Skip to content

Commit 2fb555c

Browse files
authored
Merge pull request #187659 from MicrosoftDocs/master
merge master to live, Sunday 4 PM
2 parents 59944e0 + eaeffa5 commit 2fb555c

File tree

19 files changed

+592
-169
lines changed

19 files changed

+592
-169
lines changed

articles/active-directory/manage-apps/f5-aad-integration.md

Lines changed: 18 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -28,9 +28,7 @@ Having Azure AD pre-authenticate access to BIG-IP published services provides ma
2828

2929
- Preemptive [Conditional Access](../conditional-access/overview.md) and [Azure AD Multi-Factor Authentication (MFA)](../authentication/concept-mfa-howitworks.md)
3030

31-
- [Identity Protection](../identity-protection/overview-identity-protection.md) - Adaptive control through user and session risk profiling
32-
33-
- [Leaked credential detection](../identity-protection/concept-identity-protection-risks.md)
31+
- [Identity Protection](../identity-protection/overview-identity-protection.md) - Adaptive protection through user and session risk profiling, plus [Leaked credential detection](../identity-protection/concept-identity-protection-risks.md)
3432

3533
- [Self-service password reset (SSPR)](../authentication/tutorial-enable-sspr.md)
3634

@@ -77,15 +75,15 @@ Whether a direct employee, affiliate, or consumer, most users are already acquai
7775

7876
Users now find their BIG-IP published services consolidated in the [MyApps](https://support.microsoft.com/account-billing/sign-in-and-start-apps-from-the-my-apps-portal-2f3b1bae-0e5a-4a86-a33e-876fbd2a4510) or [O365 launchpads](https://airhead.io/airbase/launchpads/R3kW-RkDFEedipcU1AFlnA) along with self-service capabilities to a broader set of services, no matter the type of device or location. Users can even continue accessing published services directly via the BIG-IPs proprietary Webtop portal, if preferred. When logging off, SHA ensures a users’ session is terminated at both ends, the BIG-IP and Azure AD, ensuring services remain fully protected from unauthorized access.
7977

80-
The screenshots provided are from the Azure AD app portal that users access securely to find their BIG-IP published services and for managing their account properties.
78+
Users access the Microsoft MyApps portal to easily find their BIG-IP published services and for managing their account properties.
8179

8280
![The screenshot shows woodgrove myapps gallery](media/f5-aad-integration/woodgrove-app-gallery.png)
8381

8482
![The screenshot shows woodgrove myaccounts self-service page](media/f5-aad-integration/woodgrove-myaccount.png)
8583

8684
## Insights and analytics
8785

88-
A BIG-IP’s role is critical to any business, so deployed BIG-IP instances should be monitored to ensure published services are highly available, both at an SHA level and operationally too.
86+
A BIG-IP’s role is critical to any business, so deployed BIG-IP instances can be monitored to ensure published services are highly available, both at an SHA level and operationally too.
8987

9088
Several options exist for logging events either locally, or remotely through a Security Information and Event Management (SIEM) solution, enabling off-box storage and processing of telemetry. A highly effective solution for monitoring Azure AD and SHA-specific activity, is to use [Azure Monitor](../../azure-monitor/overview.md) and [Microsoft Sentinel](../../sentinel/overview.md), together offering:
9189

@@ -97,7 +95,7 @@ Several options exist for logging events either locally, or remotely through a S
9795

9896
## Prerequisites
9997

100-
Integrating F5 BIG-IP with Azure AD for SHA have the following pre-requisites:
98+
Integrating an F5 BIG-IP with Azure AD for SHA has the following pre-requisites:
10199

102100
- An F5 BIG-IP instance running on either of the following platforms:
103101

@@ -111,13 +109,13 @@ Integrating F5 BIG-IP with Azure AD for SHA have the following pre-requisites:
111109

112110
- An active F5 BIG-IP APM license, through one of the following options:
113111

114-
- F5 BIG-IP® Best bundle (or)
112+
- F5 BIG-IP® Best bundle
115113

116-
- F5 BIG-IP Access Policy Manager™ standalone license
114+
- F5 BIG-IP Access Policy Manager™ standalone license
117115

118-
- F5 BIG-IP Access Policy Manager™ (APM) add-on license on an existing BIG-IP F5 BIG-IP® Local Traffic Manager™ (LTM)
116+
- F5 BIG-IP Access Policy Manager™ (APM) add-on license on an existing BIG-IP F5 BIG-IP® Local Traffic Manager™ (LTM)
119117

120-
- A 90-day BIG-IP Access Policy Manager™ (APM) [trial license](https://www.f5.com/trial/big-ip-trial.php)
118+
- A 90-day BIG-IP Access Policy Manager™ (APM) [trial license](https://www.f5.com/trial/big-ip-trial.php)
121119

