Skip to content

Commit 2dfe4ad

Browse files
authored
Merge pull request #270346 from MicrosoftDocs/main
Publish to Live Wednesday 4AM PST 3/27
2 parents edfbff1 + 8d1036d commit 2dfe4ad

28 files changed

+130
-75
lines changed

articles/ai-services/speech-service/speech-synthesis-markup-pronunciation.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -93,7 +93,7 @@ Usage of the `lexicon` element's attributes are described in the following table
9393

9494
The supported values for attributes of the `lexicon` element were [described previously](#custom-lexicon).
9595

96-
After you publish your custom lexicon, you can reference it from your SSML. The following SSML example references a custom lexicon that was uploaded to `https://www.example.com/customlexicon.xml`.
96+
After you publish your custom lexicon, you can reference it from your SSML. The following SSML example references a custom lexicon that was uploaded to `https://www.example.com/customlexicon.xml`. We support lexicon URLs from Azure Blob Storage, Azure Media Services (AMS) Storage, and GitHub. However, note that other public URLs may not be compatible.
9797

9898
```xml
9999
<speak version="1.0" xmlns="http://www.w3.org/2001/10/synthesis"
@@ -116,7 +116,7 @@ To define how multiple entities are read, you can define them in a custom lexico
116116
117117
Here are some limitations of the custom lexicon file:
118118

119-
- **File size**: The custom lexicon file size is limited to a maximum of 100 KB. If the file size exceeds the 100-KB limit, the synthesis request fails.
119+
- **File size**: The custom lexicon file size is limited to a maximum of 100 KB. If the file size exceeds the 100-KB limit, the synthesis request fails. You can split your lexicon into multiple lexicons and include them in SSML if the file size exceeds 100 KB.
120120
- **Lexicon cache refresh**: The custom lexicon is cached with the URI as the key on text to speech when it's first loaded. The lexicon with the same URI isn't reloaded within 15 minutes, so the custom lexicon change needs to wait 15 minutes at the most to take effect.
121121

122122
The supported elements and attributes of a custom lexicon XML file are described in the [Pronunciation Lexicon Specification (PLS) Version 1.0](https://www.w3.org/TR/pronunciation-lexicon/). Here are some examples of the supported elements and attributes:

articles/azure-arc/system-center-virtual-machine-manager/enable-guest-management-at-scale.md

Lines changed: 7 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ author: Farha-Bano
77
ms.author: v-farhabano
88
manager: jsuri
99
ms.topic: how-to
10-
ms.date: 03/12/2024
10+
ms.date: 03/27/2024
1111
keywords: "VMM, Arc, Azure"
1212

1313
#Customer intent: As an IT infrastructure admin, I want to install arc agents to use Azure management services for SCVMM VMs.
@@ -47,7 +47,12 @@ An admin can install agents for multiple machines from the Azure portal if the m
4747
2. Select all the machines and choose the **Enable in Azure** option.
4848
3. Select **Enable guest management** checkbox to install Arc agents on the selected machine.
4949
4. If you want to connect the Arc agent via proxy, provide the proxy server details.
50-
5. Provide the administrator username and password for the machine.
50+
5. If you want to connect Arc agent via private endpoint, follow these [steps](../servers/private-link-security.md) to set up Azure private link.
51+
52+
>[!Note]
53+
> Private endpoint connectivity is only available for Arc agent to Azure communications. For Arc resource bridge to Azure connectivity, Azure Private link isn't supported.
54+
55+
6. Provide the administrator username and password for the machine.
5156

5257
>[!Note]
5358
> For Windows VMs, the account must be part of the local administrator group; and for Linux VM, it must be a root account.

articles/azure-arc/vmware-vsphere/enable-guest-management-at-scale.md

