Skip to content

Commit 2b094b8

Browse files
committed
fix
2 parents 718c520 + 01affc8 commit 2b094b8

File tree

3,238 files changed

+21527
-12874
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

3,238 files changed

+21527
-12874
lines changed

.openpublishing.redirection.data-factory.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -14,6 +14,11 @@
1414
"source_path_from_root": "/articles/data-factory/continuous-integration-deployment.md",
1515
"redirect_url": "/azure/data-factory/continuous-integration-delivery",
1616
"redirect_document_id": false
17+
},
18+
{
19+
"source_path_from_root": "/articles/data-factory/continuous-integration-deployment-improvements.md",
20+
"redirect_url": "/azure/data-factory/continuous-integration-delivery-improvements",
21+
"redirect_document_id": false
1722
}
1823
]
1924
}

.openpublishing.redirection.defender-for-cloud.json

Lines changed: 390 additions & 40 deletions
Large diffs are not rendered by default.

.openpublishing.redirection.json

Lines changed: 106 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -35,6 +35,11 @@
3535
"redirect_url": "/azure/static-web-apps/build-configuration",
3636
"redirect_document_id": true
3737
},
38+
{
39+
"source_path": "articles/service-fabric/how-to-enable-managed-cluster-disk-encryption.md",
40+
"redirect_url": "/azure/service-fabric/how-to-managed-cluster-enable-disk-encryption",
41+
"redirect_document_id": false
42+
},
3843
{
3944
"source_path": "articles/service-fabric-mesh/move-across-regions.md",
4045
"redirect_url": "/previous-versions/azure/service-fabric-mesh/move-across-regions",
@@ -419,10 +424,45 @@
419424
"redirect_document_id": false
420425
},
421426
{
427+
"source_path_from_root": "/articles/frontdoor/standard-premium/concept-rule-set-match-conditions.md",
428+
"redirect_url": "/azure/frontdoor/rules-match-conditions",
429+
"redirect_document_id": false
430+
},
431+
{
432+
"source_path_from_root": "/articles/frontdoor/front-door-rules-engine-match-conditions.md",
433+
"redirect_url": "/azure/frontdoor/rules-match-conditions",
434+
"redirect_document_id": false
435+
},
436+
{
437+
"source_path_from_root": "/articles/frontdoor/standard-premium/concept-rule-set-actions.md",
438+
"redirect_url": "/azure/frontdoor/rules-actions",
439+
"redirect_document_id": false
440+
},
441+
{
442+
"source_path_from_root": "/articles/frontdoor/front-door-rules-engine-actions.md",
443+
"redirect_url": "/azure/frontdoor/rules-actions",
444+
"redirect_document_id": false
445+
},
446+
{
422447
"source_path_from_root": "/articles/frontdoor/standard-premium/geo-filtering.md",
423448
"redirect_url": "/articles/frontdoor/front-door-geo-filtering",
424449
"redirect_document_id": false
425450
},
451+
{
452+
"source_path_from_root": "/articles/frontdoor/standard-premium/edge-locations.md",
453+
"redirect_url": "/azure/frontdoor/edge-locations-by-region",
454+
"redirect_document_id": false
455+
},
456+
{
457+
"source_path_from_root": "/articles/frontdoor/standard-premium/edge-locations-by-abbreviation.md",
458+
"redirect_url": "/azure/frontdoor/edge-locations-by-abbreviation",
459+
"redirect_document_id": false
460+
},
461+
{
462+
"source_path_from_root": "/articles/frontdoor/edge-locations-abbreviation.md",
463+
"redirect_url": "/azure/frontdoor/edge-locations-by-abbreviation",
464+
"redirect_document_id": false
465+
},
426466
{
427467
"source_path_from_root": "/articles/azure-sql/database/doc-changes-updates-release-notes.md",
428468
"redirect_url": "/azure/azure-sql/database/doc-changes-updates-release-notes-whats-new",
@@ -748,6 +788,16 @@
748788
"redirect_url": "/azure",
749789
"redirect_document_id": false
750790
},
791+
{
792+
"source_path_from_root": "/articles/azure-sql/virtual-machines/windows/availability-group-manually-configure-prerequisites-tutorial.md",
793+
"redirect_url": "/azure/azure-sql/virtual-machines/windows/availability-group-manually-configure-prerequisites-tutorial-single-subnet",
794+
"redirect_document_id": true
795+
},
796+
{
797+