122120
- Azure AD licensing through either of the following options:
123121

@@ -130,7 +128,7 @@ No previous experience or F5 BIG-IP knowledge is necessary to implement SHA, but
130128
## Configuration scenarios
131129

132130
Configuring a BIG-IP for SHA is achieved using any of the many available methods, including several template based options, or a manual configuration.
133-
The following tutorials provide detailed guidance on implementing some of the more common patterns for BIG-IP and Azure AD SHA, using these methods.
131+
The following tutorials provide detailed guidance on implementing some of the more common patterns for BIG-IP and Azure AD secure hybrid access.
134132

135133
**Advanced configuration**
136134

@@ -154,7 +152,7 @@ Refer to the following advanced configuration tutorials for your integration req
154152

155153
The Guided Configuration wizard, available from BIG-IP version 13.1 aims to minimize time and effort implementing common BIG-IP publishing scenarios. Its workflow-based framework provides an intuitive deployment experience tailored to specific access topologies.
156154

157-
The latest version of the Guided Configuration 16.1 now offers an Easy Button feature. With **Easy Button**, admins no longer go back and forth between Azure AD and a BIG-IP to enable services for SHA. The end-to-end deployment and policy management is handled directly between the APM’s Guided Configuration wizard and Microsoft Graph. This rich integration between BIG-IP APM and Azure AD ensures applications can quickly, easily support identity federation, SSO, and Azure AD Conditional Access, without management overhead of having to do so on a per app basis.
155+
Version 16.x of the Guided Configuration now offers an Easy Button feature. With **Easy Button**, admins no longer go back and forth between Azure AD and a BIG-IP to enable services for SHA. The end-to-end deployment and policy management is handled directly between the APM’s Guided Configuration wizard and Microsoft Graph. This rich integration between BIG-IP APM and Azure AD ensures applications can quickly, easily support identity federation, SSO, and Azure AD Conditional Access, without management overhead of having to do so on a per app basis.
158156

159157
Refer to the following guided configuration tutorials using Easy Button templates for your integration requirements:
160158

@@ -164,7 +162,9 @@ Refer to the following guided configuration tutorials using Easy Button template
164162

165163
- [F5 BIG-IP Easy Button for SSO to header-based and LDAP applications](f5-big-ip-ldap-header-easybutton.md)
166164

167-
- [F5 BIG-IP Easy Button for SSO to Oracle EBS (Enterprise Business Suite)](f5-big-ip-oracle-enterprise-business-suite-easy-button.md)
165+
- [BIG-IP Easy Button for SSO to Oracle EBS (Enterprise Business Suite)](f5-big-ip-oracle-enterprise-business-suite-easy-button.md)
166+
167+
- [BIG-IP Easy Button for SSO to Oracle JD Edwards](f5-big-ip-oracle-jde-easy-button.md)
168168

169169
## Additional resources
170170

@@ -178,16 +178,16 @@ Refer to the following guided configuration tutorials using Easy Button template
178178

179179
## Next steps
180180

181-
Consider running an SHA Proof of concept (POC) using your existing BIG-IP infrastructure, or by deploying a trial instance. [Deploying a BIG-IP Virtual Edition (VE) VM into Azure](f5-bigip-deployment-guide.md) takes approximately 30 minutes, at which point you'll have:
181+
Consider running an SHA Proof of concept (POC) using your existing BIG-IP infrastructure, or by [Deploying a BIG-IP Virtual Edition (VE) VM into Azure](f5-bigip-deployment-guide.md) takes approximately 30 minutes, at which point you'll have:
182182

183-
- A fully secured platform to model an SHA proof of concept
183+
- A fully secured platform to model a SHA proof of concept
184184

185-
- A pre-production instance, fully secured platform to use for testing new BIG-IP system updates and hotfixes
185+
- A pre-production instance for testing new BIG-IP system updates and hotfixes
186186

187-
At the same time, you should identify one or two applications that can be targeted for publishing via the BIG-IP and protecting with SHA.
187+
At the same time, you should identify one or two applications that can be published via the BIG-IP and protected with SHA.
188188

189189
Our recommendation is to start with an application that isn’t yet published via a BIG-IP, so as to avoid potential disruption to production services. The guidelines mentioned in this article will help you get acquainted with the general procedure for creating the various BIG-IP configuration objects and setting up SHA. Once complete you should be able to do the same with any other new services, plus also have enough knowledge to convert existing BIG-IP published services over to SHA with minimal effort.
190190

191-
The below interactive guide walks through the high-level procedure for implementing SHA and seeing the end-user experience.
191+
The below interactive guide walks through the high-level procedure for implementing SHA using a non Easy Button template, and seeing the end-user experience.
192192

