Skip to content

Commit 27df5be

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into WI158655-&-WI158654
2 parents 10e7016 + c0129ef commit 27df5be

File tree

19 files changed

+161
-152
lines changed

19 files changed

+161
-152
lines changed

articles/ai-services/document-intelligence/overview.md

Lines changed: 10 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -107,7 +107,7 @@ Prebuilt models enable you to add intelligent document processing to your apps a
107107
:::row:::
108108
:::column span="":::
109109
:::image type="icon" source="media/overview/icon-insurance-card.png" link="#health-insurance-card":::</br>
110-
[**Health Insurance card**](#health-insurance-card) | Extract health insurance details.
110+
[**Health Insurance card**](#health-insurance-card) | Extract health </br>insurance details.
111111
:::column-end:::
112112
:::column span="":::
113113
:::image type="icon" source="media/overview/icon-contract.png" link="#contract-model":::</br>
@@ -190,12 +190,13 @@ Prebuilt models enable you to add intelligent document processing to your apps a
190190

191191
## Custom models
192192

193-
Custom models are trained using your labeled datasets to extract distinct data from forms and documents, specific to your use cases. Standalone custom models can be combined to create composed models.
193+
* Custom models are trained using your labeled datasets to extract distinct data from forms and documents, specific to your use cases.
194+
* Standalone custom models can be combined to create composed models.
194195

195196
:::row:::
196197
:::column:::
197-
**Extraction models**</br>
198-
Custom extraction models are trained to extract labeled fields from documents.
198+
* **Extraction models**</br>
199+
✔️ Custom extraction models are trained to extract labeled fields from documents.
199200
:::column-end:::
200201
:::row-end:::
201202

@@ -216,15 +217,15 @@ Custom models are trained using your labeled datasets to extract distinct data f
216217

217218
:::row:::
218219
:::column:::
219-
**Classification model**</br>
220-
Custom classifiers analyze input documents to identify document types prior to invoking an extraction model.
220+
* **Classification model**</br>
221+
✔️ Custom classifiers identify document types prior to invoking an extraction model.
221222
:::column-end:::
222223
:::row-end:::
223224

224225
:::row:::
225226
:::column span="":::
226227
:::image type="icon" source="media/overview/icon-custom-classifier.png" link="#custom-classification-model":::</br>
227-
[**Custom classifier**](#custom-classification-model) | Identify designated document types (classes) prior to invoking an extraction model.
228+
[**Custom classifier**](#custom-classification-model) | Identify designated document types (classes) </br>prior to invoking an extraction model.
228229
:::column-end:::
229230
:::row-end:::
230231

@@ -261,8 +262,8 @@ Document Intelligence supports optional features that can be enabled and disable
261262
|prebuilt-tax.us.1099(Variations)|| | || | |O|O||O|O|O||
262263
|prebuilt-contract||||| | |O|O||O|O|O||
263264
|{ customModelName }|||||| |O|O||O|O|O||
264-
|prebuilt-document (deprecated 2023-10-31-preview)|||||||O|O| |O|O|O| |
265-
|prebuilt-businessCard (deprecated 2023-10-31-preview)|| | | | | | | || | | | |
265+
|prebuilt-document (**deprecated </br>2023-10-31-preview**)|||||||O|O| |O|O|O| |
266+
|prebuilt-businessCard (**deprecated </br>2023-10-31-preview**)|| | | | | | | || | | | |
266267

267268
✓ - Enabled</br>
268269
O - Optional</br>

articles/ai-services/document-intelligence/toc.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ items:
2525
href: changelog-release-history.md
2626
- name: Language support
2727
items:
28-
- name: Read Layout OCR models
28+
- name: Document analysis models
2929
displayName: language, locale, handwritten, handwriting, text, detect, detection, general, document, printed
3030
href: language-support-ocr.md?view=doc-intel-4.0.0&preserve-view=true
3131
- name: Prebuilt models

articles/ai-services/speech-service/text-to-speech-avatar/real-time-synthesis-avatar.md

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -21,10 +21,12 @@ In this how-to guide, you learn how to use text to speech avatar (preview) with
2121

