Skip to content

Commit 2c12146

Browse files
Merge pull request #288998 from MicrosoftDocs/repo_sync_working_branch
Confirm merge from repo_sync_working_branch to main to sync with https://github.com/MicrosoftDocs/azure-docs (branch main)
2 parents 886e0bc + 8821fd3 commit 2c12146

File tree

2 files changed

+6
-5
lines changed

2 files changed

+6
-5
lines changed

articles/security/fundamentals/customer-lockbox-overview.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -83,7 +83,7 @@ The following steps outline a typical workflow for a Customer Lockbox for Micros
8383
- Whether the requester is an isolated identity or using multifactor authentication.
8484
- Permissions levels.
8585
Based on the JIT rule, this request might also include an approval from Internal Microsoft Approvers. For example, the approver might be the Customer support lead or the DevOps Manager.
86-
1. When the request requires direct access to customer data, a Customer Lockbox request is initiated. For example, remote desktop access to a customer's virtual machine.
86+
1. When the request requires direct access to customer data, a Customer Lockbox request is initiated.
8787

8888
The request is now in a **Customer Notified** state, waiting for the customer's approval before granting access.
8989
1. One or more approvers at the customer organization for a given Customer Lockbox request are determined as follows:
@@ -156,7 +156,7 @@ We introduced a new baseline control ([PA-8: Determine access process for cloud
156156

157157
Customer Lockbox requests are not triggered in the following scenarios:
158158

159-
- Emergency scenarios that fall outside of standard operating procedures and require urgent action from Microsoft to restore access to online services or to prevent corruption or loss of customer data. For instance, a major service outage or a security incident demands immediate attention to recover or restore services under unexpected or unpredictable circumstances. These "break glass" events are rare and, in most cases, do not necessitate access to customer data for resolution. The controls and processes governing Microsoft's access to customer data in core online services align with NIST 800-53 and are validated through SOC 2 audits. For further information, refer to the [Azure security baseline for Customer Lockbox for Microsoft Azure](/security/benchmark/azure/baselines/customer-lockbox-for-microsoft-azure-security-baseline).
159+
- Emergency scenarios that fall outside of standard operating procedures and require urgent action from Microsoft to restore access to online services or to prevent corruption or loss of customer data, or to investigate a security or abuse incident. For instance, a major service outage or a security incident demands immediate attention to recover or restore services under unexpected or unpredictable circumstances. These "break glass" events are rare and, in most cases, do not necessitate access to customer data for resolution. The controls and processes governing Microsoft's access to customer data in core online services align with NIST 800-53 and are validated through SOC 2 audits. For further information, refer to the [Azure security baseline for Customer Lockbox for Microsoft Azure](/security/benchmark/azure/baselines/customer-lockbox-for-microsoft-azure-security-baseline).
160160
- A Microsoft engineer accesses the Azure platform as part of troubleshooting and is inadvertently exposed to customer data. For example, the Azure Network Team performs troubleshooting that results in a packet capture on a network device. It is rare that such scenarios would result in access to meaningful quantities of customer data. Customers can further protect their data through the use of Customer-managed keys (CMK), which is available for some Azure service. For more information see [Overview of Key Management in Azure](key-management.md).
161161

162162
External legal demands for data also do not trigger Customer Lockbox requests. For details, see the discussion of [government requests for data](https://www.microsoft.com/trust-center/) on the Microsoft Trust Center.

articles/virtual-network/create-vm-accelerated-networking-cli.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -202,9 +202,10 @@ Once you create the VM in Azure, connect to the VM and confirm that the Ethernet
202202
```powershell
203203
PS C:\ > Get-NetAdapter | Where-Object InterfaceDescription –like "*Mellanox*Virtual*" | Get-NetAdapterStatistics
204204
205-
Name ReceivedBytes ReceivedUnicastPackets SentBytes SentUnicastPackets
206-
---- ------------- ---------------------- --------- ------------------
207-
Ethernet 2 492447549 347643 7468446 34991
205+
Name ReceivedBytes ReceivedUnicastPackets SentBytes SentUnicastPackets
206+
---- ------------- ---------------------- --------- ------------------
207+
Ethernet 2 492447549 347643 7468446 34991
208+
208209
```
209210

210211
> [!NOTE]

0 commit comments

Comments
 (0)