Skip to content

Commit 1e6565a

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into pl-tut-sql
2 parents e1c7a57 + 5b9156b commit 1e6565a

8 files changed

+12
-14
lines changed

.openpublishing.redirection.defender-for-cloud.json

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -586,12 +586,12 @@
586586
"redirect_document_id": true
587587
},
588588
{
589-
"source_path_from_root": "/articles/defender-for-cloud/quickstart-enable-database-protections.md",
590-
"redirect_url": "/azure/defender-for-cloud/defender-for-sql-enable-azure-sql-protections",
589+
"source_path_from_root": "/articles/defender-for-cloud/defender-for-sql-enable-azure-sql-protections.md",
590+
"redirect_url": "/azure/defender-for-cloud/quickstart-enable-database-protections",
591591
"redirect_document_id": true
592592
},
593593
{
594-
"source_path_from_root": "/articles/defender-for-cloud/quickstart-enable-defender-for-cosmos.md ",
594+
"source_path_from_root": "/articles/defender-for-cloud/quickstart-enable-defender-for-cosmos.md",
595595
"redirect_url": "/azure/defender-for-cloud/defender-for-databases-enable-cosmos-protections",
596596
"redirect_document_id": true
597597
},

articles/defender-for-cloud/TOC.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -289,7 +289,7 @@
289289
- name: Database protection
290290
items:
291291
- name: Enable database protection
292-
href: defender-for-sql-enable-azure-sql-protections.md
292+
href: quickstart-enable-database-protections.md
293293
- name: Defender for Azure SQL Databases
294294
items:
295295
- name: Overview

articles/defender-for-cloud/concept-defender-for-cosmos.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ Microsoft Defender for Azure Cosmos DB detects potential SQL injections, known b
1414

1515
Defender for Azure Cosmos DB uses advanced threat detection capabilities, and [Microsoft Threat Intelligence](https://www.microsoft.com/insidetrack/microsoft-uses-threat-intelligence-to-protect-detect-and-respond-to-threats) data to provide contextual security alerts. Those alerts also include steps to mitigate the detected threats and prevent future attacks.
1616

17-
You can [enable protection for all your databases](defender-for-sql-enable-azure-sql-protections.md) (recommended), or [enable Microsoft Defender for Azure Cosmos DB](defender-for-sql-enable-azure-sql-protections.md) at either the subscription level, or the resource level.
17+
You can [enable protection for all your databases](quickstart-enable-database-protections.md) (recommended), or [enable Microsoft Defender for Azure Cosmos DB](quickstart-enable-database-protections.md) at either the subscription level, or the resource level.
1818

1919
Defender for Azure Cosmos DB continually analyzes the telemetry stream generated by the Azure Cosmos DB service. When potentially malicious activities are detected, security alerts are generated. These alerts are displayed in Defender for Cloud together with the details of the suspicious activity along with the relevant investigation steps, remediation actions, and security recommendations.
2020

@@ -58,4 +58,4 @@ Threat intelligence security alerts are triggered for:
5858
In this article, you learned about Microsoft Defender for Azure Cosmos DB.
5959

6060
> [!div class="nextstepaction"]
61-
> [Enable Microsoft Defender for Azure Cosmos DB](defender-for-sql-enable-azure-sql-protections.md)
61+
> [Enable Microsoft Defender for Azure Cosmos DB](quickstart-enable-database-protections.md)

articles/defender-for-cloud/quickstart-onboard-aws.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -54,7 +54,7 @@ You can learn more from the product manager about Microsoft Defender for Cloud's
5454

5555
- **To enable the Defender for SQL plan**, you'll need:
5656

57-
- Microsoft Defender for SQL enabled on your subscription. Learn how to [enable protection on all of your databases](defender-for-sql-enable-azure-sql-protections.md).
57+
- Microsoft Defender for SQL enabled on your subscription. Learn how to [enable protection on all of your databases](quickstart-enable-database-protections.md).
5858

5959
- An active AWS account, with EC2 instances running SQL server or RDS Custom for SQL Server.
6060

articles/defender-for-cloud/quickstart-onboard-gcp.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -194,7 +194,7 @@ Connect your GCP VM instances to Azure Arc in order to have full visibility to M
194194
Microsoft Defender for SQL brings threat detection and vulnerability assessment to your GCP VM instances.
195195
To have full visibility to Microsoft Defender for SQL security content, ensure you have the following requirements configured:
196196

