Skip to content

Commit 05fd3f5

Browse files
authored
Merge pull request #222142 from MicrosoftDocs/main
12/21 AM Publish
2 parents 49a38e0 + 4b767a1 commit 05fd3f5

File tree

61 files changed

+1211
-324
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

61 files changed

+1211
-324
lines changed

articles/aks/azure-cni-overlay.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn how to configure Azure CNI Overlay networking in Azure Kubern
44
services: container-service
55
ms.topic: article
66
ms.custom: references_regions
7-
ms.date: 11/08/2022
7+
ms.date: 12/12/2022
88
---
99

1010
# Configure Azure CNI Overlay networking in Azure Kubernetes Service (AKS)
@@ -17,6 +17,7 @@ With Azure CNI Overlay, the cluster nodes are deployed into an Azure Virtual Net
1717
> Azure CNI Overlay is currently available only in the following regions:
1818
> - North Central US
1919
> - West Central US
20+
> - East US
2021
2122
## Overview of overlay networking
2223

@@ -89,7 +90,6 @@ The overlay solution has the following limitations today
8990
* You can't deploy multiple overlay clusters on the same subnet.
9091
* Overlay can be enabled only for new clusters. Existing (already deployed) clusters can't be configured to use overlay.
9192
* You can't use Application Gateway as an Ingress Controller (AGIC) for an overlay cluster.
92-
* v5 VM SKUs are currently not supported.
9393

9494
## Install the aks-preview Azure CLI extension
9595

articles/app-service/configure-connect-to-azure-storage.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -268,7 +268,7 @@ To validate that the Azure Storage is mounted successfully for the app:
268268

269269
- To avoid potential issues related to latency, place the app and the Azure Storage account in the same Azure region. Note, however, if the app and Azure Storage account are in same Azure region, and if you grant access from App Service IP addresses in the [Azure Storage firewall configuration](../storage/common/storage-network-security.md), then these IP restrictions are not honored.
270270

271-
- In the Azure Storage account, avoid [regenerating the access key](../storage/common/storage-account-keys-manage.md) that's used to mount the storage in the app. The storage account contains two different keys. Use a stepwise approach to ensure that the storage mount remains available to the app during key regeneration. For example, assuming that you used **key1** to configure storage mount in your app:
271+
- In the Azure Storage account, avoid [regenerating the access key](../storage/common/storage-account-keys-manage.md) that's used to mount the storage in the app. The storage account contains two different keys. Azure App Services stores Azure storage account key. Use a stepwise approach to ensure that the storage mount remains available to the app during key regeneration. For example, assuming that you used **key1** to configure storage mount in your app:
272272
273273
1. Regenerate **key2**.
274274
1. In the storage mount configuration, update the access the key to use the regenerated **key2**.
@@ -297,7 +297,7 @@ To validate that the Azure Storage is mounted successfully for the app:
297297

298298
- Mounting the storage to `/home` is not recommended because it may result in performance bottlenecks for the app.
299299

300-
- In the Azure Storage account, avoid [regenerating the access key](../storage/common/storage-account-keys-manage.md) that's used to mount the storage in the app. The storage account contains two different keys. Use a stepwise approach to ensure that the storage mount remains available to the app during key regeneration. For example, assuming that you used **key1** to configure storage mount in your app:
300+
- In the Azure Storage account, avoid [regenerating the access key](../storage/common/storage-account-keys-manage.md) that's used to mount the storage in the app. The storage account contains two different keys. Azure App Services stores Azure storage account key. Use a stepwise approach to ensure that the storage mount remains available to the app during key regeneration. For example, assuming that you used **key1** to configure storage mount in your app:
301301
302302
1. Regenerate **key2**.
303303
1. In the storage mount configuration, update the access the key to use the regenerated **key2**.

articles/automation/troubleshoot/update-agent-issues-linux.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -103,7 +103,7 @@ As they are the directories of workspaces, the number of directories equals the
103103
To fix the issue, run the following command:
104104

105105
```
106-
sudo su omsagent -c 'python /opt/microsoft/omsconfig/Scripts/PerformRequiredConfigurationChecks.py
106+
sudo su omsagent -c python /opt/microsoft/omsconfig/Scripts/PerformRequiredConfigurationChecks.py
107107
```
108108

