Skip to content

Commit 315f714

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into ip-screenshots
2 parents 1b99b19 + 2dbf6bd commit 315f714

36 files changed

+116
-46
lines changed

articles/automation/TOC.yml

Lines changed: 0 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -273,11 +273,6 @@
273273
items:
274274
- name: Migration from Log Analytics to Azure Monitoring Agent version
275275
href: change-tracking/guidance-migration-log-analytics-monitoring-agent.md
276-
- name: Change Tracking and Inventory using Log Analytics (Retired)
277-
items:
278-
- name: Enable
279-
- name: Disable
280-
- name: Troubleshoot
281276
- name: Update Management (Retired)
282277
items:
283278
- name: Overview

articles/backup/backup-support-matrix-iaas.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Support matrix for Azure VM backups
33
description: Get a summary of support settings and limitations for backing up Azure VMs by using the Azure Backup service.
44
ms.topic: reference
5-
ms.date: 01/10/2025
5+
ms.date: 03/03/2025
66
ms.custom: references_regions, linux-related-content
77
ms.reviewer: nikhilsarode
88
ms.service: azure-backup
@@ -60,7 +60,7 @@ The following table summarizes the supported operating systems when you're backi
6060

6161
**Scenario** | **OS support**
6262
--- | ---
63-
Back up with the Azure VM agent extension for application-consistent backup | - Windows 11 client (64 bit only) <br/><br/> - Windows 10 client (64 bit only) <br/><br/>- Windows Server 2022 (Datacenter, Datacenter Core, and Standard) <br/><br/>- Windows Server 2019 (Datacenter, Datacenter Core, and Standard) <br/><br/> - Windows Server 2016 (Datacenter, Datacenter Core, and Standard) <br/><br/> - Windows Server 2012 R2 (Datacenter and Standard) <br/><br/> - Windows Server 2012 (Datacenter and Standard) <br/><br/> - Windows Server 2008 R2 (RTM and SP1 Standard) <br/><br/> - Windows Server 2008 (64 bit only) <br><br> Note that *32 bit Operating Systems* aren't supported.
63+
Back up with the Azure VM agent extension for application-consistent backup | - Windows 11 client (64 bit only) <br/><br/> - Windows 10 client (64 bit only) <br/><br/>- Windows Server 2025 (Datacenter, Datacenter Core, and Standard) <br/><br/>- Windows Server 2022 (Datacenter, Datacenter Core, and Standard) <br/><br/>- Windows Server 2019 (Datacenter, Datacenter Core, and Standard) <br/><br/> - Windows Server 2016 (Datacenter, Datacenter Core, and Standard) <br/><br/> - Windows Server 2012 R2 (Datacenter and Standard) <br/><br/> - Windows Server 2012 (Datacenter and Standard) <br/><br/> - Windows Server 2008 R2 (RTM and SP1 Standard) <br/><br/> - Windows Server 2008 (64 bit only) <br><br> Note that *32 bit Operating Systems* aren't supported.
6464
[Back up Azure VM directly using agentless crash-consistent backup](backup-azure-vms-agentless-multi-disk-crash-consistent-overview.md) | Agentless crash-consistent backups are operating system agnostic.
6565
Back up with the MARS agent | [Supported](backup-support-matrix-mars-agent.md#supported-operating-systems) operating systems
6666
Back up with DPM or MABS | Supported operating systems for backup with [MABS](backup-mabs-protection-matrix.md) and [DPM](/system-center/dpm/dpm-protection-matrix)

