You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/manage-apps/f5-aad-integration.md
+18-18Lines changed: 18 additions & 18 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -28,9 +28,7 @@ Having Azure AD pre-authenticate access to BIG-IP published services provides ma
28
28
29
29
- Preemptive [Conditional Access](../conditional-access/overview.md) and [Azure AD Multi-Factor Authentication (MFA)](../authentication/concept-mfa-howitworks.md)
30
30
31
-
-[Identity Protection](../identity-protection/overview-identity-protection.md) - Adaptive control through user and session risk profiling
-[Identity Protection](../identity-protection/overview-identity-protection.md) - Adaptive protection through user and session risk profiling, plus [Leaked credential detection](../identity-protection/concept-identity-protection-risks.md)
@@ -77,15 +75,15 @@ Whether a direct employee, affiliate, or consumer, most users are already acquai
77
75
78
76
Users now find their BIG-IP published services consolidated in the [MyApps](https://support.microsoft.com/account-billing/sign-in-and-start-apps-from-the-my-apps-portal-2f3b1bae-0e5a-4a86-a33e-876fbd2a4510) or [O365 launchpads](https://airhead.io/airbase/launchpads/R3kW-RkDFEedipcU1AFlnA) along with self-service capabilities to a broader set of services, no matter the type of device or location. Users can even continue accessing published services directly via the BIG-IPs proprietary Webtop portal, if preferred. When logging off, SHA ensures a users’ session is terminated at both ends, the BIG-IP and Azure AD, ensuring services remain fully protected from unauthorized access.
79
77
80
-
The screenshots provided are from the Azure AD app portal that users access securely to find their BIG-IP published services and for managing their account properties.
78
+
Users access the Microsoft MyApps portal to easily find their BIG-IP published services and for managing their account properties.
A BIG-IP’s role is critical to any business, so deployed BIG-IP instances should be monitored to ensure published services are highly available, both at an SHA level and operationally too.
86
+
A BIG-IP’s role is critical to any business, so deployed BIG-IP instances can be monitored to ensure published services are highly available, both at an SHA level and operationally too.
89
87
90
88
Several options exist for logging events either locally, or remotely through a Security Information and Event Management (SIEM) solution, enabling off-box storage and processing of telemetry. A highly effective solution for monitoring Azure AD and SHA-specific activity, is to use [Azure Monitor](../../azure-monitor/overview.md) and [Microsoft Sentinel](../../sentinel/overview.md), together offering:
91
89
@@ -97,7 +95,7 @@ Several options exist for logging events either locally, or remotely through a S
97
95
98
96
## Prerequisites
99
97
100
-
Integrating F5 BIG-IP with Azure AD for SHA have the following pre-requisites:
98
+
Integrating an F5 BIG-IP with Azure AD for SHA has the following pre-requisites:
101
99
102
100
- An F5 BIG-IP instance running on either of the following platforms:
103
101
@@ -111,13 +109,13 @@ Integrating F5 BIG-IP with Azure AD for SHA have the following pre-requisites:
111
109
112
110
- An active F5 BIG-IP APM license, through one of the following options:
- F5 BIG-IP Access Policy Manager™ (APM) add-on license on an existing BIG-IP F5 BIG-IP® Local Traffic Manager™ (LTM)
116
+
- F5 BIG-IP Access Policy Manager™ (APM) add-on license on an existing BIG-IP F5 BIG-IP® Local Traffic Manager™ (LTM)
119
117
120
-
- A 90-day BIG-IP Access Policy Manager™ (APM) [trial license](https://www.f5.com/trial/big-ip-trial.php)
118
+
- A 90-day BIG-IP Access Policy Manager™ (APM) [trial license](https://www.f5.com/trial/big-ip-trial.php)
121
119
122
120
- Azure AD licensing through either of the following options:
123
121
@@ -130,7 +128,7 @@ No previous experience or F5 BIG-IP knowledge is necessary to implement SHA, but
130
128
## Configuration scenarios
131
129
132
130
Configuring a BIG-IP for SHA is achieved using any of the many available methods, including several template based options, or a manual configuration.
133
-
The following tutorials provide detailed guidance on implementing some of the more common patterns for BIG-IP and Azure AD SHA, using these methods.
131
+
The following tutorials provide detailed guidance on implementing some of the more common patterns for BIG-IP and Azure AD secure hybrid access.