109109
This command forces the omsconfig agent to talk to Azure Monitor and retrieve the latest configuration.

articles/azure-netapp-files/backup-introduction.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.service: azure-netapp-files
1212
ms.workload: storage
1313
ms.tgt_pltfrm: na
1414
ms.topic: conceptual
15-
ms.date: 10/07/2022
15+
ms.date: 12/21/2022
1616
ms.author: anfdocs
1717
ms.custom: references_regions
1818
---
@@ -28,6 +28,7 @@ Azure NetApp Files backup expands the data protection capabilities of Azure NetA
2828
Azure NetApp Files backup is supported for the following regions:
2929

3030
* Australia East
31+
* Canada East
3132
* East US
3233
* East US 2
3334
* France Central

articles/azure-netapp-files/whats-new.md

Lines changed: 21 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.service: azure-netapp-files
1212
ms.workload: storage
1313
ms.tgt_pltfrm: na
1414
ms.topic: overview
15-
ms.date: 12/15/2022
15+
ms.date: 12/21/2022
1616
ms.author: anfdocs
1717
---
1818
# What's new in Azure NetApp Files
@@ -21,7 +21,26 @@ Azure NetApp Files is updated regularly. This article provides a summary about t
2121

2222
## December 2022
2323

24-
* [Cross-zone replication](create-cross-zone-replication.md) (Preview)
24+
* [Azure Application Consistent Snapshot tool (AzAcSnap) 7](azacsnap-introduction.md)
25+
26+
Azure Application Consistent Snapshot Tool (AzAcSnap) is a command-line tool that enables customers to simplify data protection for third-party databases in Linux environments.
27+
28+
AzAcSnap 7 is being released with the following fixes and improvements:
29+
* Shortening of snapshot names
30+
* Restore (`-c restore`) improvements
31+
* Test (`-c test`) improvements
32+
* Validation improvements
33+
* Timeout improvements
34+
* Azure Backup integration improvements
35+
* Features moved to GA (generally available):
36+
None
37+
* The following features are now in preview:
38+
* Preliminary support for [Azure NetApp Files backup](backup-introduction.md)
39+
* [IBM Db2 database](https://www.ibm.com/products/db2) support adding options to configure, test, and snapshot backup IBM Db2 in an application consistent manner
40+
41+
Download the latest release of the installer [here](https://aka.ms/azacsnapinstaller).
42+
43+
* [Cross-zone replication](create-cross-zone-replication.md) (Preview)
2544

2645
With Azure’s push towards the use of availability zones (AZs) the need for storage-based data replication is equally increasing. Azure NetApp Files now supports [cross-zone replication](cross-zone-replication-introduction.md). With this new in-region replication capability - by combining it with the new availability zone volume placement feature - you can replicate your Azure NetApp Files volumes asynchronously from one Azure availability zone to another in a fast and cost-effective way.
2746

articles/cosmos-db/nosql/how-to-configure-cosmos-db-trigger.md

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: ealsur
55
ms.service: cosmos-db
66
ms.custom: ignite-2022
77
ms.topic: how-to
8-
ms.date: 07/06/2022
8+
ms.date: 12/21/2022
99
ms.author: maquaran
1010
---
1111

@@ -40,7 +40,7 @@ After the Azure Function is deployed with the updated configuration, you'll see
4040

4141
### Which type of logs are emitted?
4242

43-
Once enabled, there are three levels of log events that will be emitted:
43+
Once enabled, there are four levels of log events that will be emitted:
4444

4545
* Error:
4646
* When there's an unknown or critical error on the Change Feed processing that is affecting the correct trigger functionality.
@@ -49,6 +49,9 @@ Once enabled, there are three levels of log events that will be emitted:
4949
* When your Function user code had an unhandled exception - There's a gap in your Function code and the Function isn't [resilient to errors](../../azure-functions/performance-reliability.md#write-defensive-functions) or a serialization error (for C# Functions, the raw json can't be deserialized to the selected C# type).
5050
* When there are transient connectivity issues preventing the trigger from interacting with the Azure Cosmos DB account. The trigger will retry these [transient connectivity errors](troubleshoot-dotnet-sdk-request-timeout.md) but if they extend for a long period of time, there could be a network problem. You can enable Debug level traces to obtain the Diagnostics from the underlying Azure Cosmos DB SDK.
5151

