Skip to content

Commit 16c3c84

Browse files
authored
Merge pull request #284713 from MicrosoftDocs/repo_sync_working_branch
Confirm merge from repo_sync_working_branch to main to sync with https://github.com/MicrosoftDocs/azure-docs (branch main)
2 parents 094f738 + 9384a16 commit 16c3c84

File tree

6 files changed

+32
-4
lines changed

6 files changed

+32
-4
lines changed

articles/ai-services/openai/api-version-deprecation.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -69,9 +69,9 @@ This version contains support for the latest GA features like Whisper, DALL-E 3,
6969

7070
We recommend first testing the upgrade to new API versions to confirm there's no impact to your application from the API update before making the change globally across your environment.
7171

72-
If you're using the OpenAI Python client library or the REST API, you'll need to update your code directly to the latest preview API version.
72+
If you're using the OpenAI Python or JavaScript client libraries, or the REST API, you'll need to update your code directly to the latest preview API version.
7373

74-
If you're using one of the Azure OpenAI SDKs for C#, Go, Java, or JavaScript you'll instead need to update to the latest version of the SDK. Each SDK release is hardcoded to work with specific versions of the Azure OpenAI API.
74+
If you're using one of the Azure OpenAI SDKs for C#, Go, or Java, you'll instead need to update to the latest version of the SDK. Each SDK release is hardcoded to work with specific versions of the Azure OpenAI API.
7575

7676
## Next steps
7777

articles/confidential-computing/overview.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -19,10 +19,14 @@ Confidential computing is an industry term established by the [Confidential Comp
1919
>
2020
> These secure and isolated environments prevent unauthorized access or modification of applications and data while they are in use, thereby increasing the security level of organizations that manage sensitive and regulated data.
2121
22+
Microsoft is one of the founding members of the CCC and provides Trusted Execution Environments (TEEs) in Azure based on this CCC definition.
23+
2224
## Reducing the attack surface
2325

2426
:::image type="content" source="media/overview/three-states-and-confidential-computing-consortium-definition.png" alt-text="Diagram of three states of data protection, with confidential computing's data in use highlighted.":::
2527

28+
Azure already encrypts data at rest and in transit. Confidential computing helps protect data in use, including cryptographic keys. Azure confidential computing helps customers prevent unauthorized access to data in use, including from the cloud operator, by processing data in a hardware-based and attested Trusted Execution Environment (TEE). When Azure confidential computing is enabled and properly configured, Microsoft is not able to access unencrypted customer data.
29+
2630
The threat model aims to reduce trust or remove the ability for a cloud provider operator or other actors in the tenant's domain accessing code and data while it's being executed. This is achieved in Azure using a hardware root of trust not controlled by the cloud provider, which is designed to ensure unauthorized access or modification of the environment.
2731

2832
When used with data encryption at rest and in transit, confidential computing extends data protections further to protect data whilst it's in use. This is beneficial for organizations seeking further protections for sensitive data and applications hosted in cloud environments.

articles/dev-box/how-to-customize-dev-box-setup-tasks.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -214,7 +214,7 @@ Make your configuration file seamlessly available to your developers by naming i
214214
215215
When the creation process is complete, the new dev box has nodejs and Visual Studio Code installed.
216216
217-
The new dev box has the repository cloned, and all instructions from configuration file applied.
217+
The new dev box has all instructions from configuration file applied and requested repositories cloned.
218218
219219
## Define new tasks in a catalog
220220

articles/dev-box/index.yml

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -95,3 +95,11 @@ landingContent:
9595
url: https://learn.microsoft.com/en-us/azure/dev-box/cli-reference-subset
9696
- text: REST API
9797
url: https://aka.ms/dev-box/restapidocs
98+
99+
# Card
100+
- title: Dev Center Quick Start Samples
101+
linkLists:
102+
- linkListType: sample
103+
links:
104+
- text: Dev Center Samples
105+
url: https://github.com/Azure/azure-quickstart-templates/tree/master/quickstarts/microsoft.devcenter

articles/reliability/cross-region-replication-azure.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -87,7 +87,7 @@ Many regions have a paired region to support cross-region replication based on p
8787
| **US Department of Defense** |US DoD East\* |US DoD Central\* |
8888
| **US Government** |US Gov Arizona\* |US Gov Texas\* |
8989
| |US Gov Virginia\* |US Gov Texas\* |
90-
|US Gov Texas\* |US Gov Virginia\* |
90+
| |US Gov Texas\* |US Gov Virginia\* |
9191

9292
(\*) Certain regions are access restricted to support specific customer scenarios, such as in-country/region disaster recovery. These regions are available only upon request by [creating a new support request](/troubleshoot/azure/general/region-access-request-process#reserved-access-regions).
9393

articles/storage/blobs/soft-delete-container-enable.md

Lines changed: 16 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -42,6 +42,15 @@ Enable-AzStorageContainerDeleteRetentionPolicy -ResourceGroupName <resource-grou
4242
-RetentionDays 7
4343
```
4444

45+
To check the current settings for container soft delete, call the [Get-AzStorageBlobServiceProperty](/powershell/module/az.storage/get-azstorageblobserviceproperty) command:
46+
47+
```azurepowershell
48+
$properties = Get-AzStorageBlobServiceProperty -ResourceGroupName <resource-group> `
49+
-StorageAccountName <storage-account>
50+
$properties.ContainerDeleteRetentionPolicy.Enabled
51+
$properties.ContainerDeleteRetentionPolicy.Days
52+
```
53+
4554
To disable container soft delete, call the **Disable-AzStorageContainerDeleteRetentionPolicy** command.
4655

4756
# [Azure CLI](#tab/azure-cli)
@@ -56,6 +65,13 @@ az storage account blob-service-properties update \
5665
--resource-group <resource_group>
5766
```
5867

68+
To check the current settings for container soft delete, call the [az storage account blob-service-properties show](/cli/azure/storage/account/blob-service-properties#az-storage-account-blob-service-properties-show) command:
69+
70+
```azurecli-interactive
71+
az storage account blob-service-properties show --account-name <storage-account> \
72+
--resource-group <resource-group>
73+
```
74+
5975
To disable container soft delete, specify `false` for the `--enable-container-delete-retention` parameter.
6076

6177
# [Template](#tab/template)

0 commit comments

Comments
 (0)