197-
- Microsoft SQL servers on machines plan enabled on your subscription. Learn how to enable plan in the [Enable enhanced security features](defender-for-sql-enable-azure-sql-protections.md) article.
197+
- Microsoft SQL servers on machines plan enabled on your subscription. Learn how to enable plan in the [Enable enhanced security features](quickstart-enable-database-protections.md) article.
198198

199199
- Azure Arc for servers installed on your VM instances.
200200
- **(Recommended) Auto-provisioning** - Auto-provisioning is enabled by default in the onboarding process and requires owner permissions on the subscription. Arc auto-provisioning process is using the OS config agent on GCP end. Learn more about the [OS config agent availability on GCP machines](https://cloud.google.com/compute/docs/images/os-details#vm-manager).

articles/defender-for-cloud/release-notes.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -407,7 +407,7 @@ Learn more at [Overview of Microsoft Defender for Azure Cosmos DB](concept-defen
407407

408408
We're also introducing a new enablement experience for database security. You can now enable Microsoft Defender for Cloud protection on your subscription to protect all database types, such as, Azure Cosmos DB, Azure SQL Database, Azure SQL servers on machines, and Microsoft Defender for open-source relational databases through one enablement process. Specific resource types can be included, or excluded by configuring your plan.
409409

410-
Learn how to [enable your database security at the subscription level](defender-for-sql-enable-azure-sql-protections.md#enable-database-protection-on-your-subscription).
410+
Learn how to [enable your database security at the subscription level](quickstart-enable-database-protections.md#enable-database-protection-on-your-subscription).
411411

412412
### Threat protection for Google Kubernetes Engine (GKE) clusters
413413

articles/private-link/tutorial-private-endpoint-webapp-portal.md

Lines changed: 3 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -50,7 +50,7 @@ The bastion host will be used to connect securely to the virtual machine for tes
5050
|------------------|-----------------------------------------------------------------|
5151
| **Project Details** | |
5252
| Subscription | Select your Azure subscription. |
53-
| Resource Group | Select **Create new**. </br> For **Name**, enter **myResourceGroup**. </br> Select **OK**. |
53+
| Resource Group | Select **Create new**. </br> Enter **myResourceGroup** in **Name**. </br> Select **OK**. |
5454
| **Instance details** | |
5555
| Name | Enter **myVNet**. |
5656
| Region | Select **East US**. |
@@ -84,7 +84,6 @@ The bastion host will be used to connect securely to the virtual machine for tes
8484
| AzureBastionSubnet address space | Enter **10.1.1.0/24**. |
8585
| Public IP Address | Select **Create new**. </br> For **Name**, enter **myBastionIP**. </br> Select **OK**. |
8686

87-
8887
8. Select the **Review + create** tab or select the **Review + create** button.
8988

9089
9. Select **Create**.
@@ -93,7 +92,6 @@ The bastion host will be used to connect securely to the virtual machine for tes
9392

9493
In this section, you'll create a virtual machine that will be used to test the private endpoint.
9594

96-
9795
1. On the upper-left side of the portal, select **Create a resource** > **Compute** > **Virtual machine** or search for **Virtual machine** in the search box.
9896

9997
2. In **Create a virtual machine**, type or select the values in the **Basics** tab:
@@ -155,7 +153,7 @@ In this section, you'll create a web app.
155153
| Operating System | Select **Windows**. |
156154
| Region | Select **East US**. |
157155
| **App Service Plan** | |
158-
| Windows Plan (East US) | Select **Create new**. </br> Enter **myServicePlan** in **Name**. </br> select **OK**. |
156+
| Windows Plan (East US) | Select **Create new**. </br> Enter **myServicePlan** in **Name**. </br> Select **OK**. |
159157
| Sku and size | Select **Change size**. </br> Select **P2V2** in the **Spec Picker** page. </br> Select **Apply**. |
160158
| **Zone redundancy** | |
161159
| Zone redundancy | Select **Disabled**. |
@@ -222,7 +220,7 @@ In this section, you'll use the virtual machine you created in the previous step
222220
223221
A private IP address of **10.1.0.5** is returned for the web app name. This address is in **mySubnet** subnet of **myVNet** virtual network you created previously.
224222
225-
9. Open Internet Explorer, and enter the url of your web app, `https://<webapp-name>.azurewebsites.net`.
223+
9. Open Internet Explorer, and enter the URL of your web app, `https://<webapp-name>.azurewebsites.net`.
226224
227225
10. Verify you receive the default web app page.
228226

0 commit comments

Comments
 (0)