Skip to content

Commit 184a762

Browse files
authored
Merge pull request #222279 from MicrosoftDocs/main
12/22 PM Publish
2 parents 65656c2 + 4148bde commit 184a762

File tree

91 files changed

+1040
-353
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

91 files changed

+1040
-353
lines changed

articles/active-directory/fundamentals/security-operations-infrastructure.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -212,7 +212,7 @@ For information on what and how to monitor configuration information refer to:
212212
| What to monitor| Risk level| Where| Filter/sub-filter| Notes |
213213
| - | - | - | - | - |
214214
| Scheduler changes|High | PowerShell| Set-ADSyncScheduler| Look for modifications to schedule |
215-
| Changes to scheduled tasks| High | Azure AD Audit logs| Activity = 4699(S): A scheduled task was deleted<br>-or-<br>Activity = 4701(s): A scheduled task was disabled<br>-or-<br>Activity = 4701(s): A scheduled task was updated| Monitor all |
215+
| Changes to scheduled tasks| High | Azure AD Audit logs| Activity = 4699(S): A scheduled task was deleted<br>-or-<br>Activity = 4701(s): A scheduled task was disabled<br>-or-<br>Activity = 4702(s): A scheduled task was updated| Monitor all |
216216

217217
* For more information on logging PowerShell script operations, see [Enabling Script Block Logging](/powershell/module/microsoft.powershell.core/about/about_logging_windows), which is part of the PowerShell reference documentation.
218218

articles/active-directory/standards/configure-cmmc-level-1-controls.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -48,7 +48,7 @@ The following table provides a list of control IDs and associated customer respo
4848
| *Control* | *Guidance* |
4949
| - | - |
5050
| IA.L1-3.5.1 | Azure AD uniquely identifies users, processes (service principal/workload identities), and devices via the ID property on the respective directory objects. You can filter log files to help with your assessment using the following links. Use the following reference to meet assessment objectives.<br><br>Filtering logs by user properties<li>[User resource type: ID Property](/graph/api/resources/user?view=graph-rest-1.0&preserve-view=true)<br><br>Filtering logs by service properties<li>[ServicePrincipal resource type: ID Property](/graph/api/resources/serviceprincipal?view=graph-rest-1.0&preserve-view=true)<br><br>Filtering logs by device properties<li>[Device resource type: ID Property](/graph/api/resources/device?view=graph-rest-1.0&preserve-view=true) |
51-
IA.L1-3.5.2 | Azure AD uniquely authenticates or verifies each user, process acting on behalf of user, or device as a prerequisite to system access. Use the following reference to meet assessment objectives.<br><br>Provision user accounts<li>[What is Azure Active Directory authentication?](../authentication/overview-authentication.md)<br><br>[Configure Azure Active Directory to meet NIST authenticator assurance levels](../standards/nist-overview.md)<br><br>Provision service principal accounts<li>[Service principal authentication](../fundamentals/service-accounts-principal.md)<br><br>Provision Device accounts<li>[What is a device identity?](../devices/overview.md)<li>[How it works: Device registration](../devices/device-registration-how-it-works.md)<li>[What is a Primary Refresh Token?](../devices/concept-primary-refresh-token.md)<li>What does the PRT contain ---**needs link** |
51+
IA.L1-3.5.2 | Azure AD uniquely authenticates or verifies each user, process acting on behalf of user, or device as a prerequisite to system access. Use the following reference to meet assessment objectives.<br><br>Provision user accounts<li>[What is Azure Active Directory authentication?](../authentication/overview-authentication.md)<br><br>[Configure Azure Active Directory to meet NIST authenticator assurance levels](../standards/nist-overview.md)<br><br>Provision service principal accounts<li>[Service principal authentication](../fundamentals/service-accounts-principal.md)<br><br>Provision Device accounts<li>[What is a device identity?](../devices/overview.md)<li>[How it works: Device registration](../devices/device-registration-how-it-works.md)<li>[What is a Primary Refresh Token?](../devices/concept-primary-refresh-token.md)<li>[What does the Primary Refresh Token (PRT) contain?](/azure/active-directory/devices/concept-primary-refresh-token#what-does-the-prt-contain)|
5252

5353
## System and Information Integrity (SI) domain
5454

articles/azure-arc/data/includes/azure-arc-data-preview-release.md

Lines changed: 9 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -6,25 +6,22 @@ ms.topic: include
66
ms.date: 12/7/2022
77
---
88

9-
9+
<!---
1010
At this time, a test or preview build is not available for the next release.
11+
--->
1112

