Skip to content

Commit 240702c

Browse files
Learn Build Service GitHub AppLearn Build Service GitHub App
authored andcommitted
Merging changes synced from https://github.com/MicrosoftDocs/azure-docs-pr (branch live)
2 parents 8fa5c2e + 38a0e1f commit 240702c

File tree

3 files changed

+15
-6
lines changed

3 files changed

+15
-6
lines changed

articles/azure-monitor/alerts/alerts-create-log-alert-rule.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -106,7 +106,7 @@ Alerts triggered by these alert rules contain a payload that uses the [common al
106106
107107
> [!NOTE]
108108
> There are some limitations to using a <a name="frequency">one minute</a> alert rule frequency. When you set the alert rule frequency to one minute, an internal manipulation is performed to optimize the query. This manipulation can cause the query to fail if it contains unsupported operations. The following are the most common reasons a query are not supported:
109-
> * The query contains the **search**, **union** or **take** (limit) operations
109+
> * The query contains the **search**, **union** * or **take** (limit) operations
110110
> * The query contains the **ingestion_time()** function
111111
> * The query uses the **adx** pattern
112112
> * The query calls a function that calls other tables
@@ -191,4 +191,4 @@ Alerts triggered by these alert rules contain a payload that uses the [common al
191191
192192
## Next steps
193193
- [Log alert query samples](./alerts-log-alert-query-samples.md)
194-
- [View and manage your alert instances](alerts-manage-alert-instances.md)
194+
- [View and manage your alert instances](alerts-manage-alert-instances.md)

articles/azure-monitor/logs/customer-managed-keys.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Azure Monitor customer-managed key
33
description: Information and steps to configure Customer-managed key to encrypt data in your Log Analytics workspaces using an Azure Key Vault key.
44
ms.topic: conceptual
55
ms.reviewer: yossiy
6-
ms.date: 06/01/2023
6+
ms.date: 01/04/2024
77
ms.custom: devx-track-azurepowershell, devx-track-azurecli
88

99
---
@@ -187,7 +187,7 @@ Content-type: application/json
187187
},
188188
"sku": {
189189
"name": "CapacityReservation",
190-
"capacity": 500
190+
"capacity": 100
191191
}
192192
}
193193
```
@@ -207,7 +207,7 @@ Response to GET request when key update is completed:
207207
},
208208
"sku": {
209209
"name": "capacityreservation",
210-
"capacity": 500
210+
"capacity": 100
211211
},
212212
"properties": {
213213
"keyVaultProperties": {
@@ -224,7 +224,7 @@ Response to GET request when key update is completed:
224224
"isAvailabilityZonesEnabled": false,
225225
"capacityReservationProperties": {
226226
"lastSkuUpdate": "last-sku-modified-date",
227-
"minCapacity": 500
227+
"minCapacity": 100
228228
}
229229
},
230230
"id": "/subscriptions/subscription-id/resourceGroups/resource-group-name/providers/Microsoft.OperationalInsights/clusters/cluster-name",

articles/defender-for-cloud/release-notes.md

Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -24,13 +24,22 @@ If you're looking for items older than six months, you can find them in the [Arc
2424

2525
|Date | Update |
2626
|----------|----------|
27+
| January 31 | [New insight for active repositories in Cloud Security Explorer](#new-insight-for-active-repositories-in-cloud-security-explorer) |
2728
| January 25 | [Deprecation of security alerts and update of security alerts to informational severity level](#deprecation-of-security-alerts-and-update-of-security-alerts-to-informational-severity-level) |
2829
| January 24 | [Agentless container posture for GCP in Defender for Containers and Defender CSPM (Preview)](#agentless-container-posture-for-gcp-in-defender-for-containers-and-defender-cspm-preview) |
2930
| January 16 | [Public preview of agentless malware scanning for servers](#public-preview-of-agentless-malware-scanning-for-servers)|
3031
| January 15 | [General availability of Defender for Cloud's integration with Microsoft Defender XDR](#general-availability-of-defender-for-clouds-integration-with-microsoft-defender-xdr) |
3132
| January 12 | [DevOps security Pull Request annotations are now enabled by default for Azure DevOps connectors](#devops-security-pull-request-annotations-are-now-enabled-by-default-for-azure-devops-connectors) |
3233
| January 4 | [Recommendations released for preview: Nine new Azure security recommendations](#recommendations-released-for-preview-nine-new-azure-security-recommendations) |
3334

35+
### New insight for active repositories in Cloud Security Explorer
36+
37+
January 31, 2024
38+
39+
A new insight for Azure DevOps repositories has been added to the Cloud Security Explorer to indicate whether repositories are active. This insight indicates that the code repository is not archived or disabled, meaning that write access to code, builds, and pull requests is still available for users. Archived and disabled repositories might be considered lower priority as the code is not typically used in active deployments.
40+
41+
To test out the query through Cloud Security Explorer, use [this query link](https://ms.portal.azure.com#view/Microsoft_Azure_Security/SecurityGraph.ReactView/query/%7B%22type%22%3A%22securitygraphquery%22%2C%22version%22%3A2%2C%22properties%22%3A%7B%22source%22%3A%7B%22type%22%3A%22datasource%22%2C%22properties%22%3A%7B%22sources%22%3A%5B%7B%22type%22%3A%22entity%22%2C%22properties%22%3A%7B%22source%22%3A%22azuredevopsrepository%22%7D%7D%5D%2C%22conditions%22%3A%7B%22type%22%3A%22conditiongroup%22%2C%22properties%22%3A%7B%22operator%22%3A%22and%22%2C%22conditions%22%3A%5B%7B%22type%22%3A%22insights%22%2C%22properties%22%3A%7B%22name%22%3A%226b8f221b-c0ce-48e3-9fbb-16f917b1c095%22%7D%7D%5D%7D%7D%7D%7D%7D%7D)
42+
3443
### Deprecation of security alerts and update of security alerts to informational severity level
3544

3645
January 25, 2024

0 commit comments

Comments
 (0)