52+
* Information:
53+
* When a lease is taken to another instance - During initialization and when the Function scales, the leases can be rebalanced to another instance. If you customized the acquire or expiration intervals, it can also indicate that the values might be inappropriate (the expiration interval is lower than renewal).
54+
5255
* Debug:
5356
* When a lease is acquired by an instance - The current instance will start processing the Change Feed for the lease.
5457
* When a lease is released by an instance - The current instance has stopped processing the Change Feed for the lease.

articles/defender-for-cloud/TOC.yml

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -646,7 +646,9 @@
646646
- name: Latest updates in the regulatory compliance dashboard
647647
href: episode-twenty-one.md
648648
- name: Defender EASM
649-
href: episode-twenty-two.md
649+
href: episode-twenty-two.md
650+
- name: Defender Threat Intelligence (Defender TI)
651+
href: episode-twenty-three.md
650652
- name: Manage user data
651653
href: privacy.md
652654
- name: Microsoft Defender for IoT documentation
Lines changed: 43 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,43 @@
1+
---
2+
title: Defender Threat Intelligence | Defender for Cloud in the field
3+
titleSuffix: Microsoft Defender for Cloud
4+
description: Learn about Microsoft Defender Threat Intelligence (Defender TI)
5+
ms.topic: reference
6+
ms.date: 12/21/2022
7+
---
8+
9+
# Defender threat Intelligence | Defender for Cloud in the Field
10+
11+
**Episode description**: In this episode of Defender for Cloud in the Field, Alexandra Roland joins Yuri Diogenes to talk about Microsoft Defender Threat Intelligence (Defender TI). Alexandra explains how Defender TI works and how it integrates with Defender EASM. Alexandra goes over an end-to-end scenario to demonstrate how to use Defender TI to perform a security investigation based on the data collected by the platform.
12+
<br>
13+
<br>
14+
<iframe src="https://aka.ms/docs/player?id=adfb8027-21ca-4bd0-9e54-28b0d642558a" width="1080" height="530" allowFullScreen="true" frameBorder="0"></iframe>
15+
16+
- [04:09](/shows/mdc-in-the-field/threat-intelligence#time=04m09s) - How Defender for Cloud leverages Defender TI
17+
18+
- [05:25](/shows/mdc-in-the-field/threat-intelligence#time=05m25s) - What is reputation score in Defender TI
19+
20+
- [07:15](/shows/mdc-in-the-field/threat-intelligence#time=07m15s) - How to try Defender TI
21+
22+
- [08:45](/shows/mdc-in-the-field/threat-intelligence#time=08m45s) - Demonstration
23+
24+
25+
## Recommended resources
26+
- [Learn more](https://learn.microsoft.com/defender/threat-intelligence/what-is-microsoft-defender-threat-intelligence-defender-ti) about Defender TI.
27+
- Subscribe to [Microsoft Security on YouTube](https://www.youtube.com/playlist?list=PL3ZTgFEc7LysiX4PfHhdJPR7S8mGO14YS)
28+
- Join our [Tech Community](https://aka.ms/SecurityTechCommunity)
29+
- For more about [Microsoft Security](https://msft.it/6002T9HQY)
30+
31+
- Follow us on social media:
32+
33+
- [LinkedIn](https://www.youtube.com/redirect?event=video_description&redir_token=QUFFLUhqbFk5TXZuQld2NlpBRV9BQlJqMktYSm95WWhCZ3xBQ3Jtc0tsQU13MkNPWGNFZzVuem5zc05wcnp0VGxybHprVTkwS2todWw0b0VCWUl4a2ZKYVktNGM1TVFHTXpmajVLcjRKX0cwVFNJaDlzTld4MnhyenBuUGRCVmdoYzRZTjFmYXRTVlhpZGc4MHhoa3N6ZDhFMA&q=https%3A%2F%2Fwww.linkedin.com%2Fshowcase%2Fmicrosoft-security%2F)
34+
- [Twitter](https://twitter.com/msftsecurity)
35+
36+
- Join our [Tech Community](https://aka.ms/SecurityTechCommunity)
37+
38+
- Learn more about [Microsoft Security](https://msft.it/6002T9HQY)
39+
40+
## Next steps
41+
42+
> [!div class="nextstepaction"]
43+
> [New AWS Connector in Microsoft Defender for Cloud](episode-one.md)

articles/defender-for-cloud/episode-twenty-two.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -42,4 +42,4 @@ ms.date: 12/01/2022
4242
## Next steps
4343