12-
<!---
13-
December 2022 preview release is now available.
13+
January 2023 test release is now available.
1414

1515
|Component|Value|
1616
|-----------|-----------|
17-
|Container images registry/repository |`mcr.microsoft.com/arcdata/preview`|
18-
|Container images tag |`v1.14.0_2022-12-13`|
19-
|CRD names and version|`datacontrollers.arcdata.microsoft.com`: v1beta1, v1 through v6<br/>`exporttasks.tasks.arcdata.microsoft.com`: v1beta1, v1, v2<br/>`kafkas.arcdata.microsoft.com`: v1beta1, v1beta2<br/>`monitors.arcdata.microsoft.com`: v1beta1, v1, v2<br/>`sqlmanagedinstances.sql.arcdata.microsoft.com`: v1beta1, v1 through v7<br/>`postgresqls.arcdata.microsoft.com`: v1beta1, v1beta2, v1beta3<br/>`sqlmanagedinstancerestoretasks.tasks.sql.arcdata.microsoft.com`: v1beta1, v1<br/>`failovergroups.sql.arcdata.microsoft.com`: v1beta1, v1beta2, v1 through v2<br/>`activedirectoryconnectors.arcdata.microsoft.com`: v1beta1, v1beta2, v1<br/>`sqlmanagedinstancereprovisionreplicatask.tasks.sql.arcdata.microsoft.com`: v1beta1<br/>`telemetrycollectors.arcdata.microsoft.com`: v1beta1, v1beta2, v1beta3 *use to be otelcollectors*<br/>`telemetryrouters.arcdata.microsoft.com`: v1beta1, v1beta2, v1beta3, v1beta4<br/>`sqlmanagedinstancemonitoringprofiles.arcdata.microsoft.com`: v1beta1, v1beta2<br/>|
17+
|Container images registry/repository |`mcr.microsoft.com/arcdata/test`|
18+
|Container images tag |`v1.15.0_2023-01-10 `|
19+
|CRD names and version|`datacontrollers.arcdata.microsoft.com`: v1beta1, v1 through v6<br/>`exporttasks.tasks.arcdata.microsoft.com`: v1beta1, v1, v2<br/>`kafkas.arcdata.microsoft.com`: v1beta1, v1beta2, v1beta3<br/>`monitors.arcdata.microsoft.com`: v1beta1, v1, v2<br/>`sqlmanagedinstances.sql.arcdata.microsoft.com`: v1beta1, v1 through v9<br/>`postgresqls.arcdata.microsoft.com`: v1beta1, v1beta2, v1beta3, v1beta4<br/>`sqlmanagedinstancerestoretasks.tasks.sql.arcdata.microsoft.com`: v1beta1, v1<br/>`failovergroups.sql.arcdata.microsoft.com`: v1beta1, v1beta2, v1 through v2<br/>`activedirectoryconnectors.arcdata.microsoft.com`: v1beta1, v1beta2, v1<br/>`sqlmanagedinstancereprovisionreplicatask.tasks.sql.arcdata.microsoft.com`: v1beta1<br/>`telemetrycollectors.arcdata.microsoft.com`: v1beta1, v1beta2, v1beta3 *use to be otelcollectors*<br/>`telemetryrouters.arcdata.microsoft.com`: v1beta1, v1beta2, v1beta3, v1beta4<br/>`sqlmanagedinstancemonitoringprofiles.arcdata.microsoft.com`: v1beta1, v1beta2<br/>|
2020
|Azure Resource Manager (ARM) API version|2022-06-15-preview|
21-
|`arcdata` Azure CLI extension version|1.4.9 ([Download](https://aka.ms/az-cli-arcdata-ext))|
22-
|Arc-enabled Kubernetes helm chart extension version|1.14.0|
21+
|`arcdata` Azure CLI extension version|1.4.10 ([Download](https://aka.ms/az-cli-arcdata-ext))|
22+
|Arc-enabled Kubernetes helm chart extension version|1.15.0|
2323
|Azure Arc Extension for Azure Data Studio<br/>`arc`<br/>`azcli`|*No Changes*<br/>1.7.0 ([Download](https://aka.ms/ads-arcdata-ext))</br>1.7.0 ([Download](https://aka.ms/ads-azcli-ext))|
2424

2525
New for this release:
2626

27-
- Arc-enabled PostgreSQL server
28-
- Switch to Ubuntu based images
29-
30-
--->
27+
- Kafka "Separate" controller mode : This feature describes the ability to set ".spec.kraftControllerMode" to combined on a Kafka custom resource which creates two stateful sets (one for brokers and one for controllers) instead of a single "server" statefulset that houses both. This feature also ships some health checking, the ability to run multiple kafka instances in a cluster, and security improvements.

