Skip to content

Commit 1a74037

Browse files
authored
Merge pull request #219530 from MicrosoftDocs/main
11/24/2022 AM Publish
2 parents 8de57bd + d563b95 commit 1a74037

34 files changed

+120
-79
lines changed

.openpublishing.redirection.defender-for-cloud.json

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -754,7 +754,11 @@
754754
"source_path_from_root": "/articles/defender-for-cloud/defender-for-containers-va-acr.md",
755755
"redirect_url": "/azure/defender-for-cloud/defender-for-containers-vulnerability-assessment-azure",
756756
"redirect_document_id": true
757-
}
758-
757+
},
758+
{
759+
"source_path_from_root": "/articles/defender-for-cloud/deploy-vulnerability-assessment-tvm.md",
760+
"redirect_url": "/azure/defender-for-cloud/deploy-vulnerability-assessment-defender-vulnerability-management",
761+
"redirect_document_id": true
762+
}
759763
]
760764
}

articles/active-directory/external-identities/claims-mapping.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -6,29 +6,29 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: B2B
88
ms.topic: conceptual
9-
ms.date: 04/06/2018
9+
ms.date: 11/24/2022
1010

1111
ms.author: mimart
1212
author: msmimart
1313
manager: celestedg
1414

1515

16-
ms.collection: M365-identity-device-management
16+
ms.collection: engagement-fy23, M365-identity-device-management
1717
---
1818

1919
# B2B collaboration user claims mapping in Azure Active Directory
2020

21-
Azure Active Directory (Azure AD) supports customizing the claims that are issued in the SAML token for B2B collaboration users. When a user authenticates to the application, Azure AD issues a SAML token to the app that contains information (or claims) about the user that uniquely identifies them. By default, this includes the user's user name, email address, first name, and last name.
21+
Azure Active Directory (Azure AD) supports customizing the claims that are issued in the SAML token for [B2B collaboration](what-is-b2b.md) users. When a user authenticates to the application, Azure AD issues a SAML token to the app that contains information (or claims) about the user that uniquely identifies them. By default, this claim includes the user's user name, email address, first name, and last name.
2222

2323
In the [Azure portal](https://portal.azure.com), you can view or edit the claims that are sent in the SAML token to the application. To access the settings, select **Azure Active Directory** > **Enterprise applications** > the application that's configured for single sign-on > **Single sign-on**. See the SAML token settings in the **User Attributes** section.
2424

25-
![Shows the SAML token attributes in the UI](media/claims-mapping/view-claims-in-saml-token.png)
25+
:::image type="content" source="media/claims-mapping/view-claims-in-saml-token-attributes.png" alt-text="Screenshot of the SAML token attributes in the UI.":::
2626

2727
There are two possible reasons why you might need to edit the claims that are issued in the SAML token:
2828

2929
1. The application requires a different set of claim URIs or claim values.
3030

31-
2. The application requires the NameIdentifier claim to be something other than the user principal name (UPN) that's stored in Azure AD.
31+
2. The application requires the NameIdentifier claim to be something other than the user principal name [(UPN)](../hybrid/plan-connect-userprincipalname.md#what-is-userprincipalname) that's stored in Azure AD.
3232

3333
For information about how to add and edit claims, see [Customizing claims issued in the SAML token for enterprise applications in Azure Active Directory](../develop/active-directory-saml-claims-customization.md).
3434

46 KB
Loading
46 KB
Loading

articles/communication-services/concepts/pricing.md

Lines changed: 18 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -82,8 +82,8 @@ Alice is a Dynamics 365 contact center agent, who makes an outbound call from Om
8282
**Cost calculations**
8383

8484
- One participant on the VoIP leg (Alice) from Omnichannel for Customer Service client application x 10 minutes x $0.004 per participant leg per minute = $0.04
85-
- One participant on the Communication Services direct routing outbound leg (Bob) from Communication Services servers to an SBC x 10 minutes x $0.004 per participant leg per minute = $0.04.
86-
- Omnichannel for Customer Service bot does not introduce additional ACS charges.
85+
- One participant on the Communication Services direct routing outbound leg (Bob) from Communication Services servers to an SBC x 10 minutes x $0.004 per participant leg per minute = $0.04
86+
- Omnichannel for Customer Service bot doesn't introduce extra ACS charges.
8787