193193
[![The image shows interactive guide cover](media/f5-aad-integration/interactive-guide.png)](https://aka.ms/Secure-Hybrid-Access-F5-Interactive-Guide)

articles/cognitive-services/language-service/language-detection/includes/quickstarts/rest-api.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -15,6 +15,7 @@ ms.custom: ignite-fall-2021
1515

1616
## Prerequisites
1717

18+
* Azure subscription - [Create one for free](https://azure.microsoft.com/free/cognitive-services)
1819
* The current version of [cURL](https://curl.haxx.se/).
1920
* Once you have your Azure subscription, <a href="https://ms.portal.azure.com/#create/Microsoft.CognitiveServicesTextAnalytics" title="Create a Language resource" target="_blank">create a Language resource </a> in the Azure portal to get your key and endpoint. After it deploys, click **Go to resource**.
2021
* You will need the key and endpoint from the resource you create to connect your application to the API. You'll paste your key and endpoint into the code below later in the quickstart.

articles/defender-for-cloud/defender-for-storage-exclude.md

Lines changed: 50 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Microsoft Defender for Storage - excluding a storage account
33
description: Excluding a specific storage account from a subscription with Microsoft Defender for Storage enabled.
4-
ms.date: 01/16/2022
4+
ms.date: 02/06/2022
55
ms.topic: how-to
66
---
77
# Exclude a storage account from Microsoft Defender for Storage protections
@@ -106,15 +106,60 @@ To exclude specific storage accounts from Microsoft Defender for Storage when th
106106
107107
---
108108
109-
110109
## Exclude an Azure Databricks Storage account
111110
112-
When Defender for Storage is enabled on a subscription, it's not currently possible to exclude a Storage account if it belongs to an Azure Databricks workspace.
111+
### Exclude an active Databricks workspace
112+
113+
Microsoft Defender for Storage can exclude specific active Databricks workspace storage accounts, when the plan is already enabled on a subscription.
114+
115+
**To exclude an active Databricks workspace**:
116+
117+
1. Sign in to the [Azure portal](https://portal.azure.com).
118+
119+
1. Navigate to **Azure Databricks** > **`Your Databricks workspace`** > **Tags**.
120+
121+
1. In the Name field, enter `AzDefenderPlanAutoEnable`.
122+
123+
1. In the Value field, enter `off`.
124+
125+
1. Select **Apply**.
126+
127+
:::image type="content" source="media/defender-for-storage-exclude/workspace-exclude.png" alt-text="Screenshot showing the location, and how to apply the tag to your Azure Databricks account.":::
128+
129+
1. Navigate to **Microsoft Defender for Cloud** > **Environment settings** > **`Your subscription`**.
130+
131+
1. Toggle the Defender for Storage plan to **Off**.
132+
133+
:::image type="content" source="media/defender-for-storage-exclude/storage-off.png" alt-text="Screenshot showing how to switch the Defender for Storage plan to off.":::
134+
135+
1. Select **Save**.
136+
137+
1. Toggle the Defender for Storage plan to **On**.
138+
139+
1. Select **Save**.
140+
141+
The tags will be inherited by the Storage account of the Databricks workspace and prevent Defender for Storage from turning on.
142+
143+
> [!Note]
144+
> Tags can't be added directly to the Databricks Storage account, or its Managed Resource Group.
145+
146+
### Prevent auto-enabling on a new Databricks workspace storage account
147+
148+
When you create a new Databricks workspace, you have the ability to add a tag that will prevent your Microsoft Defender for Storage account from enabling automatically.
113149
114-
Instead, you can disable Defender for Storage on the subscription and enable Defender for Storage for each Azure Storage account from the **Security** page:
150+
**To prevent auto-enabling on a new Databricks workspace storage account**:
115151
116-
:::image type="content" source="media/defender-for-storage-exclude/defender-plan-enable-resource.png" alt-text="Screenshot of enabling Microsoft Defender for Storage from the security page of an Azure Storage account." lightbox="media/defender-for-storage-exclude/defender-plan-enable-resource.png":::
152+
1. Follow [these steps](/azure/databricks/scenarios/quickstart-create-Databricks-workspace-portal?tabs=azure-portal) to create a new Azure Databricks workspace.
153+
154+
1. In the Tags tab, enter a tag named `AzDefenderPlanAutoEnable`.
155+
156+
1. Enter the value `off`.
157+
158+
:::image type="content" source="media/defender-for-storage-exclude/tag-off.png" alt-text="Screenshot that shows how to create a tag in the Databricks workspace.":::
117159
160+
1. Continue following the instructions to create your new Azure Databricks workspace.
161+
162+
The Microsoft Defender for Storage account will inherit the tag of the Databricks workspace, which will prevent Defender for Storage from turning on automatically.
118163
119164
## Next steps
120165