"source_path_from_root": "/articles/azure-sql/virtual-machines/windows/availability-group-manually-configure-tutorial.md",
798+
"redirect_url": "/azure/azure-sql/virtual-machines/windows/availability-group-manually-configure-tutorial-single-subnet",
799+
"redirect_document_id": true
800+
},
751801
{
752802
"source_path_from_root": "/articles/active-directory-b2c/active-directory-b2c-landing-custom.md",
753803
"redirect_url": "/azure/active-directory-b2c",
@@ -26828,7 +26878,12 @@
2682826878
},
2682926879
{
2683026880
"source_path_from_root": "/articles/spring-cloud/spring-cloud-howto-persistent-storage.md",
26831-
"redirect_url": "/azure/spring-cloud/how-to-persistent-storage",
26881+
"redirect_url": "/azure/spring-cloud/how-to-built-in-persistent-storage",
26882+
"redirect_document_id": false
26883+
},
26884+
{
26885+
"source_path_from_root": "/articles/spring-cloud/how-to-persistent-storage.md",
26886+
"redirect_url": "/azure/spring-cloud/how-to-built-in-persistent-storage",
2683226887
"redirect_document_id": false
2683326888
},
2683426889
{
@@ -44661,6 +44716,41 @@
4466144716
"redirect_url": "/azure/data-explorer/kusto/query/samples?pivots=azuremonitor",
4466244717
"redirect_document_id": false
4466344718
},
44719+
{
44720+
"source_path_from_root": "/articles/azure-monitor/essentials/quick-monitor-azure-resource.md",
44721+
"redirect_url": "/azure/azure-monitor/essentials/monitor-azure-resource",
44722+
"redirect_document_id": false
44723+
},
44724+
{
44725+
"source_path_from_root": "/articles/azure-monitor/essentials/quick-collect-activity-log-portal.md",
44726+
"redirect_url": "/azure/azure-monitor/essentials/activity-log",
44727+
"redirect_document_id": false
44728+
},
44729+
{
44730+
"source_path_from_root": "/articles/azure-monitor/essentials/quick-collect-activity-log-arm.md",
44731+
"redirect_url": "/azure/azure-monitor/essentials/resource-manager-diagnostic-settings#diagnostic-setting-for-activity-log",
44732+
"redirect_document_id": false
44733+
},
44734+
{
44735+
"source_path_from_root": "/articles/azure-monitor/app/dotnet-quickstart.md",
44736+
"redirect_url": "/azure/azure-monitor/app/asp-net-core",
44737+
"redirect_document_id": false
44738+
},
44739+
{
44740+
"source_path_from_root": "/articles/azure-monitor/app/nodejs-quick-start.md",
44741+
"redirect_url": "/azure/azure-monitor/app/asp-net-core",
44742+
"redirect_document_id": false
44743+
},
44744+
{
44745+
"source_path_from_root": "/articles/azure-monitor/app/website-monitoring.md",
44746+
"redirect_url": "/azure/azure-monitor/app/javascript",
44747+
"redirect_document_id": false
44748+
},
44749+
{
44750+
"source_path_from_root": "/articles/azure-monitor/essentials/tutorial-metrics-explorer.md",
44751+
"redirect_url": "/azure/azure-monitor/essentials/tutorial-metrics",
44752+
"redirect_document_id": false
44753+
},
4466444754
{
4466544755
"source_path_from_root": "/articles/load-balancer/tutorial-load-balancer-standard-manage-portal.md",
4466644756
"redirect_url": "/azure/load-balancer/quickstart-load-balancer-standard-public-portal",
@@ -47360,6 +47450,21 @@
4736047450
"source_path_from_root": "/articles/applied-ai-services/form-recognizer/quickstarts/try-sdk-rest-api.md",
4736147451
"redirect_url": "/azure/applied-ai-services/form-recognizer/how-to-guides/try-sdk-rest-api",
4736247452
"redirect_document_id": false
47453+
},
47454+
{
47455+
"source_path_from_root": "/articles/chaos-studio/chaos-studio-tutorial-agent-based.md",
47456+
"redirect_url": "/azure/chaos-studio/chaos-studio-tutorial-agent-based-portal",
47457+
"redirect_document_id": false
47458+
},
47459+
{
47460+
"source_path_from_root": "/articles/chaos-studio/chaos-studio-tutorial-service-direct.md",
47461+
"redirect_url": "/azure/chaos-studio/chaos-studio-tutorial-service-direct-portal",
47462+
"redirect_document_id": false
47463+
},
47464+
{
47465+
"source_path_from_root": "/articles/chaos-studio/chaos-studio-tutorial-aks.md",
47466+
"redirect_url": "/azure/chaos-studio/chaos-studio-tutorial-aks-portal",
47467+
"redirect_document_id": false
4736347468
}
4736447469
]
4736547470
}