2222
To get started, make sure you have the following prerequisites:
2323

24-
- **Azure Subscription:** [Create one for free](https://azure.microsoft.com/free/cognitive-services).
25-
- **Speech Resource:** <a href="https://portal.azure.com/#create/Microsoft.CognitiveServicesSpeechServices" title="Create a Speech resource" target="_blank">Create a speech resource</a> in the Azure portal.
26-
- **Communication Resource:** Create a [Communication resource](https://portal.azure.com/#create/Microsoft.Communication) in the Azure portal (for real-time avatar synthesis only).
27-
- You also need your network relay token for real-time avatar synthesis. After deploying your Communication resource, select **Go to resource** to view the endpoint and connection string under **Settings** -> **Keys** tab, and then follow [Access TURN relays](/azure/ai-services/speech-service/quickstarts/setup-platform#install-the-speech-sdk-for-javascript) to generate the relay token with the endpoint and connection string filled.
24+
- **Azure subscription:** [Create one for free](https://azure.microsoft.com/free/cognitive-services).
25+
- **Speech resource:** <a href="https://portal.azure.com/#create/Microsoft.CognitiveServicesSpeechServices" title="Create a Speech resource" target="_blank">Create a speech resource</a> in the Azure portal. Select "Standard S0" pricing tier if you want to create speech resource to access avatar.
26+
- **Your speech resource key and region:** After your Speech resource is deployed, select **Go to resource** to view and manage keys. For more information about Azure AI services resources, see [Get the keys for your resource](/azure/ai-services/multi-service-resource?pivots=azportal&tabs=windows#get-the-keys-for-your-resource).
27+
- If you build an application of real time avatar:
28+
- **Communication resource:** Create a [Communication resource](https://portal.azure.com/#create/Microsoft.Communication) in the Azure portal (for real-time avatar synthesis only).
29+
- You also need your network relay token for real-time avatar synthesis. After deploying your Communication resource, select **Go to resource** to view the endpoint and connection string under **Settings** -> **Keys** tab, and then follow [Access TURN relays](/azure/ai-services/speech-service/quickstarts/setup-platform#install-the-speech-sdk-for-javascript) to generate the relay token with the endpoint and connection string filled.
2830

2931
## Set up environment
3032

articles/backup/backup-azure-database-postgresql-flex-overview.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -27,10 +27,10 @@ To perform the backup operation:
2727

2828
Once the configuration is complete:
2929

30-
1. The Backup recovery point invokes the backup based on the policy schedules on the ARM API of PostgresFlex server, writing data to a secure blob-container with a SAS for enhanced security.
30+
1. The Backup service invokes the backup based on the policy schedules on the ARM API of PostgresFlex server, writing data to a secure blob-container with a SAS for enhanced security.
3131
1. Backup runs independently preventing disruptions during long-running tasks.
3232
1. The retention and recovery point lifecycles align with the backup policies for effective management.
33-
1. During the restore, the Backup recovery point invokes restore on the ARM API of PostgresFlex server using the SAS for asynchronous, nondisruptive recovery.
33+
1. During the restore, the Backup service invokes restore on the ARM API of PostgresFlex server using the SAS for asynchronous, nondisruptive recovery.
3434

3535
:::image type="content" source="./media/backup-azure-database-postgresql-flex-overview/backup-process.png" alt-text="Diagram showing the backup process.":::
3636

articles/backup/backup-azure-database-postgresql-flex.md

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -38,9 +38,7 @@ To configure backup on the Azure PostgreSQL-flex databases using Azure Backup, f
3838
1. Choose one of the Azure PostgreSQL-Flex servers across subscriptions if they're in the same region as that of the vault. Expand the arrow to see the list of databases within a server.
3939
:::image type="content" source="./media/backup-azure-database-postgresql-flex/select-resources.png" alt-text="Screenshot showing the select resources option.":::
4040

41-
1. After the selection, the validation starts. The backup readiness check ensures the vault has sufficient permissions for backup operations. Resolve any access issues by selecting **Assign missing roles** action button in the top action menu to grant permissions.
42-
:::image type="content" source="./media/backup-azure-database-postgresql-flex/assign-missing-roles.png" alt-text="Screenshot showing the **Assign missing roles** option.":::
43-
41+
1. After the selection, the validation starts. The backup readiness check ensures the vault has sufficient permissions for backup operations. Resolve any access issues by granting appropriate [permissions](/azure/backup/backup-azure-database-postgresql-flex-overview) to the vault MSI and re-triggering the validation.
4442
1. Submit the configure backup operation and track the progress under **Backup instances**.
4543