8888
**Total cost for the call**: $0.04 + $0.04 = $0.08
8989

@@ -99,7 +99,7 @@ Alice and Bob are on a VOIP Call. Bob escalated the call to Charlie on Charlie's
9999
- Two participants on the VoIP leg (Alice and Bob) from App to Communication Services servers x 20 minutes x $0.004 per participant leg per minute = $0.16
100100
- One participant on the PSTN outbound leg (Charlie) from Communication Services servers to US Telephone number x 10 minutes x $0.013 per participant leg per minute = $0.13
101101

102-
Note: USA mixed rates to `+1-425` is $0.013. Refer to the following link for details: https://github.com/Azure/Communication/blob/master/pricing/communication-services-pstn-rates.csv)
102+
Note: USA mixed rate to `+1-425` is $0.013. Refer to the following link for details: https://github.com/Azure/Communication/blob/master/pricing/communication-services-pstn-rates.csv)
103103

104104
**Total cost for the VoIP + escalation call**: $0.16 + $0.13 = $0.29
105105

@@ -120,6 +120,21 @@ Note that the service application that uses Call Automation SDK isn't charged to
120120

121121
**Total cost for the call**: $0.22 + $0.02 = $0.24
122122

123+
### Pricing example: Inbound PSTN call redirected to another external telephone number using Call Automation SDK
124+
125+
Vlad dials your toll-free number (that you acquired from Communication Service) from his mobile phone. Your service application (built with Call Automation SDK) receives the call, and invokes the logic to redirect the call to a mobile phone number of Abraham using ACS direct routing. Abraham picks up the call and they talk with Vlad for 5 minutes.
126+
127+
- Vlad was on the call as a PSTN endpoint for a total of 5 minutes.
128+
- Your service application was on the call for the entire 5 minutes of the call.
129+
- Abraham was on the call as a direct routing endpoint for a total of 5 minutes.
130+
131+
**Cost calculations**
132+
133+
- Inbound PSTN leg by Vlad to toll-free number acquired from Communication Services x 5 minutes x $0.0220 per minute for receiving the call = $0.11
134+
- One participant on the ACS direct routing outbound leg (Abraham) from the service application to an SBC x 5 minutes x $0.004 per participant leg per minute = $0.02
135+
136+
The service application that uses Call Automation SDK isn't charged to be part of the call. The additional monthly cost of leasing a US toll-free number isn't included in this calculation.
137+
123138
## Call Recording
124139

125140
Azure Communication Services allow developers to record PSTN, WebRTC, Conference, or SIP calls. Call Recording supports mixed video MP4, mixed audio MP3/WAV, and unmixed audio WAV output formats. Call Recording SDKs are available for Java and C#. To learn more view Call Recording [concepts](./voice-video-calling/call-recording.md) and [quickstart](../quickstarts/voice-video-calling/get-started-call-recording.md).

articles/defender-for-cloud/TOC.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -278,8 +278,8 @@
278278
- name: Find vulnerabilities and software inventory with agentless scanning
279279
href: enable-vulnerability-assessment-agentless.md
280280
- name: Find vulnerabilities with threat and vulnerability management
281-
displayName: mde, tvm, vulnerability, va, arc, hybrid
282-
href: deploy-vulnerability-assessment-tvm.md
281+
displayName: mde, tvm, vulnerability, va, arc, hybrid, defender vulnerability management
282+
href: deploy-vulnerability-assessment-defender-vulnerability-management.md
283283
- name: Find vulnerabilities with the integrated Qualys scanner
284284
displayName: qualys, va, vulnerability, arc, hybrid
285285
href: deploy-vulnerability-assessment-vm.md

articles/defender-for-cloud/custom-dashboards-azure-workbooks.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -91,7 +91,7 @@ Defender for Cloud includes vulnerability scanners for your machines, containers
9191