Lines changed: 7 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Install Arc agent at scale for your VMware VMs
33
description: Learn how to enable guest management at scale for Arc enabled VMware vSphere VMs.
44
ms.topic: how-to
5-
ms.date: 11/06/2023
5+
ms.date: 03/27/2024
66
ms.service: azure-arc
77
ms.subservice: azure-arc-vmware-vsphere
88
author: Farha-Bano
@@ -43,7 +43,12 @@ An admin can install agents for multiple machines from the Azure portal if the m
4343

4444
4. If you want to connect the Arc agent via proxy, provide the proxy server details.
4545

46-
5. Provide the administrator username and password for the machine.
46+
5. If you want to connect Arc agent via private endpoint, follow these [steps](../servers/private-link-security.md) to set up Azure private link.
47+
48+
>[!Note]
49+
> Private endpoint connectivity is only available for Arc agent to Azure communications. For Arc resource bridge to Azure connectivity, Azure private link isn't supported.
50+
51+
6. Provide the administrator username and password for the machine.
4752

4853
> [!NOTE]
4954
> For Windows VMs, the account must be part of local administrator group; and for Linux VM, it must be a root account.

articles/azure-arc/vmware-vsphere/support-matrix-for-arc-enabled-vmware-vsphere.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Plan for deployment
33
description: Learn about the support matrix for Arc-enabled VMware vSphere including vCenter Server versions supported, network requirements, and more.
44
ms.topic: how-to
5-
ms.date: 11/06/2023
5+
ms.date: 03/27/2024
66
ms.service: azure-arc
77
ms.subservice: azure-arc-vmware-vsphere
88
author: Farha-Bano
@@ -38,6 +38,9 @@ You need a vSphere account that can:
3838

3939
This account is used for the ongoing operation of Azure Arc-enabled VMware vSphere and the deployment of the Azure Arc resource bridge VM.
4040

41+
>[!Important]
42+
> If there are any changes to the credentials of the vSphere account after onboarding, follow these [steps](./administer-arc-vmware.md#updating-the-vsphere-account-credentials-using-a-new-password-or-a-new-vsphere-account-after-onboarding) to update the credentials in Arc Resource Bridge and VMware cluster extension.
43+
4144
### Resource bridge resource requirements
4245

4346
For Arc-enabled VMware vSphere, resource bridge has the following minimum virtual hardware requirements

articles/azure-web-pubsub/tutorial-build-chat.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -417,6 +417,7 @@ import com.azure.messaging.webpubsub.WebPubSubServiceClient;
417417
import com.azure.messaging.webpubsub.WebPubSubServiceClientBuilder;
418418
import com.azure.messaging.webpubsub.models.GetClientAccessTokenOptions;
419419
import com.azure.messaging.webpubsub.models.WebPubSubClientAccessToken;
420+
import com.azure.messaging.webpubsub.models.WebPubSubContentType;
420421
import io.javalin.Javalin;
421422
422423
public class App {

articles/communication-services/how-tos/calling-sdk/includes/raise-hand/raise-hand-web.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -60,15 +60,15 @@ const raisedHandChangedHandler = (event) => {
6060
const loweredHandChangedHandler = (event) => {
6161
console.log(`Participant ${event.identifier} lowered hand`);
6262
};
63-
raiseHandFeature.on('raisedHandChanged', raisedHandChangedHandler):
64-
raiseHandFeature.on('loweredHandChanged', loweredHandChangedHandler):
63+
raiseHandFeature.on('raisedHandEvent', raisedHandChangedHandler):
64+
raiseHandFeature.on('loweredHandEvent', loweredHandChangedHandler):
6565
```
6666
The `raisedHandChanged` and `loweredHandChanged` events contain an object with the `identifier` property, which represents the participant's communication identifier. In the example above, we log a message to the console indicating that a participant has raised their hand.
6767

