Skip to content

Commit 2ecbaac

Browse files
authored
Merge pull request #292829 from MicrosoftDocs/main
Merge main to live, 4 AM
2 parents 0a0a12a + 1fdbe1b commit 2ecbaac

File tree

13 files changed

+85
-39
lines changed

13 files changed

+85
-39
lines changed

articles/communication-services/toc.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1348,6 +1348,8 @@ items:
13481348
href: https://azure.github.io/azure-sdk-for-android/azure-communication-calling/index.html
13491349
- name: Calling (iOS)
13501350
href: /objectivec/communication-services/calling/
1351+
- name: Calling (.NET)
1352+
href: /dotnet/api/azure-communication-services/calling/
13511353
- name: Call Automation
13521354
items:
13531355
- name: Call Automation (JavaScript)

articles/container-apps/firewall-integration.md

Lines changed: 11 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: container-apps
55
author: CaryChai
66
ms.service: azure-container-apps
77
ms.topic: reference
8-
ms.date: 08/29/2023
8+
ms.date: 01/09/2025
99
ms.author: cachai
1010
---
1111

@@ -17,7 +17,7 @@ You can lock down a network via NSGs with more restrictive rules than the defaul
1717

1818
In the workload profiles environment, user-defined routes (UDRs) and [securing outbound traffic with a firewall](./networking.md#configuring-udr-with-azure-firewall) are supported. When using an external workload profiles environment, inbound traffic to Azure Container Apps is routed through the public IP that exists in the [managed resource group](./networking.md#workload-profiles-environment-2) rather than through your subnet. This means that locking down inbound traffic via NSG or Firewall on an external workload profiles environment isn't supported. For more information, see [Networking in Azure Container Apps environments](./networking.md#user-defined-routes-udr).
1919

20-
In the Consumption only environment, express routes are not supported, and custom user-defined routes (UDRs) have limited support. For more details on what level of UDR support is available on Consumption only environment, see the [FAQ](faq.yml#do-consumption-only-environments-support-custom-user-defined-routes-).
20+
In the Consumption only environment, express routes aren't supported, and custom user-defined routes (UDRs) have limited support. For more information on the level of UDR support available in a Consumption-only environment, see the [FAQ](faq.yml#do-consumption-only-environments-support-custom-user-defined-routes-).
2121

2222
## NSG allow rules
2323

@@ -32,7 +32,7 @@ The following tables describe how to configure a collection of NSG allow rules.
3232
3333
| Protocol | Source | Source ports | Destination | Destination ports | Description |
3434
|--|--|--|--|--|--|
35-
| TCP | Your client IPs | \* | Your container app's subnet<sup>1</sup> | `80`, `31080` | Allow your Client IPs to access Azure Container Apps when using HTTP. `31080` is the port on which the Container Apps Environment Edge Proxy responds to the HTTP traffic. It is behind the internal load balancer. |
35+
| TCP | Your client IPs | \* | Your container app's subnet<sup>1</sup> | `80`, `31080` | Allow your Client IPs to access Azure Container Apps when using HTTP. `31080` is the port on which the Container Apps Environment Edge Proxy responds to the HTTP traffic. It is behind the internal load balancer. |
3636
| TCP | Your client IPs | \* | Your container app's subnet<sup>1</sup> | `443`, `31443` | Allow your Client IPs to access Azure Container Apps when using HTTPS. `31443` is the port on which the Container Apps Environment Edge Proxy responds to the HTTPS traffic. It is behind the internal load balancer. |
3737
| TCP | AzureLoadBalancer | \* | Your container app's subnet | `30000-32767`<sup>2</sup> | Allow Azure Load Balancer to probe backend pools. |
3838

