You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/api-management/add-api-manually.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -91,7 +91,7 @@ Test the operation in the Azure portal. You can also test it in the **Developer
91
91
This section shows how to add a wildcard operation. A wildcard operation lets you pass an arbitrary value with an API request. Instead of creating separate GET operations as shown in the previous sections, you could create a wildcard GET operation.
92
92
93
93
> [!CAUTION]
94
-
> Use care when configuring a wildcard operation. This configuration may make an API more vulnerable to certain [API security threats](mitigate-owasp-api-threats.md#improper-assets-management).
94
+
> Use care when configuring a wildcard operation. This configuration may make an API more vulnerable to certain [API security threats](mitigate-owasp-api-threats.md#improper-inventory-management).
Copy file name to clipboardExpand all lines: articles/azure-vmware/azure-vmware-solution-known-issues.md
+3-1Lines changed: 3 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -31,9 +31,11 @@ Refer to the table to find details about resolution dates or possible workaround
31
31
|[VMSA-2024-0012](https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24453) Multiple Vulnerabilities in the DCERPC Protocol and Local Privilege Escalations | June 2024 | Microsoft, working with Broadcom, adjudicated the risk of these vulnerabilities at an adjusted Environmental Score of [6.8](https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/MAC:L/MPR:H/MUI:R) or lower. Adjustments from the base score were possible due to the network isolation of the Azure VMware Solution vCenter Server (ports 2012, 2014, and 2020 aren't exposed via any interactive network path) and multiple levels of authentication and authorization necessary to gain interactive access to the vCenter Server network segment. A plan is being put in place to address these vulnerabilities at a future date TBD. | N/A |
32
32
| Zerto DR isn't currently supported with the AV64 SKU. The AV64 SKU uses ESXi host secure boot and Zerto DR hasn't implemented a signed VIB for the ESXi install. | 2024 | Continue using the AV36, AV36P, and AV52 SKUs for Zerto DR. | N/A |
33
33
|[VMSA-2024-0013 (CVE-2024-37085)](https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24505) VMware ESXi Active Directory Integration Authentication Bypass | July 2024 | Azure VMware Solution does not provide Active Directory integration and isn't vulnerable to this attack. | N/A |
34
-
| AV36P SKU new private cloud deploys with vSphere 7, not vSphere 8. | September 2024 |The AV36P SKU is waiting for a Hotfix to be deployed, which will resolve this issue. |N/A|
34
+
| AV36P SKU new private cloud deploys with vSphere 7, not vSphere 8. | September 2024 | AV36P SKU Hotfix deployed, issue resolved. |September 2024|
35
35
| [VMSA-2024-0019](https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24968) Vulnerability in the DCERPC Protocol and Local Privilege Escalations | September 2024 | Microsoft, working with Broadcom, adjudicated the risk of CVE-2024-38812 at an adjusted Environmental Score of [6.8](https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/MAC:L/MPR:H/MUI:R) and CVE-2024-38813 with an adjusted Environmental Score of [6.8](https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/MAV:A/MAC:H/MPR:L/MUI:R). Adjustments from the base scores were possible due to the network isolation of the Azure VMware Solution vCenter Server DCERPC protocol access (ports 2012, 2014, and 2020 aren't exposed via any interactive network path) and multiple levels of authentication and authorization necessary to gain interactive access to the Azure VMware Solution vCenter Server. A plan is being put in place to address these vulnerabilities at a future date TBD. | N/A |
36
36
[VMSA-2024-0020](https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25047) VMware NSX command injection, local privilege escalation & content spoofing vulnerability| October 2024 | The vulnerability mentioned in the Broadcom document is not applicable to Azure VMware Solution, as attack vector mentioned does not apply. | N/A |
37
+
| New Stretched Clusters private cloud deploys with vSphere 7, not vSphere 8. | September 2024 | Stretched Clusters is waiting for a Hotfix to be deployed, which will resolve this issue. | Planned November 2024 |
38
+
| New Standard private cloud deploys with vSphere 7, not vSphere 8 in Australia East region (Pods 4 and 5). | October 2024 | Pods 4 and 5 in Australia East are waiting for a Hotfix to be deployed, which will resolve this issue. | Planned November 2024 |
37
39
38
40
In this article, you learned about the current known issues with the Azure VMware Solution.
This article describes the legacy method for connecting your OT sensor or on-premises management console to Microsoft Sentinel. Stream data into Microsoft Sentinel whenever you want to use Microsoft Sentinel's advanced threat hunting, security analytics, and automation features when responding to security incidents and threats across your network.