articles/active-directory-b2c/TOC.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -49,7 +49,7 @@
4949
href: ../active-directory/develop/authentication-vs-authorization.md?bc=%2fazure%2factive-directory-b2c%2fbread%2ftoc.json&toc=%2fazure%2factive-directory-b2c%2fTOC.json
5050
- name: Tokens
5151
href: ../active-directory/develop/security-tokens.md?bc=%2fazure%2factive-directory-b2c%2fbread%2ftoc.json&toc=%2fazure%2factive-directory-b2c%2fTOC.json
52-
- name: Protocols
52+
- name: Application authentication request
5353
href: ../active-directory/develop/v2-app-types.md?bc=%2fazure%2factive-directory-b2c%2fbread%2ftoc.json&toc=%2fazure%2factive-directory-b2c%2fTOC.json
5454
- name: Authentication library
5555
href: ../active-directory/develop/msal-overview.md?bc=%2fazure%2factive-directory-b2c%2fbread%2ftoc.json&toc=%2fazure%2factive-directory-b2c%2fTOC.json
@@ -345,9 +345,9 @@
345345
items:
346346
- name: Azure Monitor
347347
href: azure-monitor.md
348-
- name: Azure Sentinel
348+
- name: Microsoft Sentinel
349349
href: azure-sentinel.md
350-
displayName: log, logs, logging, events, Azure Monitor, Azure Sentinel, SIEM, threat hunting, Security, Security Orchestration
350+
displayName: log, logs, logging, events, Azure Monitor, Microsoft Sentinel, SIEM, threat hunting, Security, Security Orchestration
351351
- name: Web Application Firewall partners
352352
items:
353353
- name: Akamai

articles/active-directory-b2c/add-api-connector-token-enrichment.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: CelesteDG
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: how-to
11-
ms.date: 08/29/2021
11+
ms.date: 11/09/2021
1212
ms.author: kengaderdus
1313
ms.subservice: B2C
1414
zone_pivot_groups: b2c-policy-type
@@ -248,7 +248,7 @@ After you deploy your REST API, set the metadata of the `REST-GetProfile` techni
248248
- **ServiceUrl**. Set the URL of the REST API endpoint.
249249
- **SendClaimsIn**. Specify how the input claims are sent to the RESTful claims provider.
250250
- **AuthenticationType**. Set the type of authentication being performed by the RESTful claims provider such as `Basic` or `ClientCertificate`
251-
- **AllowInsecureAuthInProduction**. In a production environment, make sure to set this metadata to `false`
251+
- **AllowInsecureAuthInProduction**. In a production environment, make sure to set this metadata to `false`.
252252

253253
See the [RESTful technical profile metadata](restful-technical-profile.md#metadata) for more configurations.
254254

articles/active-directory-b2c/azure-sentinel.md

Lines changed: 27 additions & 27 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
2-
title: Secure Azure AD B2C with Azure Sentinel
2+
title: Secure Azure AD B2C with Microsoft Sentinel
33
titleSuffix: Azure AD B2C
4-
description: In this tutorial, you use Azure Sentinel to perform security analytics for Azure Active Directory B2C data.
4+
description: In this tutorial, you use Microsoft Sentinel to perform security analytics for Azure Active Directory B2C data.
55
services: active-directory-b2c
66
author: gargi-sinha
77
manager: martinco
@@ -12,14 +12,14 @@ ms.topic: tutorial
1212
ms.date: 08/17/2021
1313
ms.author: gasinh
1414
ms.subservice: B2C
15-
#Customer intent: As an IT professional, I want to gather logs and audit data by using Azure Sentinel and Azure Monitor so that I can secure my applications that use Azure Active Directory B2C.
15+
#Customer intent: As an IT professional, I want to gather logs and audit data by using Microsoft Sentinel and Azure Monitor so that I can secure my applications that use Azure Active Directory B2C.
1616
---
1717

18-
# Tutorial: Configure security analytics for Azure Active Directory B2C data with Azure Sentinel
18+
# Tutorial: Configure security analytics for Azure Active Directory B2C data with Microsoft Sentinel
1919