articles/governance/policy/concepts/assignment-structure.md

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -372,6 +372,12 @@ Assignments using a system-assigned managed identity must also specify a top-lev
372372
},
373373
```
374374

375+
> [!NOTE]
376+
>
377+
> For a `deployIfNotExists` policy, the assignment identity is always used for the ARM Template deployment. However, when the target resource is created or updated, the requestor's identity is used for the evaluation.
378+
>
379+
> For example, imagine a policy which deploys `Microsoft.Insights/diagnosticSettings` on `Microsoft.KeyVault/vaults`. When a key vault is created, the caller identity will be used to get the `Microsoft.Insights/diagnosticSettings` resources to evaluate the existence condition of the policy definition. If the conditions are met, then the policy assignment's identity will be used to deploy the diagnostic settings on the key vault. This means that the caller would need `Microsoft.Insights/diagnosticSettings/read permissions`, and the assignment would need `Microsoft.Insights/diagnosticSettings/write permissions`.
380+
375381
## Next steps
376382

377383
- Learn about the [policy definition structure](./definition-structure-basics.md).

articles/governance/policy/how-to/remediate-resources.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,9 @@ Resources that are non-compliant to policies with `deployIfNotExists` or `modify
1212

1313
## How remediation access control works
1414

15-
When Azure Policy starts a template deployment when evaluating `deployIfNotExists` policies or modifies a resource when evaluating `modify` policies, it does so using a [managed identity](/entra/identity/managed-identities-azure-resources/overview) associated with the policy assignment. Policy assignments use managed identities for Azure resource authorization. You can use either a system-assigned managed identity created by the policy service or a user-assigned identity provided by the user. The managed identity needs to be assigned the minimum Azure role-based access control (Azure RBAC) role required to remediate resources. If the managed identity is missing roles, an error is displayed in the portal during the assignment of the policy or an initiative. When you use the portal, Azure Policy automatically grants the managed identity the listed roles once assignment starts. When you use an Azure software development kit (SDK), the roles must manually be granted to the managed identity. The _location_ of the managed identity doesn't affect its operation with Azure Policy.
15+
When Azure Policy starts a template deployment when evaluating `deployIfNotExists` policies or modifies a resource when evaluating `modify` policies, it does so using a [managed identity](/entra/identity/managed-identities-azure-resources/overview) associated with the policy assignment. Note that while the assignment's identity is used for resource deployment or modification, it is not used for evaluation of the policy definition and its existence condition. Policy evalutation uses the identity of the caller that initiated the API request.
16+
17+
Policy assignments use managed identities for Azure resource authorization during remediation. You can use either a system-assigned managed identity created by the policy service or a user-assigned identity provided by the user. The managed identity needs to be assigned the minimum Azure role-based access control (Azure RBAC) role required to remediate resources. If the managed identity is missing roles, an error is displayed in the portal during the assignment of the policy or an initiative. When you use the portal, Azure Policy automatically grants the managed identity the listed roles once assignment starts. When you use an Azure software development kit (SDK), the roles must manually be granted to the managed identity. The _location_ of the managed identity doesn't affect its operation with Azure Policy.
1618

1719
> [!NOTE]
1820
> Changing a policy definition does not automatically update the assignment or the associated managed identity.

articles/peering-service/TOC.yml

Lines changed: 7 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -3,19 +3,16 @@
33
- name: Overview
44
items:
55
- name: About Peering Service
6-
href: about.md
6+
href: about.md
7+
expanded: true
78
- name: Concepts
89
items:
9-
- name: Peering Service FAQ
10+
- name: FAQ
1011
href: faq.yml
1112
- name: Locations and partners
1213
href: location-partners.md
1314
- name: Peering Service connection
1415
href: connection.md
15-
- name: Security
16-
items:
17-
- name: Security baseline
18-
href: /security/benchmark/azure/baselines/microsoft-azure-peering-service-security-baseline?toc=/azure/peering-service/TOC.json
1916
- name: Peering service prefix requirements
2017
href: peering-service-prefix-requirements.md
2118
- name: How-to-guides
@@ -32,6 +29,10 @@
3229
href: connection-telemetry.md
3330
- name: Azure Peering Service customer walkthrough
3431
href: customer-walkthrough.md
32+
- name: Security
33+
items:
34+
- name: Security baseline
35+
href: /security/benchmark/azure/baselines/microsoft-azure-peering-service-security-baseline?toc=/azure/peering-service/TOC.json
3536
- name: References
3637
items:
3738
- name: Azure PowerShell

articles/peering-service/azure-portal.md

Lines changed: 3 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: halkazwini
55
ms.author: halkazwini
66
ms.service: azure-peering-service
77
ms.topic: how-to
8-
ms.date: 03/07/2024
8+
ms.date: 03/03/2025
99

1010
#CustomerIntent: As an administrator, I want to learn how to create and manage a Peering Service connection using the Azure portal so I can enhance the connectivity to Microsoft services over the public internet.
1111
---
@@ -30,7 +30,7 @@ Sign in to the [Azure portal](https://portal.azure.com).
3030

3131
1. In the search box at the top of the portal, enter *Peering Service*. Select **Peering Services** in the search results.
3232

33-
:::image type="content" source="./media/azure-portal/peering-service-portal-search.png" alt-text="Screenshot shows how to search for Peering Service in the Azure portal." lightbox="./media/azure-portal/peering-service-portal-search.png":::
33+
:::image type="content" source="./media/peering-services-portal-search.png" alt-text="Screenshot shows how to search for Peering Service in the Azure portal." lightbox="./media/peering-services-portal-search.png":::
3434

3535
1. Select **+ Create**.
3636

