163163

164164
An increasing number of Azure multitenant services offer *service endpoints*. Service endpoints are an alternate method for integrating to Azure virtual networks. Virtual network service endpoints extend your virtual network IP address space and the identity of your virtual network to the service over a direct connection. Traffic from the virtual network to the Azure service always stays within the Azure backbone network.
165165

166-
After you enable a service endpoint for a service, use policies exposed by the service
167-
to restrict connections for the service to that virtual network. Access checks are enforced in the platform by the Azure service. Access to a locked resource is granted only if the request originates from the allowed virtual network or subnet, or from the two IPs that are used to identify your on-premises traffic if you use ExpressRoute. Use this method to effectively prevent inbound/outbound traffic from directly leaving the PaaS service.
166+
After you enable a service endpoint for a service, use policies exposed by the service to restrict connections for the service to that virtual network. Access checks are enforced in the platform by the Azure service. Access to a locked resource is granted only if the request originates from the allowed virtual network or subnet, or from the two IPs that are used to identify your on-premises traffic if you use ExpressRoute. Use this method to effectively prevent inbound/outbound traffic from directly leaving the PaaS service.
168167

169168
:::image type="content" source="./media/tic-diagram-g.png" alt-text="Service endpoints overview" border="false":::
170169

articles/azure-monitor/essentials/activity-log-schema.md

Lines changed: 2 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -681,10 +681,7 @@ This category contains the record of any new recommendations that are generated
681681

682682
## Policy category
683683

684-
This category contains records of all effect action operations performed by [Azure
685-
Policy](../../governance/policy/overview.md). Examples of the types of events you would see in this
686-
category include _Audit_ and _Deny_. Every action taken by Policy is modeled as an operation on a
687-
resource.
684+
This category contains records of all effect action operations performed by [Azure Policy](../../governance/policy/overview.md). Examples of the types of events you would see in this category include _Audit_ and _Deny_. Every action taken by Policy is modeled as an operation on a resource.
688685

689686
### Sample Policy event
690687

@@ -892,4 +889,4 @@ Following is an example of an event using this schema..
892889

893890
## Next steps
894891
* [Learn more about the Activity Log](./platform-logs-overview.md)
895-
* [Create a diagnostic setting to send Activity Log to Log Analytics workspace, Azure storage, or event hubs](./diagnostic-settings.md)
892+
* [Create a diagnostic setting to send Activity Log to Log Analytics workspace, Azure storage, or event hubs](./diagnostic-settings.md)

articles/azure-monitor/logs/manage-cost-storage.md

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -583,9 +583,7 @@ This table lists some suggestions for reducing the volume of logs collected.
583583

584584
### Getting nodes as billed in the Per Node pricing tier
585585

586-
To get a list of computers that will be billed as nodes if the workspace is in the legacy Per Node pricing tier, look for nodes that are sending **billed data types** (some data types are free).
587-
To do this, use the [_IsBillable property](./log-standard-columns.md#_isbillable) and use the leftmost field of the fully qualified domain name. This returns the count of computers with billed
588-
data per hour (which is the granularity at which nodes are counted and billed):
586+
To get a list of computers that will be billed as nodes if the workspace is in the legacy Per Node pricing tier, look for nodes that are sending **billed data types** (some data types are free). To do this, use the [_IsBillable property](./log-standard-columns.md#_isbillable) and use the leftmost field of the fully qualified domain name. This returns the count of computers with billed data per hour (which is the granularity at which nodes are counted and billed):
589587

590588
```kusto
591589
find where TimeGenerated > ago(24h) project Computer, TimeGenerated

0 commit comments

Comments
 (0)