20-
You can further secure your Azure Active Directory B2C (Azure AD B2C) environment by routing logs and audit information to Azure Sentinel. Azure Sentinel is a cloud-native SIEM (security information and event management) and SOAR (security orchestration, automation, and response) solution. Azure Sentinel provides alert detection, threat visibility, proactive hunting, and threat response for Azure AD B2C.
20+
You can further secure your Azure Active Directory B2C (Azure AD B2C) environment by routing logs and audit information to Microsoft Sentinel. Microsoft Sentinel is a cloud-native SIEM (security information and event management) and SOAR (security orchestration, automation, and response) solution. Microsoft Sentinel provides alert detection, threat visibility, proactive hunting, and threat response for Azure AD B2C.
2121

22-
By using Azure Sentinel with Azure AD B2C, you can:
22+
By using Microsoft Sentinel with Azure AD B2C, you can:
2323

2424
- Detect previously undetected threats and minimize false positives by using Microsoft's analytics and threat intelligence.
2525
- Investigate threats with AI. Hunt for suspicious activities at scale, and tap into years of cybersecurity-related work at Microsoft.
@@ -30,50 +30,50 @@ In this tutorial, you'll learn how to:
3030

3131
> [!div class="checklist"]
3232
> * Transfer Azure AD B2C logs to a Log Analytics workspace.
33-
> * Enable Azure Sentinel in a Log Analytics workspace.
34-
> * Create a sample rule in Azure Sentinel that will trigger an incident.
33+
> * Enable Microsoft Sentinel in a Log Analytics workspace.
34+
> * Create a sample rule in Microsoft Sentinel that will trigger an incident.
3535
> * Configure an automated response.
3636
3737
## Configure Azure AD B2C with Azure Monitor Log Analytics
3838

3939
To define where logs and metrics for a resource should be sent, enable **Diagnostic settings** in Azure AD within your Azure AD B2C tenant. Then, [configure Azure AD B2C to send logs to Azure Monitor](./azure-monitor.md).
4040

41-
## Deploy an Azure Sentinel instance
41+
## Deploy a Microsoft Sentinel instance
4242

43-
After you've configured your Azure AD B2C instance to send logs to Azure Monitor, you need to enable an Azure Sentinel instance.
43+
After you've configured your Azure AD B2C instance to send logs to Azure Monitor, you need to enable a Microsoft Sentinel instance.
4444

4545
>[!IMPORTANT]
46-
>To enable Azure Sentinel, you need contributor permissions to the subscription in which the Azure Sentinel workspace resides. To use Azure Sentinel, you need either contributor or reader permissions on the resource group that the workspace belongs to.
46+
>To enable Microsoft Sentinel, you need contributor permissions to the subscription in which the Microsoft Sentinel workspace resides. To use Microsoft Sentinel, you need either contributor or reader permissions on the resource group that the workspace belongs to.
4747
4848
1. Go to the [Azure portal](https://portal.azure.com). Select the subscription where the Log Analytics workspace is created.
4949

50-
2. Search for and select **Azure Sentinel**.
50+
2. Search for and select **Microsoft Sentinel**.
5151

52-
![Screenshot that shows searching for Azure Sentinel in the Azure portal.](./media/azure-sentinel/azure-sentinel-add.png)
52+
![Screenshot that shows searching for Microsoft Sentinel in the Azure portal.](./media/azure-sentinel/azure-sentinel-add.png)
5353

5454
3. Select **Add**.
5555

5656
4. Select the new workspace.
5757

58-
![Screenshot that shows where to select an Azure Sentinel workspace.](./media/azure-sentinel/create-new-workspace.png)
58+
![Screenshot that shows where to select a Microsoft Sentinel workspace.](./media/azure-sentinel/create-new-workspace.png)
5959

60-
5. Select **Add Azure Sentinel**.
60+
5. Select **Add Microsoft Sentinel**.
6161

6262
>[!NOTE]
63-
>You can [run Azure Sentinel](../sentinel/quickstart-onboard.md) on more than one workspace, but the data is isolated to a single workspace.
63+
>You can [run Microsoft Sentinel](../sentinel/quickstart-onboard.md) on more than one workspace, but the data is isolated to a single workspace.
6464
65-
## Create an Azure Sentinel rule
65+
## Create a Microsoft Sentinel rule
6666

67-
Now that you've enabled Azure Sentinel, get notified when something suspicious occurs in your Azure AD B2C tenant.
67+
Now that you've enabled Microsoft Sentinel, get notified when something suspicious occurs in your Azure AD B2C tenant.
6868

6969
You can create [custom analytics rules](../sentinel/detect-threats-custom.md) to discover threats and anomalous behaviors in your environment. These rules search for specific events or sets of events and alert you when certain event thresholds or conditions are reached. Then they generate incidents for further investigation.
7070

