Skip to content

Commit 219e856

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into digital-twins-postman
2 parents d760f63 + 9439293 commit 219e856

File tree

48 files changed

+1697
-226
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

48 files changed

+1697
-226
lines changed

articles/active-directory/conditional-access/app-sign-in-risk.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -209,7 +209,7 @@ When no longer needed, delete the test user, the Tor Browser and the conditional
209209

210210
![Multi-factor authentication](./media/app-sign-in-risk/33.png)
211211

212-
- For instructions to remove the Tor Browser, see [Uninstalling](https://tb-manual.torproject.org/en-US/uninstalling.html).
212+
- For instructions to remove the Tor Browser, see [Uninstalling](https://tb-manual.torproject.org/uninstalling/).
213213

214214
## Next steps
215215

articles/active-directory/fundamentals/active-directory-deployment-checklist-p2.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -16,19 +16,19 @@ ms.reviewer:
1616
---
1717
# Azure Active Directory Premium P2 licensing feature checklist
1818

19-
It can seem daunting to deploy Azure Active Directory (Azure AD) for your organization and keep it secure. This article identifies some common tasks that customers find helpful to complete over the course of 30 days, 90 days, or beyond to enhance their security posture. Even organizations who have already deployed Azure AD can use this checklist to ensure they are getting the most out of their investment.
19+
It can seem overwhelming to deploy Azure Active Directory (Azure AD) for your organization and keep it secure. This article identifies some common tasks that customers find helpful. Customers typically complete these tasks over the course of 30 days, 90 days, or beyond to enhance their security posture. Even organizations who have already deployed Azure AD can use this checklist to make sure they're getting the most out of their investment.
2020

2121
A well-planned and executed identity infrastructure paves the way for more secure access to your productivity workloads and data only by authenticated users and devices.
2222

2323
## Prerequisites
2424

25-
This guide assumes you have Azure AD Premium P2 licenses, Enterprise Mobility + Security E5, Microsoft 365 E5, or an equivalent license bundle.
25+
This guide assumes you have Azure AD Premium P2 licenses, Enterprise Mobility + Security E5, Microsoft 365 E5, or a similar license bundle.
2626

2727
[Azure AD licensing](https://azure.microsoft.com/pricing/details/active-directory/)
2828

29-
[Microsoft 365 Enterprise](https://www.microsoft.com/licensing/product-licensing/microsoft-365-enterprise.aspx)
29+
[Microsoft 365 Enterprise](https://www.microsoft.com/en-us/licensing/product-licensing/microsoft-365-enterprise)
3030

31-
[Enterprise Mobility + Security](https://www.microsoft.com/licensing/product-licensing/enterprise-mobility-security.aspx)
31+
[Enterprise Mobility + Security](https://www.microsoft.com/en-us/licensing/product-licensing/enterprise-mobility-security)
3232

3333
## Plan and deploy: Day 1-30
3434

@@ -68,7 +68,7 @@ This guide assumes you have Azure AD Premium P2 licenses, Enterprise Mobility +
6868
- [Allow or block invitations to B2B users from specific organizations](../b2b/allow-deny-list.md)
6969
- [Grant B2B users in Azure AD access to your on-premises applications](../b2b/hybrid-cloud-to-on-premises.md)
7070
- Make decisions about user lifecycle management strategy
71-
- [Decide on device managment strategy](../devices/overview.md)
71+
- [Decide on device management strategy](../devices/overview.md)
7272
- [Usage scenarios and deployment considerations for Azure AD Join](../devices/azureadjoin-plan.md)
7373
- [Manage Windows Hello for Business in your organization](/windows/security/identity-protection/hello-for-business/hello-manage-in-organization)
7474

