Skip to content

Commit 3a022ef

Browse files
committed
update defender procedure & screenshots
1 parent 563a3cc commit 3a022ef

10 files changed

+11
-17
lines changed

articles/storage/blobs/lifecycle-management-overview.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ description: Use Azure Storage lifecycle management policies to create automated
55
author: tamram
66

77
ms.author: tamram
8-
ms.date: 05/05/2022
8+
ms.date: 05/09/2022
99
ms.service: storage
1010
ms.subservice: common
1111
ms.topic: conceptual
@@ -378,7 +378,7 @@ This table shows how this feature is supported in your account and the impact on
378378

379379
The lifecycle management feature is available in all Azure regions.
380380

381-
Lifecycle management policies are free of charge. Customers are billed for standard operation costs for the [Set Blob Tier](/rest/api/storageservices/set-blob-tier) API calls. Delete operations are free.
381+
Lifecycle management policies are free of charge. Customers are billed for standard operation costs for the [Set Blob Tier](/rest/api/storageservices/set-blob-tier) API calls. Delete operations are free. However, other Azure services and utilities such as [Microsoft Defender for Storage](../../defender-for-cloud/defender-for-storage-introduction.md) may charge for operations that are managed through a lifecycle policy.
382382

383383
Each update to a blob's last access time is billed under the [other operations](https://azure.microsoft.com/pricing/details/storage/blobs/) category.
384384

articles/storage/blobs/storage-blob-customer-provided-key.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: tamram
66

77
ms.service: storage
88
ms.topic: how-to
9-
ms.date: 12/18/2020
9+
ms.date: 05/09/2022
1010
ms.author: tamram
1111
ms.reviewer: ozgun
1212
ms.subservice: common

articles/storage/common/azure-defender-storage-configure.md

Lines changed: 6 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ author: tamram
88
ms.service: storage
99
ms.subservice: common
1010
ms.topic: conceptual
11-
ms.date: 03/30/2021
11+
ms.date: 05/09/2022
1212
ms.author: tamram
1313
ms.reviewer: ozgun
1414
ms.custom: devx-track-azurepowershell
@@ -79,17 +79,15 @@ Use an Azure Resource Manager template to deploy an Azure Storage account with M
7979
Use an Azure Policy to enable Microsoft Defender for Cloud across storage accounts under a specific subscription or resource group.
8080

8181
1. Launch the Azure **Policy - Definitions** page.
82-
1. Search for the **Deploy Microsoft Defender for Storage accounts** policy.
82+
1. Search for the **Azure Defender for Storage should be enabled** policy, then select the policy to view the policy definition page.
8383

84-
:::image type="content" source="media/azure-defender-storage-configure/storage-atp-policy-definitions.png" alt-text="Apply policy to enable Microsoft Defender for Storage accounts":::
84+
:::image type="content" source="media/azure-defender-storage-configure/storage-defender-policy-definitions.png" alt-text="Locate built-in policy to enable Microsoft Defender for Storage for your storage accounts.":::
8585

86-
1. Select an Azure subscription or resource group.
86+
1. Select the **Assign** button for the built-in policy, then specify an Azure subscription. You can also optionally specify a resource group to further scope the policy assignment.
8787

88-
:::image type="content" source="media/azure-defender-storage-configure/storage-atp-policy2.png" alt-text="Select subscription or resource group for scope of policy ":::
88+
:::image type="content" source="media/azure-defender-storage-configure/storage-defender-policy-assignment.png" alt-text="Select subscription and optionally resource group to scope the policy assignment.":::
8989

90-
1. Assign the policy.
91-
92-
:::image type="content" source="media/azure-defender-storage-configure/storage-atp-policy1.png" alt-text="Assign policy to enable Microsoft Defender for Storage":::
90+
1. Select **Review + create** to review the policy and then create it.
9391

9492
### [PowerShell](#tab/azure-powershell)
9593

64.4 KB
Loading
45 KB
Loading

articles/storage/common/scalability-targets-standard-account.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ author: tamram
77

88
ms.service: storage
99
ms.topic: conceptual
10-
ms.date: 10/04/2021
10+
ms.date: 05/09/2022
1111
ms.author: tamram
1212
ms.subservice: common
1313
---

includes/azure-storage-account-limits-standard.md

Lines changed: 1 addition & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@
55
author: tamram
66
ms.service: storage
77
ms.topic: include
8-
ms.date: 10/04/2021
8+
ms.date: 05/09/2022
99
ms.author: tamram
1010
ms.custom: include file, references_regions
1111
---
@@ -30,13 +30,9 @@ Microsoft recommends that you use a GPv2 storage account for most scenarios. You
3030
| Default maximum egress for general-purpose v2 and Blob storage accounts in the following regions (LRS/GRS):<br /><ul><li>Australia East</li><li>Central US</li><li>East Asia</li><li>East US 2</li><li>Japan East</li><li>Korea Central</li><li>North Europe</li><li>South Central US</li><li>Southeast Asia</li><li>UK South</li><li>West Europe</li><li>West US</li></ul> | 120 Gbps<sup>1</sup> |
3131
| Default maximum egress for general-purpose v2 and Blob storage accounts in the following regions (ZRS): <ul><li>Australia East</li><li>Central US</li><li>East US</li><li>East US 2</li><li>Japan East</li><li>North Europe</li><li>South Central US</li><li>Southeast Asia</li><li>UK South</li><li>West Europe</li><li>West US 2</li></ul> | 120 Gbps<sup>1</sup> |
3232
| Default maximum egress for general-purpose v2 and Blob storage accounts in regions that aren't listed in the previous row. | 50 Gbps<sup>1</sup> |
33-
| Maximum egress for general-purpose v1 storage accounts (US regions) | 20 Gbps if RA-GRS/GRS is enabled, 30 Gbps for LRS/ZRS<sup>2</sup> |
34-
| Maximum egress for general-purpose v1 storage accounts (non-US regions) | 10 Gbps if RA-GRS/GRS is enabled, 15 Gbps for LRS/ZRS<sup>2</sup> |
3533
| Maximum number of IP address rules per storage account | 200 |
3634
| Maximum number of virtual network rules per storage account | 200 |
3735
| Maximum number of resource instance rules per storage account | 200 |
3836
| Maximum number of private endpoints per storage account | 200 |
3937

4038
<sup>1</sup> Azure Storage standard accounts support higher capacity limits and higher limits for ingress and egress by request. To request an increase in account limits, contact [Azure Support](https://azure.microsoft.com/support/faq/).
41-
42-
<sup>2</sup> If your storage account has read-access enabled with geo-redundant storage (RA-GRS) or geo-zone-redundant storage (RA-GZRS), then the egress targets for the secondary location are identical to the egress targets of the primary location. For more information, see [Azure Storage replication](../articles/storage/common/storage-redundancy.md).

0 commit comments

Comments
 (0)