articles/azure-functions/create-first-function-vs-code-python.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -91,7 +91,7 @@ In this section, you use Visual Studio Code to create a local Azure Functions pr
9191
7. Replace the `app.route()` method call with the following code:
9292

9393
```python
94-
@app.route(route="hello", auth_level=func.AuthLevel.ANONYMOUS)
94+
@app.route(route="hello", http_auth_level=func.AuthLevel.ANONYMOUS)
9595
```
9696

9797
This code enables your HTTP function endpoint to be called in Azure without having to provide an [Authorization keys](functions-bindings-http-webhook-trigger.md#authorization-keys). Local execution doesn't require authorization keys.
@@ -100,7 +100,7 @@ In this section, you use Visual Studio Code to create a local Azure Functions pr
100100

101101
```python
102102
@app.function_name(name="HttpTrigger1")
103-
@app.route(route="hello", auth_level=func.AuthLevel.ANONYMOUS)
103+
@app.route(route="hello", http_auth_level=func.AuthLevel.ANONYMOUS)
104104
def test_function(req: func.HttpRequest) -> func.HttpResponse:
105105
logging.info('Python HTTP trigger function processed a request.')
106106

articles/azure-monitor/essentials/data-collection-transformations-structure.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -39,6 +39,8 @@ Transformations in a [data collection rule (DCR)](data-collection-rule-overview.
3939

4040

4141

42+
### Required columns
43+
The output of every transformation must contain a valid timestamp in a column called `TimeGenerated` of type `datetime`. Make sure to include it in the final `extend` or `project` block! Creating or updating a DCR without `TimeGenerated` in the output of a transformation will lead to an error.
4244

4345
## Inline reference table
4446
The [datatable](/azure/data-explorer/kusto/query/datatableoperator?pivots=azuremonitor) operator isn't supported in the subset of KQL available to use in transformations. This operator would normally be used in KQL to define an inline query-time table. Use dynamic literals instead to work around this limitation.
@@ -329,4 +331,4 @@ Use [Identifier quoting](/azure/data-explorer/kusto/query/schema-entities/entity
329331

330332
## Next steps
331333

332-
- [Create a data collection rule](../agents/data-collection-rule-azure-monitor-agent.md) and an association to it from a virtual machine using the Azure Monitor agent.
334+
- [Create a data collection rule](../agents/data-collection-rule-azure-monitor-agent.md) and an association to it from a virtual machine using the Azure Monitor agent.

articles/azure-netapp-files/TOC.yml

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -181,8 +181,10 @@
181181
href: create-active-directory-connections.md
182182
- name: Modify Active Directory connections
183183
href: modify-active-directory-connections.md
184-
- name: Enable AD DS LDAP authentication for NFS volumes
184+
- name: Configure AD DS LDAP authentication for NFS volumes
185185
href: configure-ldap-over-tls.md
186+
- name: Join a Linux VM to an Active Directory Domain
187+
href: join-active-directory-domain.md
186188
- name: Manage capacity pools
187189
items:
188190
- name: Set up a capacity pool
@@ -225,6 +227,8 @@
225227
href: azure-netapp-files-configure-export-policy.md
226228
- name: Configure Unix permissions and change ownership mode
227229
href: configure-unix-permissions-change-ownership-mode.md
230+
- name: Configure access control lists for NFSv4.1
231+
href: configure-access-control-lists.md
228232
- name: Configure network features for a volume
229233
href: configure-network-features.md
230234
- name: Configure Virtual WAN

articles/azure-netapp-files/azure-netapp-files-create-volumes.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -143,4 +143,5 @@ This article shows you how to create an NFS volume. For SMB volumes, see [Create
143143
* [Configure Unix permissions and change ownership mode](configure-unix-permissions-change-ownership-mode.md).
144144
* [Resource limits for Azure NetApp Files](azure-netapp-files-resource-limits.md)
145145
* [Learn about virtual network integration for Azure services](../virtual-network/virtual-network-for-azure-services.md)
146-
* [Application resilience FAQs for Azure NetApp Files](faq-application-resilience.md)
146+
* [Configure access control lists on NFSv4.1 with Azure NetApp Files](configure-access-control-lists.md)
147+