articles/active-directory/hybrid/reference-connect-germany.md

Lines changed: 6 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -22,8 +22,9 @@ ms.author: billmath
2222
# Azure AD Connect in Microsoft Cloud Germany - Public Preview
2323
## Introduction
2424
Azure AD Connect provides synchronization between your on-premises Active Directory and Azure Active Directory.
25-
Currently, many of the scenarios in [Microsoft Cloud Germany](https://www.microsoft.com/de-de/cloud/deutschland/default.aspx) must be done by the operator.
26-
When using Microsoft Cloud Germany, you must be aware of the following:
25+
Currently, many of the scenarios in [Microsoft Cloud Germany](https://azure.microsoft.com/global-infrastructure/germany/
26+
) must be done by the operator.
27+
When using Microsoft Cloud Germany, you must be aware of the following information:
2728

2829
* The following URLs must be opened on a proxy server for synchronization to occur successfully:
2930

@@ -37,13 +38,13 @@ When using Microsoft Cloud Germany, you must be aware of the following:
3738
You can download Azure AD Connect from the Azure AD Connect blade within the portal. Use the instructions below to locate the Azure AD Connect blade.
3839

3940
### The Azure AD Connect Blade
40-
Once you have signed in to the Azure portal, do the following:
41+
Once you've signed in to the Azure portal:
4142

4243
1. Go to Browse
4344
2. Select Azure Active Directory
4445
3. Then select Azure AD Connect
4546

46-
You should see the following:
47+
You'll see these details:
4748

4849
![Azure AD Connect Blade](./media/reference-connect-germany/germany1.png)
4950

@@ -59,5 +60,5 @@ The following table describes the features shown in the blade.
5960
To install Azure AD Connect, you can use the documentation [here](how-to-connect-install-roadmap.md).
6061

6162
## Advanced features and Additional Information
62-
For additional information and guidance on custom settings or advanced configurations, start with [Integrating your on-premises identities with Azure Active Directory](whatis-hybrid-identity.md). This page provides information and links to additional guidance.
63+
For additional information about custom settings or advanced configurations, go to [Integrating your on-premises identities with Azure Active Directory](whatis-hybrid-identity.md). This page provides information and links to additional guidance.
6364

articles/active-directory/managed-identities-azure-resources/tutorial-linux-vm-access-arm.md

Lines changed: 0 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -30,16 +30,8 @@ You learn how to:
3030
3131
## Prerequisites
3232

33-
[!INCLUDE [msi-qs-configure-prereqs](../../../includes/active-directory-msi-qs-configure-prereqs.md)]
34-
3533
[!INCLUDE [msi-tut-prereqs](../../../includes/active-directory-msi-tut-prereqs.md)]
3634

37-
- [Sign in to Azure portal](https://portal.azure.com)
38-
39-
- [Create a Linux virtual machine](/azure/virtual-machines/linux/quick-create-portal)
40-
41-
- [Enable system-assigned managed identity on your virtual machine](/azure/active-directory/managed-service-identity/qs-configure-portal-windows-vm#enable-system-assigned-identity-on-an-existing-vm)
42-
4335
## Grant your VM access to a Resource Group in Azure Resource Manager
4436

4537
Using managed identities for Azure resources, your code can get access tokens to authenticate to resources that support Azure AD authentication. The Azure Resource Manager API supports Azure AD authentication. First, we need to grant this VM's identity access to a resource in Azure Resource Manager, in this case the Resource Group in which the VM is contained.

articles/active-directory/managed-identities-azure-resources/tutorial-windows-vm-access-arm.md

Lines changed: 0 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -29,16 +29,8 @@ This quickstart shows you how to access the Azure Resource Manager API using a W
2929
3030
## Prerequisites
3131

32-
[!INCLUDE [msi-qs-configure-prereqs](../../../includes/active-directory-msi-qs-configure-prereqs.md)]
33-
3432
[!INCLUDE [msi-tut-prereqs](../../../includes/active-directory-msi-tut-prereqs.md)]
3533