9292
Learn more about using these scanners:
9393

94-
- [Find vulnerabilities with Microsoft threat and vulnerability management](deploy-vulnerability-assessment-tvm.md)
94+
- [Find vulnerabilities with Microsoft threat and vulnerability management](deploy-vulnerability-assessment-defender-vulnerability-management.md)
9595
- [Find vulnerabilities with the integrated Qualys scanner](deploy-vulnerability-assessment-vm.md)
9696
- [Scan your ACR images for vulnerabilities](defender-for-containers-vulnerability-assessment-azure.md)
9797
- [Scan your ECR images for vulnerabilities](defender-for-containers-vulnerability-assessment-elastic.md)

articles/defender-for-cloud/defender-for-cloud-glossary.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -115,7 +115,7 @@ This glossary provides a brief description of important terms and concepts for t
115115
## T
116116
| Term | Description | Learn more |
117117
|--|--|--|
118-
|**TVM**|Threat and Vulnerability Management, a built-in module in Microsoft Defender for Endpoint that can discover vulnerabilities and misconfigurations in near real time and prioritize vulnerabilities based on the threat landscape and detections in your organization.|[Investigate weaknesses with Microsoft Defender for Endpoint's threat and vulnerability management](deploy-vulnerability-assessment-tvm.md)
118+
|**TVM**|Threat and Vulnerability Management, a built-in module in Microsoft Defender for Endpoint that can discover vulnerabilities and misconfigurations in near real time and prioritize vulnerabilities based on the threat landscape and detections in your organization.|[Investigate weaknesses with Microsoft Defender for Endpoint's threat and vulnerability management](deploy-vulnerability-assessment-defender-vulnerability-management.md)
119119

120120
## Z
121121
| Term | Description | Learn more |

articles/defender-for-cloud/defender-for-cloud-introduction.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -95,7 +95,7 @@ Learn more about connecting your [AWS](quickstart-onboard-aws.md) and [GCP](quic
9595

9696
Defender for Cloud includes vulnerability assessment solutions for your virtual machines, container registries, and SQL servers as part of the enhanced security features. Some of the scanners are powered by Qualys. But you don't need a Qualys license, or even a Qualys account - everything's handled seamlessly inside Defender for Cloud.
9797

98-
Microsoft Defender for Servers includes automatic, native integration with Microsoft Defender for Endpoint. Learn more, [Protect your endpoints with Defender for Cloud's integrated EDR solution: Microsoft Defender for Endpoint](integration-defender-for-endpoint.md). With this integration enabled, you'll have access to the vulnerability findings from **Microsoft threat and vulnerability management**. Learn more in [Investigate weaknesses with Microsoft Defender for Endpoint's threat and vulnerability management](deploy-vulnerability-assessment-tvm.md).
98+
Microsoft Defender for Servers includes automatic, native integration with Microsoft Defender for Endpoint. Learn more, [Protect your endpoints with Defender for Cloud's integrated EDR solution: Microsoft Defender for Endpoint](integration-defender-for-endpoint.md). With this integration enabled, you'll have access to the vulnerability findings from **Microsoft threat and vulnerability management**. Learn more in [Investigate weaknesses with Microsoft Defender for Endpoint's threat and vulnerability management](deploy-vulnerability-assessment-defender-vulnerability-management.md).
9999

100100
Review the findings from these vulnerability scanners and respond to them all from within Defender for Cloud. This broad approach brings Defender for Cloud closer to being the single pane of glass for all of your cloud security efforts.
101101