articles/defender-for-cloud/kubernetes-workload-protections.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ Defender for Cloud offers more container security features if you enable Microso
2626
| Release state: | General availability (GA) |
2727
| Pricing: | Free for AKS workloads<br>For Azure Arc-enabled Kubernetes or EKS, it's billed according to the Microsoft Defender for Containers plan |
2828
| Required roles and permissions: | **Owner** or **Security admin** to edit an assignment<br>**Reader** to view the recommendations |
29-
| Environment requirements: | Kubernetes v1.14 (or higher) is required<br>No PodSecurityPolicy resource (old PSP model) on the clusters<br>Windows nodes are not supported |
29+
| Environment requirements: | Kubernetes v1.14 (or newer) is required<br>No PodSecurityPolicy resource (old PSP model) on the clusters<br>Windows nodes are not supported |
3030
| Clouds: | :::image type="icon" source="./media/icons/yes-icon.png"::: Commercial clouds<br>:::image type="icon" source="./media/icons/yes-icon.png"::: National (Azure Government, Azure China 21Vianet) |
3131
| | |
3232

141 KB
Loading
112 KB
Loading
264 KB
Loading

articles/defender-for-iot/organizations/how-to-create-attack-vector-reports.md

Lines changed: 13 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Create attack vector reports
33
description: Attack vector reports provide a graphical representation of a vulnerability chain of exploitable devices.
4-
ms.date: 11/09/2021
4+
ms.date: 02/03/2022
55
ms.topic: how-to
66
---
77

@@ -13,26 +13,25 @@ Attack vector reports provide a graphical representation of a vulnerability chai
1313

1414
Working with the attack vector lets you evaluate the effect of mitigation activities in the attack sequence. You can then determine, for example, if a system upgrade disrupts the attacker's path by breaking the attack chain, or if an alternate attack path remains. This information helps you prioritize remediation and mitigation activities.
1515

16-
:::image type="content" source="media/how-to-generate-reports/control-center.png" alt-text="View your alerts in the control center.":::
17-
1816
> [!NOTE]
1917
> Administrators and security analysts can perform the procedures described in this section.
2018
2119
## Create an attack vector report
2220

23-
To create an attack vector simulation:
21+
This section describes how to create Attack Vector reports.
2422

25-
1. Select :::image type="content" source="media/how-to-generate-reports/plus.png" alt-text="Plus sign":::on the side menu to add a Simulation.
23+
**To create an attack vector simulation:**
2624

27-
:::image type="content" source="media/how-to-generate-reports/vector.png" alt-text="The attack vector simulation.":::
25+
1. Select **Attack vector** from the sensor side menu.
26+
1. Select **Add simulation**.
2827

2928
2. Enter simulation properties:
3029

3130
- **Name**: Simulation name.
3231

3332
- **Maximum vectors**: The maximum number of vectors in a single simulation.
3433

35-
- **Show in Device map**: Show the attack vector as a filter on the device map.
34+
- **Show in Device map**: Show the attack vector as a group in the Device map.
3635

3736
- **All Source devices**: The attack vector will consider all devices as an attack source.
3837

@@ -46,19 +45,15 @@ To create an attack vector simulation:
4645

4746
- **Exclude Subnets**: Specified subnets will be excluded from the attack vector simulation.
4847

49-
3. Select **Add Simulation**. The simulation will be added to the simulations list.
50-
51-
:::image type="content" source="media/how-to-generate-reports/new-simulation.png" alt-text="Add a new simulation.":::
52-
53-
4. Select :::image type="icon" source="media/how-to-generate-reports/edit-a-simulation-icon.png" border="false"::: if you want to edit the simulation.
54-
55-
Select :::image type="icon" source="media/how-to-generate-reports/delete-simulation-icon.png" border="false"::: if you want to delete the simulation.
56-
57-
Select :::image type="icon" source="media/how-to-generate-reports/make-a-favorite-icon.png" border="false"::: if you want to mark the simulation as a favorite.
48+
3. Select **Save**.
49+
1. Select the report that is saved from the Attack vector page and review:
50+
- network attack paths and insights
51+
- a risk score
52+
- source and target devices
53+
- a graphical representation of attack vectors
5854

59-
5. A list of attack vectors appears and includes vector score (out of 100), attack source device, and attack target device. Select a specific attack for graphical depiction of attack vectors.
55+
:::image type="content" source="media/how-to-generate-reports/sample-attack-vectors.png" alt-text="Screen shot of Attack vectors report.":::
6056

61-
:::image type="content" source="media/how-to-generate-reports/sample-attack-vectors.png" alt-text="Attack vectors.":::
6257

6358
## See also
6459

0 commit comments

Comments
 (0)