4644

articles/backup/backup-azure-sql-manage-cli.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -62,7 +62,7 @@ F7c68818-039f-4a0f-8d73-e0747e68a813 Restore (Log) Completed master
6262
To change the policy underlying the SQL backup configuration, use the [az backup policy set](/cli/azure/backup/policy#az-backup-policy-set) command. The name parameter in this command refers to the backup item whose policy you want to change. Here, replace the policy of the SQL database *sqldatabase;mssqlserver;master* with a new policy *newSQLPolicy*. You can create new policies using the [az backup policy create](/cli/azure/backup/policy#az-backup-policy-create) command.
6363

6464
```azurecli-interactive
65-
az backup item set policy --resource-group SQLResourceGroup \
65+
az backup item set-policy --resource-group SQLResourceGroup \
6666
--vault-name SQLVault \
6767
--container-name VMAppContainer;Compute;SQLResourceGroup;testSQLVM \
6868
--policy-name newSQLPolicy \

articles/defender-for-cloud/TOC.yml

Lines changed: 33 additions & 42 deletions
Original file line numberDiff line numberDiff line change
@@ -104,15 +104,12 @@
104104
- name: Planning and operations guide
105105
displayName: guide, planning, roles, policies, recommendations
106106
href: defender-for-cloud-planning-and-operations-guide.md
107-
- name: Protect your VMs
107+
- name: Protect VMs
108108
displayName: manage, access, harden
109109
href: tutorial-protect-resources.md
110110
- name: Investigate and respond to security alerts
111111
displayName: triage, security, alerts, investigate,
112112
href: tutorial-security-incident.md
113-
- name: Manage security policies
114-
displayName: security, policies, edit, disable
115-
href: tutorial-security-policy.md
116113
- name: Investigate the health of your resources
117114
displayName: health, resources, outstanding, security, issues,
118115
href: investigate-resource-health.md
@@ -288,23 +285,9 @@
288285
- name: Track secure score
289286
displayName: secure score, rest api, resource graph
290287
href: secure-score-access-and-track.md
291-
- name: View recommendations and alerts in Windows Admin Center
292-
displayName: windows, admin, center
293-
href: windows-admin-center-integration.md
294288
- name: Integrate security solutions
295289
displayName: security, solutions, integrate, integrated, data sources
296290
href: partner-integration.md
297-
- name: Security graph
298-
items:
299-
- name: Identify and remediate attack paths
300-
displayName: attack paths, paths, investigate, easm,
301-
href: how-to-manage-attack-path.md
302-
- name: Build queries with cloud security explorer
303-
displayName: queries, security explorer, explorer, templates, query
304-
href: how-to-manage-cloud-security-explorer.md
305-
- name: Testing the attack path and security explorer
306-
displayName: attack paths, paths, security explorer, test
307-
href: how-to-test-attack-path-and-security-explorer-with-vulnerable-container-image.md
308291
- name: Data-aware security posture
309292
items:
310293
- name: Enable data-aware security posture
@@ -331,37 +314,45 @@
331314
- name: Exempt resources from recommendations
332315
displayName: disable, resource, exempt, recommendation
333316
href: exempt-resource.md
334-
- name: Manage AWS assessments and standards
335-
displayName: aws, assessments, standards, custom, standard, built-in, query
336-
href: how-to-manage-aws-assessments-standards.md
337-
- name: Manage GCP assessments and standards
338-
displayName: gcp, assessment, standards, built-in, compliance, standard, custom,
339-
assessment, query
340-
href: how-to-manage-gcp-assessments-standards.md
341317
- name: Prevent misconfigurations with Enforce/Deny
342318
displayName: recommendations, enforce, deny
343319
href: prevent-misconfigurations.md
344-
- name: Disable a recommendation
345-
displayName: recommendation, disable, security, policy,
346-
href: tutorial-security-policy.md#disable-a-security-recommendation
347320
- name: Investigate and remediate security posture
348321
items:
349-
- name: Review security recommendations
350-
displayName: security, recommendations, owner, azure, resource, graph, azure
322+
- name: Investigate security recommendations
323+
items:
324+
- name: Review security recommendations
325+
displayName: security, recommendations, owner, azure, resource, graph, azure
351326
resource graph, csv report
352-
href: review-security-recommendations.md
353-
- name: Review exempted resources
354-
href: review-exemptions.md
355-
- name: Remediate recommendations