134
132
135
133
**Advanced configuration**
136
134
@@ -154,7 +152,7 @@ Refer to the following advanced configuration tutorials for your integration req
154
152
155
153
The Guided Configuration wizard, available from BIG-IP version 13.1 aims to minimize time and effort implementing common BIG-IP publishing scenarios. Its workflow-based framework provides an intuitive deployment experience tailored to specific access topologies.
156
154
157
-
The latest version of the Guided Configuration 16.1 now offers an Easy Button feature. With **Easy Button**, admins no longer go back and forth between Azure AD and a BIG-IP to enable services for SHA. The end-to-end deployment and policy management is handled directly between the APM’s Guided Configuration wizard and Microsoft Graph. This rich integration between BIG-IP APM and Azure AD ensures applications can quickly, easily support identity federation, SSO, and Azure AD Conditional Access, without management overhead of having to do so on a per app basis.
155
+
Version 16.x of the Guided Configuration now offers an Easy Button feature. With **Easy Button**, admins no longer go back and forth between Azure AD and a BIG-IP to enable services for SHA. The end-to-end deployment and policy management is handled directly between the APM’s Guided Configuration wizard and Microsoft Graph. This rich integration between BIG-IP APM and Azure AD ensures applications can quickly, easily support identity federation, SSO, and Azure AD Conditional Access, without management overhead of having to do so on a per app basis.
158
156
159
157
Refer to the following guided configuration tutorials using Easy Button templates for your integration requirements:
160
158
@@ -164,7 +162,9 @@ Refer to the following guided configuration tutorials using Easy Button template
164
162
165
163
-[F5 BIG-IP Easy Button for SSO to header-based and LDAP applications](f5-big-ip-ldap-header-easybutton.md)
166
164
167
-
-[F5 BIG-IP Easy Button for SSO to Oracle EBS (Enterprise Business Suite)](f5-big-ip-oracle-enterprise-business-suite-easy-button.md)
165
+
-[BIG-IP Easy Button for SSO to Oracle EBS (Enterprise Business Suite)](f5-big-ip-oracle-enterprise-business-suite-easy-button.md)
166
+
167
+
-[BIG-IP Easy Button for SSO to Oracle JD Edwards](f5-big-ip-oracle-jde-easy-button.md)
168
168
169
169
## Additional resources
170
170
@@ -178,16 +178,16 @@ Refer to the following guided configuration tutorials using Easy Button template
178
178
179
179
## Next steps
180
180
181
-
Consider running an SHA Proof of concept (POC) using your existing BIG-IP infrastructure, or by deploying a trial instance. [Deploying a BIG-IP Virtual Edition (VE) VM into Azure](f5-bigip-deployment-guide.md) takes approximately 30 minutes, at which point you'll have:
181
+
Consider running an SHA Proof of concept (POC) using your existing BIG-IP infrastructure, or by [Deploying a BIG-IP Virtual Edition (VE) VM into Azure](f5-bigip-deployment-guide.md) takes approximately 30 minutes, at which point you'll have:
182
182
183
-
- A fully secured platform to model an SHA proof of concept
183
+
- A fully secured platform to model a SHA proof of concept
184
184
185
-
- A pre-production instance, fully secured platform to use for testing new BIG-IP system updates and hotfixes
185
+
- A pre-production instance for testing new BIG-IP system updates and hotfixes
186
186
187
-
At the same time, you should identify one or two applications that can be targeted for publishing via the BIG-IP and protecting with SHA.
187
+
At the same time, you should identify one or two applications that can be published via the BIG-IP and protected with SHA.
188
188
189
189
Our recommendation is to start with an application that isn’t yet published via a BIG-IP, so as to avoid potential disruption to production services. The guidelines mentioned in this article will help you get acquainted with the general procedure for creating the various BIG-IP configuration objects and setting up SHA. Once complete you should be able to do the same with any other new services, plus also have enough knowledge to convert existing BIG-IP published services over to SHA with minimal effort.
190
190
191
-
The below interactive guide walks through the high-level procedure for implementing SHA and seeing the end-user experience.
191
+
The below interactive guide walks through the high-level procedure for implementing SHA using a non Easy Button template, and seeing the end-user experience.
Copy file name to clipboardExpand all lines: articles/cognitive-services/language-service/language-detection/includes/quickstarts/rest-api.md
+1Lines changed: 1 addition & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,6 +15,7 @@ ms.custom: ignite-fall-2021
15
15
16
16
## Prerequisites
17
17
18
+
* Azure subscription - [Create one for free](https://azure.microsoft.com/free/cognitive-services)
18
19
* The current version of [cURL](https://curl.haxx.se/).