@@ -59,11 +59,12 @@ The following tables describe how to configure a collection of NSG allow rules.
5959
|--|--|--|--|--|--|
6060
| TCP | Your container app's subnet | \* | `MicrosoftContainerRegistry` | `443` | This is the service tag for Microsoft container registry for system containers. |
6161
| TCP | Your container app's subnet | \* | `AzureFrontDoor.FirstParty` | `443` | This is a dependency of the `MicrosoftContainerRegistry` service tag. |
62-
| Any | Your container app's subnet | \* | Your container app's subnet | \* | Allow communication between IPs in your container app's subnet. |
63-
| TCP | Your container app's subnet | \* | `AzureActiveDirectory` | `443` | If you're using managed identity, this is required. |
62+
| Any | Your container app's subnet | \* | Your container app's subnet | \* | Allow communication between IPs in your container app's subnet. |
63+
| TCP | Your container app's subnet | \* | `AzureActiveDirectory` | `443` |
64+
If you're using a managed identity, it's required. |
6465
| TCP | Your container app's subnet | \* | `AzureMonitor` | `443` | Only required when using Azure Monitor. Allows outbound calls to Azure Monitor. |
65-
| TCP and UDP | Your container app's subnet | \* | `168.63.129.16` | `53` | Enables the environment to use Azure DNS to resolve the hostname. |
66-
| TCP | Your container app's subnet<sup>1</sup> | \* | Your Container Registry | Your container registry's port | This is required to communicate with your container registry. For example, when using ACR, you need `AzureContainerRegistry` and `AzureActiveDirectory` for the destination, and the port will be your container registry's port unless using private endpoints.<sup>2</sup> |
66+
| TCP and UDP | Your container app's subnet | \* | `168.63.129.16` | `53` | Enables the environment to use Azure DNS to resolve the hostname. <br><br>**Note**: DNS communication to Azure DNS isn't subject to NSGs unless targeted using the `AzurePlatformDNS` service tag. To block DNS traffic, create an outbound rule to deny traffic to the `AzurePlatformDNS` service tag. |
67+
| TCP | Your container app's subnet<sup>1</sup> | \* | Your Container Registry | Your container registry's port | This is required to communicate with your container registry. For example, when using ACR, you need `AzureContainerRegistry` and `AzureActiveDirectory` for the destination, and the port is your container registry's port unless using private endpoints.<sup>2</sup> |
6768
| TCP | Your container app's subnet | \* | `Storage.<Region>` | `443` | Only required when using `Azure Container Registry` to host your images. |
6869

6970

@@ -81,8 +82,8 @@ The following tables describe how to configure a collection of NSG allow rules.
8182
| TCP | Your container app's subnet | \* | `AzureCloud` | `443` | Allowing all outbound on port `443` provides a way to allow all FQDN based outbound dependencies that don't have a static IP. |
8283
| UDP | Your container app's subnet | \* | \* | `123` | NTP server. |
8384
| Any | Your container app's subnet | \* | Your container app's subnet | \* | Allow communication between IPs in your container app's subnet. |
84-
| TCP and UDP | Your container app's subnet | \* | `168.63.129.16` | `53` | Enables the environment to use Azure DNS to resolve the hostname. |
85-
| TCP | Your container app's subnet<sup>1</sup> | \* | Your Container Registry | Your container registry's port | This is required to communicate with your container registry. For example, when using ACR, you need `AzureContainerRegistry` and `AzureActiveDirectory` for the destination, and the port will be your container registry's port unless using private endpoints.<sup>2</sup> |
85+
| TCP and UDP | Your container app's subnet | \* | `168.63.129.16` | `53` | Enables the environment to use Azure DNS to resolve the hostname. <br><br>**Note**: DNS communication to Azure DNS isn't subject to NSGs unless targeted using the `AzurePlatformDNS` service tag. To block DNS traffic, create an outbound rule to deny traffic to the `AzurePlatformDNS` service tag.|
86+
| TCP | Your container app's subnet<sup>1</sup> | \* | Your Container Registry | Your container registry's port | This is required to communicate with your container registry. For example, when using ACR, you need `AzureContainerRegistry` and `AzureActiveDirectory` for the destination, and the port is your container registry's port unless using private endpoints.<sup>2</sup> |
8687
| TCP | Your container app's subnet | \* | `Storage.<Region>` | `443` | Only required when using `Azure Container Registry` to host your images. |
8788
| TCP | Your container app's subnet | \* | `AzureMonitor` | `443` | Only required when using Azure Monitor. Allows outbound calls to Azure Monitor. |
8889

@@ -96,4 +97,4 @@ The following tables describe how to configure a collection of NSG allow rules.
9697
#### Considerations
9798

9899
- If you're running HTTP servers, you might need to add ports `80` and `443`.
99-
- Don't explicitly deny the Azure DNS address `168.63.129.16` in the outgoing NSG rules, or your Container Apps environment won't be able to function.
100+
- Don't explicitly deny the Azure DNS address `168.63.129.16` in the outgoing NSG rules, or your Container Apps environment doesn't function.
897 KB
Loading
1.42 MB
Loading
-39.8 KB
Loading

articles/sentinel/mitre-coverage.md

Lines changed: 30 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -19,14 +19,14 @@ appliesto:
1919

2020
Microsoft Sentinel analyzes ingested data, not only to [detect threats](detect-threats-built-in.md) and help you [investigate](investigate-cases.md), but also to visualize the nature and coverage of your organization's security status.
2121

22-
This article describes how to use the **MITRE** page in Microsoft Sentinel to view the detections already active in your workspace, and those available for you to configure, to understand your organization's security coverage, based on the tactics and techniques from the MITRE ATT&CK® framework.
22+
This article describes how to use the **MITRE** page in Microsoft Sentinel to view the analytics rules (detections) already active in your workspace, and the detections available for you to configure, to understand your organization's security coverage, based on the tactics and techniques from the MITRE ATT&CK® framework.
2323