7171
>[!NOTE]
72-
>Azure Sentinel provides built-in templates to help you create threat detection rules designed by Microsoft's team of security experts and analysts. Rules created from these templates automatically search across your data for any suspicious activity. There are no native Azure AD B2C connectors available at this time. For the example in this tutorial, we'll create our own rule.
72+
>Microsoft Sentinel provides built-in templates to help you create threat detection rules designed by Microsoft's team of security experts and analysts. Rules created from these templates automatically search across your data for any suspicious activity. There are no native Azure AD B2C connectors available at this time. For the example in this tutorial, we'll create our own rule.
7373
7474
In the following example, you receive a notification if someone tries to force access to your environment but isn't successful. It might mean a brute-force attack. You want to get notified for two or more unsuccessful logins within 60 seconds.
7575

76-
1. From the left menu in Azure Sentinel, select **Analytics**.
76+
1. From the left menu in Microsoft Sentinel, select **Analytics**.
7777

7878
2. On the action bar at the top, select **+ Create** > **Scheduled query rule**.
7979

@@ -106,7 +106,7 @@ In the following example, you receive a notification if someone tries to force a
106106

107107
7. Go to the **Review and create** tab to review all the settings for your new alert rule. When the **Validation passed** message appears, select **Create** to initialize your alert rule.
108108

109-
![Screenshot that shows the tab for reviewing and creating an rule.](./media/azure-sentinel/review-create.png)
109+
![Screenshot that shows the tab for reviewing and creating a rule.](./media/azure-sentinel/review-create.png)
110110

111111
8. View the rule and the incidents that it generates. Find your newly created custom rule of type **Scheduled** in the table under the **Active rules** tab on the main **Analytics** screen. From this list, you can edit, enable, disable, or delete rules by using the corresponding buttons.
112112

@@ -117,7 +117,7 @@ In the following example, you receive a notification if someone tries to force a
117117
An incident can include multiple alerts. It's an aggregation of all the relevant evidence for a specific investigation. You can set properties such as severity and status at the incident level.
118118

119119
> [!NOTE]
120-
> A key feature of Azure Sentinel is [incident investigation](../sentinel/investigate-cases.md).
120+
> A key feature of Microsoft Sentinel is [incident investigation](../sentinel/investigate-cases.md).
121121
122122
10. To begin an investigation, select a specific incident.
123123

@@ -135,21 +135,21 @@ In the following example, you receive a notification if someone tries to force a
135135

136136
## Automated response
137137

138-
Azure Sentinel provides a [robust SOAR capability](../sentinel/automation-in-azure-sentinel.md). Automated actions, called a *playbook* in Azure Sentinel, can be attached to analytics rules to suit your requirements.
138+
Microsoft Sentinel provides a [robust SOAR capability](../sentinel/automation-in-azure-sentinel.md). Automated actions, called a *playbook* in Microsoft Sentinel, can be attached to analytics rules to suit your requirements.
139139

140-
In this example, we add an email notification for an incident that the rule creates. To accomplish this task, use an [existing playbook from the Azure Sentinel GitHub repository](https://github.com/Azure/Azure-Sentinel/tree/master/Playbooks/Incident-Email-Notification). After the playbook is configured, edit the existing rule and select the playbook on the **Automated response** tab.
140+
In this example, we add an email notification for an incident that the rule creates. To accomplish this task, use an [existing playbook from the Microsoft Sentinel GitHub repository](https://github.com/Azure/Azure-Sentinel/tree/master/Playbooks/Incident-Email-Notification). After the playbook is configured, edit the existing rule and select the playbook on the **Automated response** tab.
141141

142142
![Screenshot that shows the image configuration screen for the automated response associated with a rule.](./media/azure-sentinel/automation-tab.png)
143143

144144
## Related information
145145

146-
For more information about Azure Sentinel and Azure AD B2C, see:
146+
For more information about Microsoft Sentinel and Azure AD B2C, see:
147147

148148
- [Sample workbooks](https://github.com/azure-ad-b2c/siem#workbooks)
149149

150-
- [Azure Sentinel documentation](../sentinel/index.yml)
150+
- [Microsoft Sentinel documentation](../sentinel/index.yml)
151151

152152
## Next steps
153153

154154
> [!div class="nextstepaction"]
155-
> [Handle false positives in Azure Sentinel](../sentinel/false-positives.md)
155+
> [Handle false positives in Microsoft Sentinel](../sentinel/false-positives.md)

0 commit comments

Comments
 (0)