36-
- [Sign in to Azure portal](https://portal.azure.com)
37-
38-
- [Create a Windows virtual machine](/azure/virtual-machines/windows/quick-create-portal)
39-
40-
- [Enable system-assigned managed identity on your virtual machine](/azure/active-directory/managed-service-identity/qs-configure-portal-windows-vm#enable-system-assigned-identity-on-an-existing-vm)
41-
4234
## Grant your VM access to a resource group in Resource Manager
4335
Using managed identities for Azure resources, your code can get access tokens to authenticate to resources that support Azure AD authentication. The Azure Resource Manager supports Azure AD authentication. First, we need to grant this VM’s system-assigned managed identity access to a resource in Resource Manager, in this case the Resource Group in which the VM is contained.
4436

articles/application-gateway/toc.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -29,8 +29,6 @@
2929
href: tutorial-url-redirect-cli.md
3030
- name: Autoscaling and zone redundant
3131
href: tutorial-autoscale-ps.md
32-
- name: Troubleshoot an Application Gateway in Aure – ILB ASE
33-
href: create-gateway-internal-load-balancer-app-service-environment.md
3432
- name: Samples
3533
items:
3634
- name: Azure PowerShell
@@ -148,6 +146,8 @@
148146
href: application-gateway-create-probe-ps.md
149147
- name: Troubleshoot
150148
items:
149+
- name: Troubleshoot an Application Gateway in Aure – ILB ASE
150+
href: create-gateway-internal-load-balancer-app-service-environment.md
151151
- name: Troubleshoot Bad Gateway (502) errors
152152
href: application-gateway-troubleshooting-502.md
153153
- name: Diagnostics

articles/application-gateway/waf-overview.md

Lines changed: 19 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -4,21 +4,25 @@ description: This article provides an overview of web application firewall (WAF)
44
services: application-gateway
55
author: vhorne
66
ms.service: application-gateway
7-
ms.date: 11/7/2018
7+
ms.date: 11/16/2018
88
ms.author: amsriva
99
---
1010

1111
# Web application firewall (WAF)
1212

13-
Web application firewall (WAF) is a feature of Application Gateway that provides centralized protection of your web applications from common exploits and vulnerabilities.
13+
Web application firewall (WAF) is a feature of Application Gateway that provides centralized protection of your web applications from common exploits and vulnerabilities.
1414

15-
Web applications are increasingly targets of malicious attacks that exploit common known vulnerabilities. Common among these exploits are SQL injection attacks, cross site scripting attacks to name a few. Preventing such attacks in application code can be challenging and may require rigorous maintenance, patching and monitoring at multiple layers of the application topology. A centralized web application firewall helps make security management much simpler and gives better assurance to application administrators against threats or intrusions. A WAF solution can also react to a security threat faster by patching a known vulnerability at a central location versus securing each of individual web applications. Existing application gateways can be converted to a web application firewall enabled application gateway easily.
15+
Web applications are increasingly targets of malicious attacks that exploit common known vulnerabilities. Common among these exploits are SQL injection attacks, and cross site scripting attacks to name a few.
16+
17+
Preventing such attacks in application code can be challenging and may require rigorous maintenance, patching and monitoring at multiple layers of the application topology. A centralized web application firewall helps make security management much simpler and gives better assurance to application administrators against threats or intrusions. A WAF solution can also react to a security threat faster by patching a known vulnerability at a central location, instead of securing each of individual web applications. Existing application gateways can be converted to a web application firewall enabled application gateway easily.
1618

1719
WAF is based on rules from the [OWASP core rule sets](https://www.owasp.org/index.php/Category:OWASP_ModSecurity_Core_Rule_Set_Project) 3.0 or 2.2.9. It automatically updates to include protection against new vulnerabilities, with no additional configuration needed.
1820