6868
To unsubscribe from the events, you can use the `off` method.
6969

7070
### List of all participants with active state
71-
To get information about all participants that have raised hand state on current call, you can use the `getRaisedHands` api. he returned array is sorted by the order field.
71+
To get information about all participants that have raised hand state on current call, you can use the `getRaisedHands` api. The returned array is sorted by the order field.
7272
Here's an example of how to use the `getRaisedHands` API:
7373
```js
7474
const raiseHandFeature = call.feature(Features.RaiseHand );
@@ -79,4 +79,4 @@ let participantsWithRaisedHands = raiseHandFeature.getRaisedHands();
7979
The `participantsWithRaisedHands` variable will contain an array of participant objects, where each object has the following properties:
8080
`identifier`: the communication identifier of the participant
8181
`order`: the order in which the participant raised their hand
82-
You can use this information to display a list of participants with the Raise Hand state and their order in the queue.
82+
You can use this information to display a list of participants with the Raise Hand state and their order in the queue.

articles/compliance/index.yml

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ metadata:
1212
author: TerryLanfear
1313
ms.author: terrylan
1414
manager: rkarlin
15-
ms.date: 06/12/2022
15+
ms.date: 03/26/2024
1616

1717
conceptualContent:
1818
# itemType: architecture | concept | deploy | download | get-started | how-to-guide | learn | overview | quickstart | reference | sample | tutorial | video | whats-new
@@ -400,14 +400,13 @@ conceptualContent:
400400
itemType: concept
401401
text: UK PASF
402402

403-
404403
additionalContent:
405404
# Maximum of 3 sections
406405
sections:
407406

408407
# Section 1
409-
- title: Additional compliance resources
410-
summary: To access a resource you may need to be signed into your cloud service
408+
- title: More compliance resources
409+
summary: To access a resource, you may need to be signed into your cloud service.
411410
items:
412411

413412
- title: Privacy and GDPR

articles/defender-for-cloud/defender-for-cloud-introduction.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,7 @@ Defender for Cloud includes Foundational CSPM capabilities for free. You can als
4343
| Capability | What problem does it solve? | Get started | Defender plan |
4444
|--|--|--|--|
4545
| [Centralized policy management](security-policy-concept.md) | Define the security conditions that you want to maintain across your environment. The policy translates to recommendations that identify resource configurations that violate your security policy. The [Microsoft cloud security benchmark](concept-regulatory-compliance.md) is a built-in standard that applies security principles with detailed technical implementation guidance for Azure and other cloud providers (such as AWS and GCP). | [Customize a security policy](create-custom-recommendations.md) | Foundational CSPM (Free) |
46-
| [Secure score]( secure-score-security-controls.md) | Summarize your security posture based on the security recommendations. As you remediate recommendations, your secure score improves. | [Track your secure score](secure-score-access-and-track.md) | Foundational CSPM (Free) |
46+
| [Secure score](secure-score-security-controls.md) | Summarize your security posture based on the security recommendations. As you remediate recommendations, your secure score improves. | [Track your secure score](secure-score-access-and-track.md) | Foundational CSPM (Free) |
4747
| [Multicloud coverage](plan-multicloud-security-get-started.md) | Connect to your multicloud environments with agentless methods for CSPM insight and CWP protection. | Connect your [Amazon AWS](quickstart-onboard-aws.md) and [Google GCP](quickstart-onboard-gcp.md) cloud resources to Defender for Cloud | Foundational CSPM (Free) |
4848
| [Cloud Security Posture Management (CSPM)](concept-cloud-security-posture-management.md) | Use the dashboard to see weaknesses in your security posture. | [Enable CSPM tools](enable-enhanced-security.md) | Foundational CSPM (Free) |
4949
| [Advanced Cloud Security Posture Management](concept-cloud-security-posture-management.md) | Get advanced tools to identify weaknesses in your security posture, including:</br>- Governance to drive actions to improve your security posture</br>- Regulatory compliance to verify compliance with security standards</br>- Cloud security explorer to build a comprehensive view of your environment | [Enable CSPM tools](enable-enhanced-security.md) | Defender CSPM |
@@ -66,7 +66,7 @@ When your environment is threatened, security alerts right away indicate the nat
6666