2424
> [!IMPORTANT]
25-
> The MITRE page in Microsoft Sentinel is currently in PREVIEW. The [Azure Preview Supplemental Terms](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) include additional legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
25+
> The MITRE page in Microsoft Sentinel is currently in PREVIEW. The [Azure Preview Supplemental Terms](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) include legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
2626
2727
## Prerequisites
2828

29-
Before you can view the MITRE coverage for your organization in Microsoft Sentinel, ensure you have the following:
29+
Before you can view the MITRE coverage for your organization in Microsoft Sentinel, ensure you have the following prerequisites:
3030

3131
- An active Microsoft Sentinel instance.
3232
- Necessary permissions to view content in Microsoft Sentinel. For more information, see [Roles and permissions in Microsoft Sentinel](roles.md).
@@ -40,11 +40,29 @@ Microsoft Sentinel is currently aligned to The MITRE ATT&CK framework, version 1
4040

4141
## View current MITRE coverage
4242

43-
1. In Microsoft Sentinel, under **Threat management**, select **MITRE ATTA&CK (Preview)**. By default, both currently active scheduled query and near real-time (NRT) rules are indicated in the coverage matrix.
43+
By default, both currently active scheduled query and near real-time (NRT) rules are indicated in the coverage matrix.
4444

45-
:::image type="content" source="media/mitre-coverage/mitre-coverage.png" alt-text="Screenshot of the MITRE coverage page with both active and simulated indicators selected.":::
45+
1. Do one of the following, depending on the portal you're using:
46+
47+
### [Azure portal](#tab/azure-portal)
4648

47-
1. Do any of the following:
49+
In the Azure portal, under **Threat management**, select **MITRE ATT&CK (Preview)**.
50+
51+
:::image type="content" source="media/mitre-coverage/mitre-coverage.png" alt-text="Screenshot of the MITRE coverage page." lightbox="media/mitre-coverage/mitre-coverage.png":::
52+
53+
### [Defender portal](#tab/defender-portal)
54+
55+
In the Defender portal, select **Microsoft Sentinel > Threat management > MITRE ATT&CK**.
56+
57+
:::image type="content" source="media/mitre-coverage/mitre-coverage-defender.png" alt-text="Screenshot of the MITRE ATT&CK page in the Defender portal." lightbox="media/mitre-coverage/mitre-coverage-defender.png":::
58+
59+
To filter the page by a specific threat scenario, toggle the **View MITRE by threat scenario** option on, and then select a threat scenario from the drop-down menu. The page is updated accordingly. For example:
60+
61+
:::image type="content" source="media/mitre-coverage/mitre-by-threat-scenario.png" alt-text="Screenshot of the MITRE ATT&CK page filtered by a specific threat scenario.":::
62+
63+
---
64+
65+
1. Use any of the following methods:
4866

4967
- **Use the legend** to understand how many detections are currently active in your workspace for specific technique.
5068

@@ -58,6 +76,9 @@ Microsoft Sentinel is currently aligned to The MITRE ATT&CK framework, version 1
5876

5977
For example, select **Hunting queries** to jump to the **Hunting** page. There, you see a filtered list of the hunting queries that are associated with the selected technique, and available for you to configure in your workspace.
6078

79+
On the Defender portal, the details pane also shows recommended coverage details, including the ratio of active detections and security services (products) out of all recommended detections and services for the selected technique.
80+
81+
6182
## Simulate possible coverage with available detections
6283

6384
In the MITRE coverage matrix, *simulated* coverage refers to detections that are available, but not currently configured in your Microsoft Sentinel workspace. View your simulated coverage to understand your organization's possible security status, were you to configure all detections available to you.
@@ -85,9 +106,9 @@ Having a scheduled rule with MITRE techniques applied running regularly in your
85106

86107
- **Threat hunting**:
87108

88-
- When creating a new hunting query, select the specific tactics and techniques to apply to your query.
89-
- When searching for active hunting queries, filter the queries displayed by tactics by selecting an item from the list above the grid. Select a query to see tactic and technique details on the right.
90-
- When creating bookmarks, either use the technique mapping inherited from the hunting query, or create your own mapping.
109+
- When you're creating a new hunting query, select the specific tactics and techniques to apply to your query.
110+
- When searching for active hunting queries, filter the queries displayed by tactics by selecting an item from the list above the grid. Select a query to see tactic and technique details in the details pane on the side
111+
- When you're creating bookmarks, either use the technique mapping inherited from the hunting query, or create your own mapping.
91112

92113
For more information, see [Hunt for threats with Microsoft Sentinel](hunting.md) and [Keep track of data during hunting with Microsoft Sentinel](bookmarks.md).
93114

755 KB
Loading
713 KB
Loading

0 commit comments

Comments
 (0)