19
20
* Once you have your Azure subscription, <ahref="https://ms.portal.azure.com/#create/Microsoft.CognitiveServicesTextAnalytics"title="Create a Language resource"target="_blank">create a Language resource </a> in the Azure portal to get your key and endpoint. After it deploys, click **Go to resource**.
20
21
* You will need the key and endpoint from the resource you create to connect your application to the API. You'll paste your key and endpoint into the code below later in the quickstart.
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/defender-for-storage-exclude.md
+50-5Lines changed: 50 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,7 +1,7 @@
1
1
---
2
2
title: Microsoft Defender for Storage - excluding a storage account
3
3
description: Excluding a specific storage account from a subscription with Microsoft Defender for Storage enabled.
4
-
ms.date: 01/16/2022
4
+
ms.date: 02/06/2022
5
5
ms.topic: how-to
6
6
---
7
7
# Exclude a storage account from Microsoft Defender for Storage protections
@@ -106,15 +106,60 @@ To exclude specific storage accounts from Microsoft Defender for Storage when th
106
106
107
107
---
108
108
109
-
110
109
## Exclude an Azure Databricks Storage account
111
110
112
-
When Defender for Storage is enabled on a subscription, it's not currently possible to exclude a Storage account if it belongs to an Azure Databricks workspace.
111
+
### Exclude an active Databricks workspace
112
+
113
+
Microsoft Defender for Storage can exclude specific active Databricks workspace storage accounts, when the plan is already enabled on a subscription.
114
+
115
+
**To exclude an active Databricks workspace**:
116
+
117
+
1. Sign in to the [Azure portal](https://portal.azure.com).
1. In the Name field, enter `AzDefenderPlanAutoEnable`.
122
+
123
+
1. In the Value field, enter `off`.
124
+
125
+
1. Select **Apply**.
126
+
127
+
:::image type="content" source="media/defender-for-storage-exclude/workspace-exclude.png" alt-text="Screenshot showing the location, and how to apply the tag to your Azure Databricks account.":::
128
+
129
+
1. Navigate to **Microsoft Defender for Cloud** > **Environment settings** > **`Your subscription`**.
130
+
131
+
1. Toggle the Defender for Storage plan to **Off**.
132
+
133
+
:::image type="content" source="media/defender-for-storage-exclude/storage-off.png" alt-text="Screenshot showing how to switch the Defender for Storage plan to off.":::
134
+
135
+
1. Select **Save**.
136
+
137
+
1. Toggle the Defender for Storage plan to **On**.
138
+
139
+
1. Select **Save**.
140
+
141
+
The tags will be inherited by the Storage account of the Databricks workspace and prevent Defender for Storage from turning on.
142
+
143
+
> [!Note]
144
+
> Tags can't be added directly to the Databricks Storage account, or its Managed Resource Group.
145
+
146
+
### Prevent auto-enabling on a new Databricks workspace storage account
147
+
148
+
When you create a new Databricks workspace, you have the ability to add a tag that will prevent your Microsoft Defender for Storage account from enabling automatically.
113
149
114
-
Instead, you can disable Defender for Storage on the subscription and enable Defender for Storage for each Azure Storage account from the **Security** page:
150
+
**To prevent auto-enabling on a new Databricks workspace storage account**:
115
151
116
-
:::image type="content" source="media/defender-for-storage-exclude/defender-plan-enable-resource.png" alt-text="Screenshot of enabling Microsoft Defender for Storage from the security page of an Azure Storage account." lightbox="media/defender-for-storage-exclude/defender-plan-enable-resource.png":::
152
+
1. Follow [these steps](/azure/databricks/scenarios/quickstart-create-Databricks-workspace-portal?tabs=azure-portal) to create a new Azure Databricks workspace.
153
+
154
+
1. In the Tags tab, enter a tag named `AzDefenderPlanAutoEnable`.
155
+
156
+
1. Enter the value `off`.
157
+
158
+
:::image type="content" source="media/defender-for-storage-exclude/tag-off.png" alt-text="Screenshot that shows how to create a tag in the Databricks workspace.":::
117
159
160
+
1. Continue following the instructions to create your new Azure Databricks workspace.
161
+
162
+
The Microsoft Defender for Storage account will inherit the tag of the Databricks workspace, which will prevent Defender for Storage from turning on automatically.