@@ -43,8 +43,6 @@ Sign in to the [Azure portal](https://portal.azure.com).
4343
| Resource Group | Select **Create new**. </br> Enter *myResourceGroup*. </br> Select **OK**. |
4444
| **Instance details** | |
4545
| Name | Enter *myPeeringService*. |
46-
47-
:::image type="content" source="./media/azure-portal/peering-service-basics.png" alt-text="Screenshot of the Basics tab of Create a peering service connection in Azure portal.":::
4846

4947
1. Select **Next: Configuration**.
5048

@@ -64,8 +62,6 @@ Sign in to the [Azure portal](https://portal.azure.com).
6462

6563
1. Review the settings, and then select **Create**.
6664

67-
:::image type="content" source="./media/azure-portal/peering-service-create.png" alt-text="Screenshot of the Review + create tab of Create a peering service connection in Azure portal.":::
68-
6965
1. After you create a Peering Service connection, more validation is performed on the included prefixes. You can review the validation status under the **Prefixes** section of your Peering Service.
7066

7167
:::image type="content" source="./media/azure-portal/peering-service-prefix-validation.png" alt-text="Screenshot shows the validation status of the prefixes." lightbox="./media/azure-portal/peering-service-prefix-validation.png":::
@@ -100,9 +96,7 @@ Review the [Technical requirements for Peering Service prefixes](../internet-pee
10096

10197
1. Select the checkbox next to the Peering Service that you want to delete, and then select **Delete** at the top of the page.
10298

103-
1. Enter *yes* in **Confirm delete**, and then select **Delete**.
104-
105-
:::image type="content" source="./media/azure-portal/peering-service-delete.png" alt-text="Screenshot of deleting a Peering Service in Azure portal.":::
99+
1. Enter ***yes*** in **Confirm delete**, and then select **Delete**.
106100

107101
## Modify the primary or backup peering location
108102

articles/peering-service/cli.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: halkazwini
55
ms.author: halkazwini
66
ms.service: azure-peering-service
77
ms.topic: how-to
8-
ms.date: 02/08/2024
8+
ms.date: 03/03/2025
99
ms.custom: devx-track-azurecli
1010

1111
#CustomerIntent: As an administrator, I want to learn how to create and manage a Peering Service connection using the Azure CLI so I can enhance the connectivity to Microsoft services over the public internet.

articles/peering-service/connection-telemetry.md

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: peering-service
66
author: halkazwini
77
ms.service: azure-peering-service
88
ms.topic: how-to
9-
ms.date: 10/07/2024
9+
ms.date: 03/03/2025
1010
ms.author: halkazwini
1111

1212
# Customer intent: Customer wants to access their connection telemetry per prefix to Microsoft services with Azure Peering Service.
@@ -30,12 +30,10 @@ To view the latency report for a specific Peering Service connection, follow the
3030

3131
1. In the search box at the top of the portal, enter *Peering Service*. Select **Peering Services** in the search results.
3232

33-
:::image type="content" source="./media/connection-telemetry/peering-service-portal-search.png" alt-text="Screenshot shows how to search for Peering Service in the Azure portal." lightbox="./media/connection-telemetry/peering-service-portal-search.png":::
33+
:::image type="content" source="./media/peering-services-portal-search.png" alt-text="Screenshot shows how to search for Peering Service in the Azure portal." lightbox="./media/peering-services-portal-search.png":::
3434

3535
1. Select the Peering Service connection that you want to view its latency report.
3636

37-
:::image type="content" source="./media/connection-telemetry/peering-service-connection-page.png" alt-text="Screenshot shows the selected Peering Service in the Azure portal." lightbox="./media/connection-telemetry/peering-service-connection-page.png":::
38-
3937
1. Under **Settings**, select **Prefixes** to see the prefixes associated with the Peering Service connection.
4038

4139
:::image type="content" source="./media/connection-telemetry/peering-service-prefixes.png" alt-text="Screenshot shows the prefixes associated with the Peering Service connection in the Azure portal." lightbox="./media/connection-telemetry/peering-service-prefixes.png":::

articles/peering-service/customer-walkthrough.md

Lines changed: 3 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: halkazwini
55
ms.author: halkazwini
66
ms.service: azure-peering-service
77
ms.topic: how-to
8-
ms.date: 10/07/2024
8+
ms.date: 03/03/2025
99
---
1010

1111
# Azure Peering Service customer walkthrough
@@ -22,20 +22,16 @@ To activate the prefix, follow these steps:
2222

2323
1. In the search box at the top of the portal, enter *peering service*. Select **Peering Services** in the search results.
2424

25-
:::image type="content" source="./media/customer-walkthrough/peering-service-portal-search.png" alt-text="Screenshot shows how to search for Peering Service in the Azure portal.":::
25+
:::image type="content" source="./media/peering-services-portal-search.png" alt-text="Screenshot shows how to search for Peering Service in the Azure portal." lightbox="./media/peering-services-portal-search.png":::
2626

2727
1. Select **+ Create** to create a new Peering Service connection.
2828

29-
:::image type="content" source="./media/customer-walkthrough/peering-service-list.png" alt-text="Screenshot shows the list of existing Peering Service connections in the Azure portal.":::
30-
3129
1. In the **Basics** tab, enter or select your subscription, resource group, and Peering Service connection name.
3230

33-
:::image type="content" source="./media/customer-walkthrough/peering-service-basics.png" alt-text="Screenshot shows the Basics tab of creating a Peering Service connection in the Azure portal.":::
34-
3531
1. In the **Configuration** tab, provide details on the location, provider, and primary and backup interconnect locations. If the backup location is set to **None**, the traffic fails over to the internet.
3632

3733
> [!NOTE]
38-
> - The prefix key should be the same as the one obtained from your Peering Service provider.
34+
> The prefix key should be the same as the one obtained from your Peering Service provider.
3935
4036
:::image type="content" source="./media/customer-walkthrough/peering-service-configuration.png" alt-text="Screenshot shows the Configuration tab of creating a Peering Service connection in the Azure portal.":::
4137

Binary file not shown.

0 commit comments

Comments
 (0)