13
13
14
14
> [!IMPORTANT]
15
+
> This feature will be deprecated in **January 2025**.
16
+
>
15
17
> If you're using a cloud connected sensor, we recommend that you connect Defender for IoT data using the Microsoft Sentinel solution instead of the legacy integration method. For more information, see:
16
18
>
17
19
> -[OT threat monitoring in enterprise SOCs](../concept-sentinel-integration.md)
Copy file name to clipboardExpand all lines: articles/defender-for-iot/organizations/ot-deploy/air-gapped-deploy.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -95,14 +95,14 @@ If you're an existing customer using an on-premises management console to manage
95
95
96
96
1. After your transition is complete, decommission the on-premises management console.
97
97
98
+
### Retirement timeline of the Central Manager
98
99
99
-
### Retirement timeline
100
+
The on-premises management console will be retired on **January 1, 2025** with the following updates/changes:
100
101
101
-
The on-premises management console retirement includes the following details:
102
-
103
-
- Sensor versions released after **January 1, 2025** won't be able to be managed by an on-premises management console.
104
-
- Sensor software versions released between **January 1st, 2024 – January 1st, 2025** will continue to support an on-premises management console release.
105
-
- Air-gapped sensors that cannot connect to the cloud can be managed directly via the sensor console, CLI, or API.
102
+
- Sensor versions released after **January 1, 2025** won't be managed by an on-premises management console.
103
+
- Air-gapped sensor support isn't affected by these changes to the on-premises management console support. We continue to support air-gapped deployments and assist with the transition to the cloud. The sensors retain a full user interface so that they can be used in "lights out" scenarios and continue to analyze and secure the network in the event of an outage.
104
+
- Air-gapped sensors that can't <!-- or don't / aren't connected to-->connect to the cloud can be managed directly via the sensor console GUI, CLI, or API.
105
+
- Sensor software versions released between **January 1st, 2024 – January 1st, 2025** still support the on-premises management console.
106
106
107
107
For more information, see [OT monitoring software versions](../release-notes.md).
Copy file name to clipboardExpand all lines: articles/governance/machine-configuration/overview.md
+19-1Lines changed: 19 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -37,6 +37,16 @@ You can view the per-setting results from configurations in the [Guest assignmen
37
37
Azure Policy assignment orchestrated the configuration is orchestrated, you can select the "Last
38
38
evaluated resource" link on the ["Compliance details" page][07].
39
39
40
+
## Enforcement Modes for Custom Policies
41
+
42
+
In order to provide greater flexibility in the enforcement and monitoring of server settings, applications and workloads, Machine Configuration offers three main enforcement modes for each policy assignment as described in the following table.
Copy file name to clipboardExpand all lines: articles/iot-operations/discover-manage-assets/howto-manage-assets-remotely.md
+21-11Lines changed: 21 additions & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -56,7 +56,7 @@ To sign in to the operations experience, go to the [operations experience](https
56
56
57
57
## Select your site
58
58
59
-
After you sign in, the web UI displays a list of sites. Each site is a collection of Azure IoT Operations instances where you can configure and manage your assets. A site typically represents a physical location where you have physical assets deployed. Sites make it easier for you to locate and manage assets. Your [IT administrator is responsible for grouping instances in to sites](/azure/azure-arc/site-manager/overview). Any Azure IoT Operations instances that aren't assigned to a site appear in the **Unassigned instances** node. Select the site that you want to use:
59
+
After you sign in, the operations experience displays a list of sites. Each site is a collection of Azure IoT Operations instances where you can configure and manage your assets. A site typically represents a physical location where you have physical assets deployed. Sites make it easier for you to locate and manage assets. Your [IT administrator is responsible for grouping instances in to sites](/azure/azure-arc/site-manager/overview). Any Azure IoT Operations instances that aren't assigned to a site appear in the **Unassigned instances** node. Select the site that you want to use:
60
60
61
61
:::image type="content" source="media/howto-manage-assets-remotely/site-list.png" alt-text="Screenshot that shows a list of sites in the operations experience.":::
62
62
@@ -116,7 +116,7 @@ An Azure IoT Operations deployment can include an optional built-in OPC PLC simu