356-
displayName: remediation, steps, recommendations, fix, actions, activity log
357-
href: implement-security-recommendations.md
358-
- name: Drive remediation with governance rules
359-
displayName: security, posture, recommendation, governance, automated, rules,
327+
href: review-security-recommendations.md
328+
- name: Review exempted resources
329+
href: review-exemptions.md
330+
- name: Remediate recommendations
331+
displayName: remediation, steps, recommendations, fix, actions, activity log
332+
href: implement-security-recommendations.md
333+
- name: Drive remediation with governance rules
334+
displayName: security, posture, recommendation, governance, automated, rules,
360335
owners, status, progress
361-
href: governance-rules.md
362-
- name: Automate remediation responses
363-
displayName: workflow, triggers, logic app, automation, policies, breaking change
364-
href: workflow-automation.md
336+
href: governance-rules.md
337+
- name: Automate remediation responses
338+
displayName: workflow, triggers, logic app, automation, policies, breaking change
339+
href: workflow-automation.md
340+
- name: View recommendations and alerts in Windows Admin Center
341+
displayName: windows, admin, center
342+
href: windows-admin-center-integration.md
343+
- name: Improve regulatory compliance
344+
href: regulatory-compliance-dashboard.md
345+
- name: Investigate with security explorer and attack path
346+
items:
347+
- name: Identify and remediate attack paths
348+
displayName: attack paths, paths, investigate, easm,
349+
href: how-to-manage-attack-path.md
350+
- name: Build queries with cloud security explorer
351+
displayName: queries, security explorer, explorer, templates, query
352+
href: how-to-manage-cloud-security-explorer.md
353+
- name: Test attack paths and security explorer
354+
displayName: attack paths, paths, security explorer, test
355+
href: how-to-test-attack-path-and-security-explorer-with-vulnerable-container-image.md
365356
- name: Built-in security protections
366357
items:
367358
- name: Leverage Purview to protect sensitive data

articles/defender-for-cloud/how-to-manage-attack-path.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title: Identify and remediate attack paths
3-
description: Learn how to manage your attack path analysis and build queries to locate vulnerabilities in your multicloud environment.
2+
title: Identify and remediate attack paths in Microsoft Defender for Cloud
3+
description: Learn how to identify and remediate attack paths in Microsoft Defender for Cloud
44
ms.topic: how-to
55
ms.custom: ignite-2023
66
ms.date: 11/01/2023

articles/defender-for-cloud/how-to-manage-cloud-security-explorer.md

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,6 @@
11
---
2-
title: Build queries with cloud security explorer
3-
4-
description: Learn how to build queries in cloud security explorer to find vulnerabilities that exist on your multicloud environment.
2+
title: Build queries with cloud security explorer in Microsoft Defender for Cloud
3+
description: Learn how to build queries with cloud security explorer in Microsoft Defender for Cloud
54
ms.topic: how-to
65
ms.custom: ignite-2022
76
ms.date: 11/01/2023

articles/defender-for-cloud/how-to-test-attack-path-and-security-explorer-with-vulnerable-container-image.md

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,13 @@
11
---
2-
title: How-to test the attack path and cloud security explorer using a vulnerable container image in Microsoft Defender for Cloud
3-
description: Learn how to test the attack path and security explorer using a vulnerable container image
2+
title: Test attack paths and cloud security explorer in Microsoft Defender for Cloud
3+
description: Learn how to test attack paths and cloud security explorer in Microsoft Defender for Cloud
44
ms.service: defender-for-cloud
55
ms.topic: how-to
66
ms.date: 11/08/2023
77
---
88

9-
# Testing the Attack Path and Security Explorer using a vulnerable container image
9+
# Test attack paths and cloud security explorer
1010

11-
## Observing potential threats in the attack path experience
1211

1312
Attack path analysis is a graph-based algorithm that scans the cloud security graph. The scans expose exploitable paths that attackers might use to breach your environment to reach your high-impact assets. Attack path analysis exposes attack paths and suggests recommendations as to how best remediate issues that break the attack path and prevent successful breach.
1413

0 commit comments

Comments
 (0)