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/kubernetes-workload-protections.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -26,7 +26,7 @@ Defender for Cloud offers more container security features if you enable Microso
26
26
| Release state: | General availability (GA) |
27
27
| Pricing: | Free for AKS workloads<br>For Azure Arc-enabled Kubernetes or EKS, it's billed according to the Microsoft Defender for Containers plan |
28
28
| Required roles and permissions: |**Owner** or **Security admin** to edit an assignment<br>**Reader** to view the recommendations |
29
-
| Environment requirements: | Kubernetes v1.14 (or higher) is required<br>No PodSecurityPolicy resource (old PSP model) on the clusters<br>Windows nodes are not supported |
29
+
| Environment requirements: | Kubernetes v1.14 (or newer) is required<br>No PodSecurityPolicy resource (old PSP model) on the clusters<br>Windows nodes are not supported |
30
30
| Clouds: | :::image type="icon" source="./media/icons/yes-icon.png"::: Commercial clouds<br>:::image type="icon" source="./media/icons/yes-icon.png"::: National (Azure Government, Azure China 21Vianet) |
Copy file name to clipboardExpand all lines: articles/defender-for-iot/organizations/how-to-create-attack-vector-reports.md
+13-18Lines changed: 13 additions & 18 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,7 +1,7 @@
1
1
---
2
2
title: Create attack vector reports
3
3
description: Attack vector reports provide a graphical representation of a vulnerability chain of exploitable devices.
4
-
ms.date: 11/09/2021
4
+
ms.date: 02/03/2022
5
5
ms.topic: how-to
6
6
---
7
7
@@ -13,26 +13,25 @@ Attack vector reports provide a graphical representation of a vulnerability chai
13
13
14
14
Working with the attack vector lets you evaluate the effect of mitigation activities in the attack sequence. You can then determine, for example, if a system upgrade disrupts the attacker's path by breaking the attack chain, or if an alternate attack path remains. This information helps you prioritize remediation and mitigation activities.
15
15
16
-
:::image type="content" source="media/how-to-generate-reports/control-center.png" alt-text="View your alerts in the control center.":::
17
-
18
16
> [!NOTE]
19
17
> Administrators and security analysts can perform the procedures described in this section.
20
18
21
19
## Create an attack vector report
22
20
23
-
To create an attack vector simulation:
21
+
This section describes how to create Attack Vector reports.
24
22
25
-
1. Select :::image type="content" source="media/how-to-generate-reports/plus.png" alt-text="Plus sign":::on the side menu to add a Simulation.
1. Select **Attack vector** from the sensor side menu.
26
+
1. Select **Add simulation**.
28
27
29
28
2. Enter simulation properties:
30
29
31
30
-**Name**: Simulation name.
32
31
33
32
-**Maximum vectors**: The maximum number of vectors in a single simulation.
34
33
35
-
-**Show in Device map**: Show the attack vector as a filter on the device map.
34
+
-**Show in Device map**: Show the attack vector as a group in the Device map.
36
35
37
36
-**All Source devices**: The attack vector will consider all devices as an attack source.
38
37
@@ -46,19 +45,15 @@ To create an attack vector simulation:
46
45
47
46
-**Exclude Subnets**: Specified subnets will be excluded from the attack vector simulation.
48
47
49
-
3. Select **Add Simulation**. The simulation will be added to the simulations list.
50
-
51
-
:::image type="content" source="media/how-to-generate-reports/new-simulation.png" alt-text="Add a new simulation.":::
52
-
53
-
4. Select :::image type="icon" source="media/how-to-generate-reports/edit-a-simulation-icon.png" border="false"::: if you want to edit the simulation.
54
-
55
-
Select :::image type="icon" source="media/how-to-generate-reports/delete-simulation-icon.png" border="false"::: if you want to delete the simulation.
56
-
57
-
Select :::image type="icon" source="media/how-to-generate-reports/make-a-favorite-icon.png" border="false"::: if you want to mark the simulation as a favorite.
48
+
3. Select **Save**.
49
+
1. Select the report that is saved from the Attack vector page and review:
50
+
- network attack paths and insights
51
+
- a risk score
52
+
- source and target devices
53
+
- a graphical representation of attack vectors
58
54
59
-
5. A list of attack vectors appears and includes vector score (out of 100), attack source device, and attack target device. Select a specific attack for graphical depiction of attack vectors.
55
+
:::image type="content" source="media/how-to-generate-reports/sample-attack-vectors.png" alt-text="Screen shot of Attack vectors report.":::
0 commit comments