1921
![imageURLroute](./media/waf-overview/WAF1.png)
2022

21-
Application Gateway operates as an application delivery controller (ADC) and offers SSL termination, cookie-based session affinity, round-robin load distribution, content-based routing, ability to host multiple websites and security enhancements. Security enhancements offered by Application Gateway include SSL policy management, end to end SSL support. Application security is now strengthened by WAF (web application firewall) being directly integrated into the ADC offering. This provides an easy to configure central location to manage and protect your web applications against common web vulnerabilities.
23+
Application Gateway operates as an application delivery controller (ADC) and offers SSL termination, cookie-based session affinity, round-robin load distribution, content-based routing, ability to host multiple websites, and security enhancements.
24+
25+
Security enhancements offered by Application Gateway include SSL policy management, and end to end SSL support. Application security is now strengthened by WAF (web application firewall) being directly integrated into the ADC offering. This provides an easy to configure central location to manage and protect your web applications against common web vulnerabilities.
2226

2327
## Benefits
2428

@@ -48,11 +52,11 @@ The following are the core benefits that Application Gateway and web application
4852
- Protection against HTTP protocol violations
4953
- Protection against HTTP protocol anomalies such as missing host user-agent and accept headers
5054
- Prevention against bots, crawlers, and scanners
51-
- Detection of common application misconfigurations (that is, Apache, IIS, etc.)
55+
- Detection of common application misconfigurations (for example, Apache, IIS, and so on)
5256

5357
### Public preview features
5458

55-
The current WAF public preview SKU incudes the following features:
59+
The current WAF public preview SKU includes the following features:
5660

5761
- **Request size limits** - Web Application Firewall allows users to configure request size limits within lower and upper bounds.
5862
- **Exclusion lists** - WAF exclusion lists allow users to omit certain request attributes from a WAF evaluation. A common example is Active Directory inserted tokens that are used for authentication or password fields.
@@ -75,9 +79,9 @@ Web application firewall comes preconfigured with CRS 3.0 by default or you can
7579
- Protection against HTTP protocol violations
7680
- Protection against HTTP protocol anomalies such as missing host user-agent and accept headers
7781
- Prevention against bots, crawlers, and scanners
78-
- Detection of common application misconfigurations (i.e. Apache, IIS, etc.)
82+
- Detection of common application misconfigurations (for example, Apache, IIS, etc.)
7983

80-
For a more detailed list of rules and their protections see [Core rule sets](#core-rule-sets).
84+
For a more detailed list of rules and their protections, see [Core rule sets](#core-rule-sets).
8185

8286

8387
#### OWASP_3.0
@@ -86,7 +90,7 @@ The 3.0 core rule set provided has 13 rule groups as shown in the following tabl
8690

8791
|RuleGroup|Description|
8892
|---|---|
89-
|**[REQUEST-911-METHOD-ENFORCEMENT](application-gateway-crs-rulegroups-rules.md#crs911)**|Contains rules to lock down methods (PUT, PATCH< ..)|
93+
|**[REQUEST-911-METHOD-ENFORCEMENT](application-gateway-crs-rulegroups-rules.md#crs911)**|Contains rules to lock down methods (PUT, PATCH)|
9094
|**[REQUEST-913-SCANNER-DETECTION](application-gateway-crs-rulegroups-rules.md#crs913)**| Contains rules to protect against port and environment scanners.|
9195
|**[REQUEST-920-PROTOCOL-ENFORCEMENT](application-gateway-crs-rulegroups-rules.md#crs920)**|Contains rules to protect against protocol and encoding issues.|
9296
|**[REQUEST-921-PROTOCOL-ATTACK](application-gateway-crs-rulegroups-rules.md#crs921)**|Contains rules to protect against header injection, request smuggling, and response splitting|
@@ -119,18 +123,18 @@ The 2.2.9 core rule set provided has 10 rule groups as shown in the following ta
119123

