Skip to content

Commit 324dbdd

Browse files
authored
Merge pull request #94593 from memildin/asc-melvyn-daily
Updated dates and removed a few instances of "ASC"
2 parents 40cab1e + b109376 commit 324dbdd

6 files changed

+16
-16
lines changed

articles/security-center/security-center-alerts-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: rkarlin
88
ms.assetid: 1b71e8ad-3bd8-4475-b735-79ca9963b823
99
ms.service: security-center
1010
ms.topic: conceptual
11-
ms.date: 10/16/2019
11+
ms.date: 11/04/2019
1212
ms.author: memildin
1313
---
1414
# Security alerts in Azure Security Center

articles/security-center/security-center-iaas-advanced-data.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -59,7 +59,7 @@ To connect the SQL Server’s host to a workspace, follow the instructions in [C
5959

6060
## Set up email notification for ATP alerts
6161

62-
You can set a list of recipients to receive an email notification when ASC alerts are generated. The email contains a direct link to the alert in Azure Security Center with all the relevant details.
62+
You can set a list of recipients to receive an email notification when Security Center alerts are generated. The email contains a direct link to the alert in Azure Security Center with all the relevant details.
6363

6464
1. Go to **Security Center** > **Pricing & settings** and click on the relevant subscription
6565

articles/security-center/security-center-just-in-time.md

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -57,12 +57,12 @@ There are three ways to configure a JIT policy on a VM:
5757
- [Configure JIT access in an Azure VM blade](#jit-vm)
5858
- [Configure a JIT policy on a VM programmatically](#jit-program)
5959

60-
## Configure JIT in ASC
60+
## Configure JIT in Security Center
6161

62-
From ASC, you can configure a JIT policy and request access to a VM using a JIT policy
62+
From Security Center, you can configure a JIT policy and request access to a VM using a JIT policy
6363

6464

65-
### Configure JIT access on a VM in ASC <a name="jit-asc"></a>
65+
### Configure JIT access on a VM in Security Center <a name="jit-asc"></a>
6666

6767
1. Open the **Security Center** dashboard.
6868

@@ -110,9 +110,9 @@ From ASC, you can configure a JIT policy and request access to a VM using a JIT
110110
>When JIT VM Access is enabled for a VM, Azure Security Center creates "deny all inbound traffic" rules for the selected ports in the network security groups associated and Azure Firewall with it. If other rules had been created for the selected ports, then the existing rules take priority over the new “deny all inbound traffic” rules. If there are no existing rules on the selected ports, then the new “deny all inbound traffic” rules take top priority in the Network Security Groups and Azure Firewall.
111111
112112

113-
## Request JIT access via ASC
113+
## Request JIT access via Security Center
114114

115-
To request access to a VM via ASC:
115+
To request access to a VM via Security Center:
116116

117117
1. Under **Just-in-time VM access**, select the **Configured** tab.
118118

@@ -136,7 +136,7 @@ To request access to a VM via ASC:
136136
> [!NOTE]
137137
> If a user who is requesting access is behind a proxy, the option **My IP** may not work. You may need to define the full IP address range of the organization.
138138
139-
## Edit a JIT access policy via ASC
139+
## Edit a JIT access policy via Security Center
140140

141141
You can change a VM's existing just-in-time policy by adding and configuring a new port to protect for that VM, or by changing any other setting related to an already protected port.
142142

@@ -147,7 +147,7 @@ To edit an existing just-in-time policy of a VM:
147147
1. Under **JIT VM access configuration**, you can either edit the existing settings of an already protected port or add a new custom port.
148148
![jit vm access](./media/security-center-just-in-time/edit-policy.png)
149149

150-
## Audit JIT access activity in ASC
150+
## Audit JIT access activity in Security Center
151151

152152
You can gain insights into VM activities using log search. To view logs:
153153

@@ -164,11 +164,11 @@ Modify the filters and click **Apply** to create a search and log.
164164

165165

166166

167-
## Configure JIT access in an Azure VM blade <a name="jit-vm"></a>
167+
## Configure JIT access from an Azure VM's page <a name="jit-vm"></a>
168168

169-
For your convenience, you can connect to a VM using JIT directly from within the VM blade in Azure.
169+
For your convenience, you can connect to a VM using JIT directly from within the VM's page in Security Center.
170170

171-
### Configure JIT access on a VM via the Azure VM blade
171+
### Configure JIT access on a VM via the Azure VM page
172172

173173
To make it easy to roll out just-in-time access across your VMs, you can set a VM to allow only just-in-time access directly from within the VM.
174174

articles/security-center/security-center-management-groups.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -164,7 +164,7 @@ Once the RBAC roles have been assigned to the users, the tenant administrator sh
164164
165165
166166
167-
## Adding subscriptions to a management groups
167+
## Adding subscriptions to a management group
168168
You can add subscriptions to the management group that you created. These steps aren't mandatory for gaining tenant-wide visibility and global policy and access management.
169169
170170
1. Under **Management Groups**, select a management group to add your subscription to.

articles/security-center/security-center-powershell-onboarding.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -26,13 +26,13 @@ This article provides a sample PowerShell script that can be modified and used i
2626

2727
In this example, we will enable Security Center on a subscription with ID: d07c0080-170c-4c24-861d-9c817742786c and apply the recommended settings that provide a high level of protection, by implementing the Standard tier of Security Center, which provides advanced threat protection and detection capabilities:
2828

29-
1. Set the [ASC standard level of protection](https://azure.microsoft.com/pricing/details/security-center/).
29+
1. Set the [Security Center standard level of protection](https://azure.microsoft.com/pricing/details/security-center/).
3030

3131
2. Set the Log Analytics workspace to which the Microsoft Monitoring Agent will send the data it collects on the VMs associated with the subscription – in this example, an existing user defined workspace (myWorkspace).
3232

3333
3. Activate Security Center’s automatic agent provisioning which [deploys the Microsoft Monitoring Agent](security-center-enable-data-collection.md#auto-provision-mma).
3434

35-
5. Set the organization’s [CISO as the security contact for ASC alerts and notable events](security-center-provide-security-contact-details.md).
35+
5. Set the organization’s [CISO as the security contact for Security Center alerts and notable events](security-center-provide-security-contact-details.md).
3636

3737
6. Assign Security Center’s [default security policies](tutorial-security-policy.md).
3838

articles/security-center/security-center-remediate-recommendations.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ ms.devlang: na
1111
ms.topic: conceptual
1212
ms.tgt_pltfrm: na
1313
ms.workload: na
14-
ms.date: 08/18/2019
14+
ms.date: 11/04/2019
1515
ms.author: memildin
1616

1717
---

0 commit comments

Comments
 (0)