| Protect cloud databases | Protect your entire database estate with attack detection and threat response for the most popular database types in Azure to protect the database engines and data types, according to their attack surface and security risks. | [Deploy specialized protections for cloud and on-premises databases](quickstart-enable-database-protections.md) | - Defender for Azure SQL Databases</br>- Defender for SQL servers on machines</br>- Defender for Open-source relational databases</br>- Defender for Azure Cosmos DB |
6767
| Protect containers | Secure your containers so you can improve, monitor, and maintain the security of your clusters, containers, and their applications with environment hardening, vulnerability assessments, and run-time protection. | [Find security risks in your containers](defender-for-containers-introduction.md) | Defender for Containers |
6868
| [Infrastructure service insights](asset-inventory.md) | Diagnose weaknesses in your application infrastructure that can leave your environment susceptible to attack. | - [Identify attacks targeting applications running over App Service](defender-for-app-service-introduction.md)</br>- [Detect attempts to exploit Key Vault accounts](defender-for-key-vault-introduction.md)</br>- [Get alerted on suspicious Resource Manager operations](defender-for-resource-manager-introduction.md)</br>- [Expose anomalous DNS activities](defender-for-dns-introduction.md) | - Defender for App Service</br>- Defender for Key Vault</br>- Defender for Resource Manager</br>- Defender for DNS |
69-
| [Security alerts](alerts-overview.md) | Get informed of real-time events that threaten the security of your environment. Alerts are categorized and assigned severity levels to indicate proper responses. | [Manage security alerts]( managing-and-responding-alerts.md) | Any workload protection Defender plan |
69+
| [Security alerts](alerts-overview.md) | Get informed of real-time events that threaten the security of your environment. Alerts are categorized and assigned severity levels to indicate proper responses. | [Manage security alerts](managing-and-responding-alerts.md) | Any workload protection Defender plan |
7070
| [Security incidents](alerts-overview.md#what-are-security-incidents) | Correlate alerts to identify attack patterns and integrate with Security Information and Event Management (SIEM), Security Orchestration Automated Response (SOAR), and IT Service Management (ITSM) solutions to respond to threats and limit the risk to your resources. | [Export alerts to SIEM, SOAR, or ITSM systems](export-to-siem.md) | Any workload protection Defender plan |
7171

7272
[!INCLUDE [Defender for DNS note](./includes/defender-for-dns-note.md)]

articles/defender-for-cloud/defender-for-containers-architecture.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -84,7 +84,7 @@ When you enable the agentless discovery for Kubernetes extension, the following
8484

8585
These components are required in order to receive the full protection offered by Microsoft Defender for Containers:
8686

87-
- **[Azure Arc-enabled Kubernetes](../azure-arc/kubernetes/overview.md)** - Azure Arc-enabled Kubernetes - An sensor based solution, installed on one node in the cluster, that connects your clusters to Defender for Cloud. Defender for Cloud is then able to deploy the following two agents as [Arc extensions](../azure-arc/kubernetes/extensions.md):
87+
- **[Azure Arc-enabled Kubernetes](../azure-arc/kubernetes/overview.md)** - Azure Arc-enabled Kubernetes - A sensor based solution, installed on one node in the cluster, that connects your clusters to Defender for Cloud. Defender for Cloud is then able to deploy the following two agents as [Arc extensions](../azure-arc/kubernetes/extensions.md):
8888

8989
- **Defender sensor**: The DaemonSet that is deployed on each node, collects host signals using [eBPF technology](https://ebpf.io/) and Kubernetes audit logs, to provide runtime protection. The sensor is registered with a Log Analytics workspace, and used as a data pipeline. However, the audit log data isn't stored in the Log Analytics workspace. The Defender sensor is deployed as an Arc-enabled Kubernetes extension.
9090

articles/defender-for-cloud/faq-general.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -165,7 +165,7 @@ sections:
165165
- The Azure Management app ID (797f4846-ba00-4fd7-ba43-dac1f8f63013), or all apps, are included in the **Apps** section of your MFA CA policy
166166
- The Azure Management app ID isn't excluded in the **Apps** section of your MFA CA policy
167167
- OR condition is used with only MFA, or AND condition is used with MFA
168-
- A Conditional Access policy enforcing MFA through [Authentication Strengths](https://learn.microsoft.com/entra/identity/authentication/concept-authentication-strengths) is currently not supported in our evaluation
168+
- A Conditional Access policy enforcing MFA through [Authentication Strengths](/entra/identity/authentication/concept-authentication-strengths) is currently not supported in our evaluation.
169169
170170
- question: |
171171
We're using a third-party MFA tool to enforce MFA. Why do we still get the Defender for Cloud recommendations?

0 commit comments

Comments
 (0)