120124
Application Gateway WAF can be configured to run in the following two modes:
121125

122-
* **Detection mode** – When configured to run in detection mode, Application Gateway WAF monitors and logs in all threat alerts to a log file. Logging diagnostics for Application Gateway should be turned on using the **Diagnostics** section. You also need to ensure that the WAF log is selected and turned on. When running in detection mode web application firewall does not block incoming requests.
126+
* **Detection mode** – When configured to run in detection mode, Application Gateway WAF monitors and logs all threat alerts to a log file. Logging diagnostics for Application Gateway should be turned on using the **Diagnostics** section. You also need to ensure that the WAF log is selected and turned on. When running in detection mode web application firewall does not block incoming requests.
123127
* **Prevention mode** – When configured to run in prevention mode, Application Gateway actively blocks intrusions and attacks detected by its rules. The attacker receives a 403 unauthorized access exception and the connection is terminated. Prevention mode continues to log such attacks in the WAF logs.
124128

125129
### <a name="application-gateway-waf-reports"></a>WAF Monitoring
126130

127-
Monitoring the health of your application gateway is important. Monitoring the health of your web application firewall and the applications that it protects are provided through logging and integration with Azure Monitor, Azure Security Center (coming soon), and Log Analytics.
131+
Monitoring the health of your application gateway is important. Monitoring the health of your web application firewall and the applications that it protects are provided through logging and integration with Azure Monitor, Azure Security Center, and Log Analytics.
128132

129133
![diagnostics](./media/waf-overview/diagnostics.png)
130134

131135
#### Azure Monitor
132136

133-
Each application gateway log is integrated with [Azure Monitor](../monitoring-and-diagnostics/monitoring-overview.md). This allows you to track diagnostic information including WAF alerts and logs. This capability is provided within the Application Gateway resource in the portal under the **Diagnostics** tab or through the Azure Monitor service directly. To learn more about enabling diagnostic logs for application gateway see [Application Gateway diagnostics](application-gateway-diagnostics.md)
137+
Each application gateway log is integrated with [Azure Monitor](../monitoring-and-diagnostics/monitoring-overview.md). This allows you to track diagnostic information including WAF alerts and logs. This capability is provided within the Application Gateway resource in the portal under the **Diagnostics** tab or through the Azure Monitor service directly. To learn more about enabling diagnostic logs for application gateway, see [Application Gateway diagnostics](application-gateway-diagnostics.md)
134138

135139
#### Azure Security Center
136140

@@ -174,7 +178,9 @@ Application Gateway WAF provides detailed reporting on each threat it detects. L
174178

175179
## Application Gateway WAF SKU pricing
176180

177-
Web application firewall is available under a new a WAF SKU. This SKU is available only in Azure Resource Manager provisioning model and not under the classic deployment model. Additionally WAF SKU comes only in medium and large application gateway instance sizes. All the limits for application gateway also apply to the WAF SKU. Pricing is based on per hour gateway instance charge and data processing charge. Per hour gateway pricing for WAF SKU is different from Standard SKU charges and can be found at [Application Gateway pricing details](https://azure.microsoft.com/pricing/details/application-gateway/). Data processing charges remain the same. There is no per rule or rule group charges. You can protect multiple web applications behind the same web application firewall and there are no additional charges for supporting multiple applications.
181+
Web application firewall is available under a new a WAF SKU. This SKU is available only in Azure Resource Manager provisioning model and not under the classic deployment model. Additionally, the WAF SKU comes only in medium and large application gateway instance sizes. All the limits for application gateway also apply to the WAF SKU.
182+
183+
Pricing is based on per hour gateway instance charge and data processing charge. Per hour gateway pricing for WAF SKU is different from Standard SKU charges and can be found at [Application Gateway pricing details](https://azure.microsoft.com/pricing/details/application-gateway/). Data processing charges remain the same. There's no per rule or rule group charges. You can protect multiple web applications behind the same web application firewall and you are not charged for supporting multiple applications.
178184

179185
## Next steps
180186

265 KB
Loading
94.5 KB
Loading
6.49 KB
Loading

0 commit comments

Comments
 (0)