116
116
Run the following command:
117
117
118
118
```azurecli
119
-
az iot ops asset endpoint create --name opc-ua-connector-0 --target-address opc.tcp://opcplc-000000:50000 -g {your resource group name} --cluster {your cluster name}
119
+
az iot ops asset endpoint opcua create --name opc-ua-connector-0 --target-address opc.tcp://opcplc-000000:50000 -g {your resource group name} --instance {your instance name}
120
120
```
121
121
122
122
> [!TIP]
@@ -153,7 +153,7 @@ To use the `UsernamePassword` authentication mode, complete the following steps:
153
153
1. Use a command like the following example to create your asset endpoint:
@@ -261,15 +261,23 @@ You can import up to 1000 OPC UA tags at a time from a CSV file:
261
261
262
262
# [Azure CLI](#tab/cli)
263
263
264
-
Use the following command to add a "thermostat" asset by using the Azure CLI. The command adds two tags to the asset by using the `--data` parameter:
264
+
Use the following commands to add a "thermostat" asset by using the Azure CLI. The commands add two tags/datapoints to the asset by using the `point add` command:
265
265
266
266
```azurecli
267
-
az iot ops asset create --name thermostat -g {your resource group name} --cluster {your cluster name} --endpoint opc-ua-connector-0 --description 'A simulated thermostat asset' --data data_source='ns=3;s=FastUInt10', name=temperature --data data_source='ns=3;s=FastUInt100', name='Tag 10'
267
+
# Create the asset
268
+
az iot ops asset create --name thermostat -g {your resource group name} --instance {your instance name} --endpoint opc-ua-connector-0 --description 'A simulated thermostat asset'
269
+
270
+
# Add the datapoints
271
+
az iot ops asset dataset point add --asset thermostat -g {your resource group name} --dataset default --data-source 'ns=3;s=FastUInt10' --name temperature
272
+
az iot ops asset dataset point add --asset thermostat -g {your resource group name} --dataset default --data-source 'ns=3;s=FastUInt100' --name 'Tag 10'
273
+
274
+
# Show the datapoints
275
+
az iot ops asset dataset show --asset thermostat -n default -g {your resource group name}
268
276
```
269
277
270
278
When you create an asset by using the Azure CLI, you can define:
271
279
272
-
- Multiple tags by using the `--data` parameter multiple times.
280
+
- Multiple datapoints/tags by using the `point add` command multiple times.
273
281
- Multiple events by using the `--event` parameter multiple times.
274
282
- Optional information for the asset such as:
275
283
- Manufacturer
@@ -281,7 +289,7 @@ When you create an asset by using the Azure CLI, you can define:
281
289
- Serial number
282
290
- Documentation URI
283
291
- Default values for sampling interval, publishing interval, and queue size.
284
-
-Tag specific values for sampling interval, publishing interval, and queue size.
292
+
-Datapoint specific values for sampling interval, publishing interval, and queue size.
285
293
- Event specific values for sampling publishing interval, and queue size.
286
294
- The observability mode for each tag and event
287
295
@@ -330,7 +338,7 @@ Review your asset and OPC UA tag and event details and make any adjustments you
330
338
331
339
# [Azure CLI](#tab/cli)
332
340
333
-
When you create an asset by using the Azure CLI, you can define multiple events by using the `--event` parameter multiple times. The syntax for the `--event` parameter is similar to the `--data` parameter:
341
+
When you create an asset by using the Azure CLI, you can define multiple events by using the `--event` parameter multiple times:
334
342
335
343
```azurecli
336
344
az iot ops asset create --name thermostat -g {your resource group name} --cluster {your cluster name} --endpoint opc-ua-connector-0 --description 'A simulated thermostat asset' --event event_notifier='ns=3;s=FastUInt12', name=warning
@@ -343,6 +351,8 @@ For each event that you define, you can specify the:
343
351
- Observability mode.
344
352
- Queue size.
345
353
354
+
You can also use the a[z iot ops asset event](/cli/azure/iot/ops/asset/event) commands to add and remove events from an asset.
355
+
346
356
---
347
357
348
358
## Update an asset
@@ -393,7 +403,7 @@ az iot ops asset update --name thermostat --description 'A simulated thermostat
393
403
To list the thermostat asset's tags, use the following command:
394
404
395
405
```azurecli
396
-
az iot ops asset data-point list --asset thermostat -g {your resource group}
406
+
az iot ops asset dataset show --asset thermostat --name default -g {your resource group}
397
407
```
398
408
399
409
To list the thermostat asset's events, use the following command:
@@ -405,10 +415,10 @@ az iot ops asset event list --asset thermostat -g {your resource group}
405
415
To add a new tag to the thermostat asset, use a command like the following example:
0 commit comments