Skip to content

Commit 3362208

Browse files
committed
added files
1 parent 1a66103 commit 3362208

10 files changed

+25
-25
lines changed

articles/security/fundamentals/antimalware-code-samples.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,15 +2,15 @@
22
title: Microsoft Antimalware code samples for Azure | Microsoft Docs
33
description: PowerShell code samples to enable and configure Microsoft Antimalware.
44
services: security
5-
author: terrylanfear
5+
author: msmbaldwin
66
manager: rkarlin
77

88
ms.assetid: 265683c8-30d7-4f2b-b66c-5082a18f7a8b
99
ms.service: security
1010
ms.subservice: security-fundamentals
1111
ms.topic: article
12-
ms.date: 01/25/2023
13-
ms.author: terrylan
12+
ms.date: 09/25/2024
13+
ms.author: mbaldwin
1414
ms.custom: devx-track-azurepowershell, devx-track-arm-template
1515
---
1616
# Enable and configure Microsoft Antimalware for Azure Resource Manager VMs

articles/security/fundamentals/azure-marketplace-images.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,14 +2,14 @@
22
title: Security Recommendations for Azure Marketplace Images | Microsoft Docs
33
description: This article provides recommendations for images included in the market place
44
services: security
5-
author: terrylanfear
5+
author: msmbaldwin
66
manager: rkarlin
77
ms.service: security
88
ms.subservice: security-fundamentals
99
ms.custom: linux-related-content
1010
ms.topic: article
11-
ms.date: 02/06/2024
12-
ms.author: terrylan
11+
ms.date: 09/06/2024
12+
ms.author: mbaldwin
1313
ms.reviewer: mattmcinnes
1414
---
1515
# Security Recommendations for Azure Marketplace Images

articles/security/fundamentals/backup-plan-to-protect-against-ransomware.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,11 @@
11
---
22
title: Azure backup and restore plan to protect against ransomware | Microsoft Docs
33
description: Learn what to do before and during a ransomware attack to protect your critical business systems and ensure a rapid recovery of business operations.
4-
author: TerryLanfear
4+
author: msmbaldwin
55
ms.service: security
66
ms.subservice: security-fundamentals
77
ms.topic: article
8-
ms.author: terrylan
8+
ms.author: mbaldwin
99
manager: rkarlin
1010
ms.date: 06/27/2024
1111
---

articles/security/fundamentals/best-practices-and-patterns.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,14 @@
11
---
22
title: Security best practices and patterns - Microsoft Azure | Microsoft Docs
33
description: This article links you to security best practices and patterns for different Azure resources.
4-
author: TerryLanfear
4+
author: msmbaldwin
55
manager: rkarlin
66
ms.assetid: 1cbbf8dc-ea94-4a7e-8fa0-c2cb198956c5
77
ms.service: security
88
ms.subservice: security-fundamentals
99
ms.topic: conceptual
10-
ms.date: 03/27/2024
11-
ms.author: terrylan
10+
ms.date: 09/27/2024
11+
ms.author: mbaldwin
1212

1313
---
1414
# Azure security best practices and patterns

articles/security/fundamentals/cyber-services.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,15 +2,15 @@
22
title: Microsoft Services in Cybersecurity | Microsoft Docs
33
description: The article provides an introduction about Microsoft services related to cybersecurity and how to obtain more information about these services.
44
services: security
5-
author: TerryLanfear
5+
author: msmbaldwin
66
manager: rkarlin
77

88
ms.assetid: 925ba3c6-fe35-413a-98ea-e1a1461f3022
99
ms.service: security
1010
ms.subservice: security-fundamentals
1111
ms.topic: article
1212
ms.date: 06/28/2024
13-
ms.author: terrylan
13+
ms.author: mbaldwin
1414

1515
---
1616
# Microsoft Services in Cybersecurity

articles/security/fundamentals/data-encryption-best-practices.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,15 +2,15 @@
22
title: Data security and encryption best practices - Microsoft Azure
33
description: This article provides a set of best practices for data security and encryption using built in Azure capabilities.
44
services: security
5-
author: TerryLanfear
5+
author: msmbaldwin
66
manager: rkarlin
77

88
ms.assetid: 17ba67ad-e5cd-4a8f-b435-5218df753ca4
99
ms.service: security
1010
ms.subservice: security-fundamentals
1111
ms.topic: article
12-
ms.date: 03/27/2024
13-
ms.author: terrylan
12+
ms.date: 09/27/2024
13+
ms.author: mbaldwin
1414

1515
---
1616
# Azure data security and encryption best practices

articles/security/fundamentals/database-security-checklist.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,14 +2,14 @@
22
title: Azure database security checklist| Microsoft Docs
33
description: Use the Azure database security checklist to make sure that you address important cloud computing security issues.
44
services: security
5-
author: terrylanfear
5+
author: msmbaldwin
66
manager: rkarlin
77

88
ms.service: security
99
ms.subservice: security-fundamentals
1010
ms.topic: article
11-
ms.date: 01/29/2023
12-
ms.author: terrylan
11+
ms.date: 09/29/2024
12+
ms.author: mbaldwin
1313
---
1414

1515
# Azure database security checklist

articles/security/fundamentals/double-encryption.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,15 +2,15 @@
22
title: Double Encryption in Microsoft Azure
33
description: This article describes how Microsoft Azure provides double encryption for data at rest and data in transit.
44
services: security
5-
author: TerryLanfear
5+
author: msmbaldwin
66
manager: rkarlin
77

88
ms.assetid: 9dcb190e-e534-4787-bf82-8ce73bf47dba
99
ms.service: security
1010
ms.subservice: security-fundamentals
1111
ms.topic: article
1212
ms.date: 06/27/2024
13-
ms.author: terrylan
13+
ms.author: mbaldwin
1414
---
1515
# Double encryption
1616
Double encryption is where two or more independent layers of encryption are enabled to protect against compromises of any one layer of encryption. Using two layers of encryption mitigates threats that come with encrypting data. For example:

articles/security/fundamentals/end-to-end.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,15 +2,15 @@
22
title: End-to-end security in Azure | Microsoft Docs
33
description: The article provides a map of Azure services that help you secure and protect your cloud resources and detect and investigate threats.
44
services: security
5-
author: TerryLanfear
5+
author: msmbaldwin
66
manager: rkarlin
77

88
ms.assetid: a5a7f60a-97e2-49b4-a8c5-7c010ff27ef8
99
ms.service: security
1010
ms.subservice: security-fundamentals
1111
ms.topic: conceptual
1212
ms.date: 06/28/2024
13-
ms.author: terrylan
13+
ms.author: mbaldwin
1414

1515
---
1616
# End-to-end security in Azure

articles/security/fundamentals/feature-availability.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,9 @@
11
---
22
title: Cloud feature availability for commercial and US Government customers
33
description: This article describes security feature availability in Azure and Azure Government clouds
4-
author: TerryLanfear
4+
author: msmbaldwin
55
manager: rkarlin
6-
ms.author: terrylan
6+
ms.author: mbaldwin
77
ms.service: security
88
ms.subservice: security-fundamentals
99
ms.topic: feature-availability

0 commit comments

Comments
 (0)