articles/defender-for-cloud/defender-for-servers-introduction.md

Lines changed: 2 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -38,9 +38,10 @@ The following table summarizes what's included in each plan.
3838
|:---|:---|:---:|:---:|
3939
| **Unified view** | The Defender for Cloud portal displays Defender for Endpoint alerts. You can then drill down into Defender for Endpoint portal, with additional information such as the alert process tree, the incident graph, and a detailed machine timeline showing historical data up to six months.| :::image type="icon" source="./media/icons/yes-icon.png"::: | :::image type="icon" source="./media/icons/yes-icon.png"::: |
4040
| **Automatic MDE provisioning** | Automatic provisioning of Defender for Endpoint on Azure, AWS, and GCP resources. | :::image type="icon" source="./media/icons/yes-icon.png"::: | :::image type="icon" source="./media/icons/yes-icon.png"::: |
41-
| **Microsoft threat and vulnerability management** | Discover vulnerabilities and misconfigurations in real time with Microsoft Defender for Endpoint, without needing other agents or periodic scans. [Learn more](deploy-vulnerability-assessment-tvm.md). | :::image type="icon" source="./media/icons/yes-icon.png"::: | :::image type="icon" source="./media/icons/yes-icon.png"::: |
41+
| **Microsoft Defender Vulnerability Management** | Discover vulnerabilities and misconfigurations in real time with Microsoft Defender for Endpoint, without other agents or periodic scans. [Learn more](deploy-vulnerability-assessment-defender-vulnerability-management.md). | :::image type="icon" source="./media/icons/yes-icon.png"::: | :::image type="icon" source="./media/icons/yes-icon.png"::: |
4242
| **Threat detection for OS-level (Agent-based)** | Defender for Servers and Microsoft Defender for Endpoint (MDE) detect threats at the OS level, including VM behavioral detections and **Fileless attack detection**, which generates detailed security alerts that accelerate alert triage, correlation, and downstream response time.<br>[Learn more](alerts-reference.md#alerts-windows) | :::image type="icon" source="./media/icons/yes-icon.png"::: | :::image type="icon" source="./media/icons/yes-icon.png"::: |
4343
| **Threat detection for network-level (Agentless)** | Defender for Servers detects threats directed at the control plane on the network, including network-based detections for Azure virtual machines. | | :::image type="icon" source="./media/icons/yes-icon.png"::: |
44+
| **Microsoft Defender Vulnerability Management Add-on** | See a deeper analysis of the security posture of your protected servers, including risks related to browser extensions, network shares, and digital certificates. [Learn more](deploy-vulnerability-assessment-defender-vulnerability-management.md). | | :::image type="icon" source="./media/icons/yes-icon.png"::: |
4445
| **Security Policy and Regulatory Compliance** | Customize a security policy for your subscription and also compare the configuration of your resources with requirements in industry standards, regulations, and benchmarks. | | :::image type="icon" source="./media/icons/yes-icon.png"::: |
4546
| **Integrated vulnerability assessment powered by Qualys** | Use the Qualys scanner for real-time identification of vulnerabilities in Azure and hybrid VMs. Everything's handled by Defender for Cloud. You don't need a Qualys license or even a Qualys account. [Learn more](deploy-vulnerability-assessment-vm.md). | | :::image type="icon" source="./media/icons/yes-icon.png"::: |
4647
| **Log Analytics 500 MB free data ingestion** | Defender for Cloud leverages Azure Monitor to collect data from Azure VMs and servers, using the Log Analytics agent. | | :::image type="icon" source="./media/icons/yes-icon.png"::: |
@@ -49,10 +50,6 @@ The following table summarizes what's included in each plan.
4950
| **Just-in-time VM access for management ports** | Defender for Cloud provides [JIT access](just-in-time-access-overview.md), locking down machine ports to reduce the machine's attack surface.| | :::image type="icon" source="./media/icons/yes-icon.png"::: |
5051
| **Adaptive network hardening** | Filtering traffic to and from resources with network security groups (NSG) improves your network security posture. You can further improve security by [hardening the NSG rules](adaptive-network-hardening.md) based on actual traffic patterns. | | :::image type="icon" source="./media/icons/yes-icon.png"::: |
5152
| **Docker host hardening** | Defender for Cloud assesses containers hosted on Linux machines running Docker containers, and compares them with the Center for Internet Security (CIS) Docker Benchmark. [Learn more](harden-docker-hosts.md). | | :::image type="icon" source="./media/icons/yes-icon.png"::: |
52-
<!--
53-
[Learn more](fileless-attack-detection.md).
54-
| Future – TVM P2 | | :::image type="icon" source="./media/icons/yes-icon.png"::: |
55-
| Future – disk scanning insights | | :::image type="icon" source="./media/icons/yes-icon.png"::: | -->
5653

5754
> [!NOTE]
5855
> If you only enable Defender for Cloud at the workspace level, Defender for Cloud won't enable just-in-time VM access, adaptive application controls, and network detections for Azure resources.

0 commit comments

Comments
 (0)