4444
> [!div class="nextstepaction"]
45-
> [New AWS Connector in Microsoft Defender for Cloud](episode-one.md)
45+
> [Defender Threat Intelligence (Defender TI)](episode-twenty-three.md)

articles/defender-for-iot/device-builders/concept-event-aggregation.md

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -149,26 +149,26 @@ The data collected on each package includes:
149149

150150
## Peripheral events (event-based collector)
151151

152-
Collects connections and disconnections of USB and Ethernet.
152+
The Peripheral events collector collect connections and disconnections of USB and Ethernet events.
153153

154154
Collected fields depend on the type of event:
155155

156-
**USB event**
156+
**USB events**
157157

158158
| Parameter | Description|
159159
|--|--|
160160
| **Timestamp** | The time the event occurred. |
161161
| **ActionType** | Whether the event was a connection or disconnection event. |
162162
| **bus_number** | Specific controller identifier, each USB device can have several. |
163163
| **kernel_device_number** | Representation in the kernel of the device, not unique and can each time the device is connected. |
164-
| **device_class** | Identifier specifying the type of device. |
164+
| **device_class** | Identifier specifying the class of device. |
165165
| **device_subclass** | Identifier specifying the type of device. |
166-
| **device_protocol** | Identifier specifying the protocol of device. |
166+
| **device_protocol** | Identifier specifying the device protocol. |
167167
| **interface_class** | In case device class is 0, indicate the type of device. |
168168
| **interface_subclass** | In case device class is 0, indicate the type of device. |
169169
| **interface_protocol** | In case device class is 0, indicate the type of device. |
170170

171-
**Ethernet event**
171+
**Ethernet events**
172172

173173
| Parameter | Description|
174174
|--|--|
@@ -179,22 +179,22 @@ Collected fields depend on the type of event:
179179

180180
## File system events (event-based collector)
181181

182-
Collects events whenever there are changes under watch directories for: creation, deletion, move and modification of directories and files.
183-
To define which directories and files you would like to monitor please see [System information collector specific settings](concept-micro-agent-configuration.md).
182+
The file system events collector collects events whenever there are changes under watch directories for: creation, deletion, move, and modification of directories and files.
183+
To define which directories and files you would like to monitor, see [System information collector specific settings](concept-micro-agent-configuration.md).
184184

185185
The following data is collected:
186186

187187
| Parameter | Description|
188188
|--|--|
189189
| **Timestamp** | The time the event occurred. |
190-
| **Mask** | Linux inotify mask related to the file system event, the mask identify the type of the action and can be one of the following: Access/Modified/Metadata changed/Closed/Opened/Moved/Created/Deleted. |
190+
| **Mask** | Linux inotify mask related to the file system event, the mask identifies the type of the action and can be one of the following: Access/Modified/Metadata changed/Closed/Opened/Moved/Created/Deleted. |
191191
| **Path** | Directory/file path the event was generated to. |
192192
| **Hitcount** | Number of times this event was aggregated. |
193193

194194
## Statistics data (trigger-based collector)
195195

196-
The Statistics collector generates various statistics on the different micro agent collectors, these statistics provide information about the performance of the collectors in the previous collection cycle.
197-
Examples of possible statistics include the number of events that were successfully sent and the number of events that were dropped, along with the reasons for the failures.
196+
The Statistics collector generates various statistics on the different micro agent collectors. These statistics provide information about the performance of the collectors in the previous collection cycle.
197+
Examples of possible statistics include the number of events that were successfully sent, and the number of events that were dropped, along with the reasons for the failures.
198198

199199
Collected fields:
200200

0 commit comments

Comments
 (0)