* [Application resilience FAQs for Azure NetApp Files](faq-application-resilience.md)
Lines changed: 61 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,61 @@
1+
---
2+
title: Configure access control lists with Azure NetApp Files | Microsoft Docs
3+
description: This article shows you how to configure access control lists (ACLs) on NFSv4.1 with Azure NetApp Files.
4+
author: b-ahibbard
5+
ms.service: azure-netapp-files
6+
ms.workload: storage
7+
ms.topic: how-to
8+
ms.date: 12/20/2022
9+
ms.author: anfdocs
10+
---
11+
# Configure access control lists on NFSv4.1 volumes for Azure NetApp Files
12+
13+
Azure NetApp Files supports access control lists (ACLs) on NFSv4.1 volumes. ACLs provide granular file security via NFSv4.1.
14+
15+
ACLs contain access control entities (ACEs), which specify the permissions (read, write, etc.) of individual users or groups. When assigning user roles, provide the user email address if you're using a Linux VM joined to an Active Directory Domain. Otherwise, provide user IDs to set permissions.
16+
17+
## Requirements
18+
19+
- ACLs can only be configured on NFS4.1 volumes. You can [convert a volume from NFSv3 to NFSv4.1](convert-nfsv3-nfsv41.md).
20+
21+
- You must have two packages installed:
22+
1. `nfs-utils` to mount NFS volumes
23+
1. `nfs-acl-tools` to view and modify NFSv4 ACLs.
24+
If you do not have either, install them:
25+
- On a Red Hat Enterprise Linux or SuSE Linux instance:
26+
```bash
27+
sudo yum install -y nfs-utils
28+
sudo yum install -y nfs4-acl-tools
29+
```
30+
- On Ubuntu or Debian instance:
31+
```bash
32+
sudo apt-get install nfs-common
33+
sudo apt-get install nfs4-acl-tools
34+
```
35+
36+
## Configure ACLs
37+
38+
1. If you want to configure ACLs for a Linux VM joined to Active Directory, complete the steps in [Join a Linux VM to an Azure Active Directory Domain](join-active-directory-domain.md).
39+
40+
1. [Mount the volume](azure-netapp-files-mount-unmount-volumes-for-virtual-machines.md).
41+
42+
1. Use the command `nfs4_getfacl <path>` to view the existing ACL on a directory or file.
43+
44+
The default NFSv4.1 ACL is a close representation of the POSIX permissions of 770.
45+
- `A::OWNER@:rwaDxtTnNcCy` - owner has full (RWX) access
46+
- `A:g:GROUP@:rwaDxtTnNcy` - group has full (RWX) access
47+
- `A::EVERYONE@:tcy` - everyone else has no access
48+
49+
1. To modify an ACE for a user, use the `nfs4_setfacl` command: `nfs4_setfacl -a|x A|D::<user|group>:<permissions_alias> <file>`
50+
- Use `-a` to add permission. Use `-x` to remove permission.
51+
- `A` creates access; `D` denies access.
52+
- In an Active Directory-joined set up, enter an email address for the user. Otherwise, enter the numerical user ID.
53+
- Permission aliases include read, write, append, execute, etc.
54+
In the following Active Directory-joined example, user [email protected] is given read, write, and execute access to `/nfsldap/engineering`:
55+
```bash
56+
nfs4_setfacl -a A::[email protected]:RWX /nfsldap/engineering
57+
```
58+
59+
## Next steps
60+
61+
* [Configure NFS clients](configure-nfs-clients.md)

articles/azure-netapp-files/configure-nfs-clients.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -116,7 +116,7 @@ The examples in this section use the following domain name and IP address:
116116

117117
The following steps are optional. You need to perform the steps only if you use user mapping at the NFS client:
118118

119-
1. Complete all steps described in the [RHEL 8 configuration if you are using NFSv4.1 Kerberos encryption](#rhel8_nfsv41_kerberos) section.
119+
1. Complete all steps described in the [RHEL 8 configuration if you are using NFSv4.1 Kerberos encryption](#rhel8_nfsv41_kerberos) section.
120120

121121
2. Add a static DNS record in your /etc/hosts file to use fully qualified domain name (FQDN) for your AD, instead of using the IP address in SSSD configuration file:
122122

articles/azure-netapp-files/convert-nfsv3-nfsv41.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -143,3 +143,4 @@ This section shows you how to convert the NFSv4.1 volume to NFSv3.
143143
144144
* [Create an NFS volume for Azure NetApp Files](azure-netapp-files-create-volumes.md)
145145
* [Mount or unmount a volume](azure-netapp-files-mount-unmount-volumes-for-virtual-machines.md)
146+
* [Configure access control lists on NFSv4.1 with Azure NetApp Files](configure-access-control-lists.md)

0 commit comments

Comments
 (0)