Skip to content

Commit 3ab862f

Browse files
committed
Merge branch 'main' into release-aio-ga
2 parents 48add6f + 41fe0b0 commit 3ab862f

File tree

85 files changed

+378
-268
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

85 files changed

+378
-268
lines changed

articles/azure-vmware/azure-vmware-solution-platform-updates.md

Lines changed: 9 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -4,20 +4,26 @@ description: Learn about the platform updates to Azure VMware Solution.
44
ms.topic: reference
55
ms.custom: "references_regions, engagement-fy23"
66
ms.service: azure-vmware
7-
ms.date: 8/20/2024
7+
ms.date: 11/6/2024
88
---
99

1010
# What's new in Azure VMware Solution
1111

1212
Microsoft regularly applies important updates to the Azure VMware Solution for new features and software lifecycle management. You should receive a notification through Azure Service Health that includes the timeline of the maintenance. For more information, see [Host maintenance and lifecycle management](architecture-private-clouds.md#host-maintenance-and-lifecycle-management).
1313

14+
## November 2024
15+
16+
Azure VMware Solution is now ready to update all existing Azure Commercial customers from vSphere 7 to vSphere 8 (Stretched Clusters & Azure Government still pending). Over the coming months, all customers will receive a scheduling notice for this upgrade. If you want to prioritize your vSphere 8 upgrade, open a [Service Request](https://rc.portal.azure.com/#create/Microsoft.Support) with Microsoft requesting a "Priority vSphere 8 upgrade" for your private cloud. [Learn more](architecture-private-clouds.md#vmware-software-versions)
17+
18+
All new Azure VMware Solution private clouds are being deployed with VMware vSphere 8.0 version in [Microsoft Azure Government](https://azure.microsoft.com/explore/global-infrastructure/government/#why-azure). [Learn more](architecture-private-clouds.md#vmware-software-versions)
19+
1420
## October 2024
1521

16-
The VMware Cloud Foundations (VCF) license portability feature on Azure VMware Solution is to modernize your VMware workload by bringing your VCF entitlements to Azure VMware Solution and take advantage of incredible cost savings.
22+
The VMware Cloud Foundations (VCF) license portability feature on Azure VMware Solution allows you to bring your VCF entitlement to Azure VMware Solution and take advantage of potential cost savings.
1723

1824
## August 2024
1925

20-
All new Azure VMware Solution private clouds are being deployed with VMware vSphere 8.0 version in Azure Commercial. [Learn more](architecture-private-clouds.md#vmware-software-versions)
26+
All new Azure VMware Solution private clouds are being deployed with VMware vSphere 8.0 version in Azure Commercial (Stretched Clusters excluded). [Learn more](architecture-private-clouds.md#vmware-software-versions)
2127

2228
Azure VMware Solution was approved to be added as a service within the [DoD SRG Impact Level 4 (IL4)](/azure/azure-government/compliance/azure-services-in-fedramp-auditscope#azure-government-services-by-audit-scope) Provisional Authorization (PA) in [Microsoft Azure Government](https://azure.microsoft.com/explore/global-infrastructure/government/#why-azure).
2329

articles/data-factory/connector-deprecation-plan.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,18 +1,18 @@
11
---
2-
title: Planned connector deprecations for Azure Data Factory
3-
description: This page describes future deprecations for some connectors of Azure Data Factory.
2+
title: Upgrade plan for Azure Data Factory connectors
3+
description: This article describes future upgrades for some connectors of Azure Data Factory.
44
author: jianleishen
55
ms.author: jianleishen
66
ms.service: azure-data-factory
77
ms.subservice: data-movement
88
ms.topic: concept-article
99
ms.custom: references_regions
10-
ms.date: 10/16/2024
10+
ms.date: 11/06/2024
1111
---
1212

13-
# Planned connector deprecations for Azure Data Factory
13+
# Upgrade plan for Azure Data Factory connectors
1414

15-
This article describes future deprecations for some connectors of Azure Data Factory.
15+
This article describes future upgrades for some connectors of Azure Data Factory.
1616

1717
> [!NOTE]
1818
> "Deprecated" means we intend to remove the connector from a future release. Unless they are in *Preview*, connectors remain fully supported until they are officially deprecated. This deprecation notification can span a few months or longer. After removal, the connector will no longer work. This notice is to allow you sufficient time to plan and update your code before the connector is deprecated.

articles/defender-for-iot/organizations/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -359,6 +359,8 @@
359359
href: /legal/defender-for-iot/hardware-support-policy?toc=/azure/defender-for-iot/organizations/toc.json&bc=/azure/defender-for-iot/breadcrumb/toc.json
360360
- name: Corporate environments
361361
items:
362+
- name: HPE ProLiant DL360 Gen11
363+
href: appliance-catalog/hpe-proliant-dl360-gen11.md
362364
- name: HPE ProLiant DL360
363365
href: appliance-catalog/hpe-proliant-dl360.md
364366
- name: Dell PowerEdge R660
Lines changed: 153 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,153 @@
1+
---
2+
title: HPE ProLiant DL360 Gen 11 OT monitoring - Microsoft Defender for IoT
3+
description: Learn about the HPE ProLiant DL360 Gen 11 appliance when used for OT monitoring with Microsoft Defender for IoT.
4+
ms.date: 03/14/2024
5+
ms.topic: reference
6+
---
7+
8+
# HPE ProLiant DL360 Gen 11
9+
10+
This article describes the **HPE ProLiant DL360 Gen 11** appliance for OT sensors, customized for use with Microsoft Defender for IoT.
11+
12+
| Appliance characteristic |Details |
13+
|---------|---------|
14+
|**Hardware profile** | C5600 |
15+
|**Performance** | Max bandwidth: 3 Gbps <br> Max devices: 12,000 |
16+
|**Physical specifications** | Mounting: 1U|
17+
|**Status** | Supported, available preconfigured|
18+
19+
The following image displays the hardware elements on the HPE ProLiant DL360 Gen11 that are used by Defender for IoT:
20+
21+
:::image type="content" source="media/hpe-proliant-dl360-gen11/hpe-proliant-dl360-gen11.png" alt-text="Photo of the HPE ProLiant DL360 gen11." border="false":::
22+
23+
## Specifications
24+
25+
|Component |Specifications|
26+
|---------|---------|
27+
|**Chassis** |1U rack server |
28+
|**Physical Characteristics** | HPE DL360 Gen11 8SFF  |
29+
|**Processor** | INT Xeon-S 4510 CPU for HPE OEM |
30+
|**Chipset** | Intel C262|
31+
|**Memory** | 4 HPE 32GB (1x32GB) Dual Rank x8 DDR5-5600 CAS-46-45-45 EC8 Registered Smart Memory Kit |
32+
|**Storage**| 6 HPE 2.4TB SAS 12G Mission Critical 10K SFF BC 3-year Warranty 512e Multi Vendor HDD |
33+
|**Network controller**| On-board: 8 x 1 Gb |
34+
|**Management** | HPE iLO Advanced |
35+
|**Power** |HPE 800W Flex Slot Titanium Hot Plug Low Halogen Power Supply Kit |
36+
|**Rack support** | HPE 1U Rail 3 kit |
37+
38+
## HPE DL360 Gen 11 Plus (NHP 4SFF) - Bill of materials
39+
40+
|PN |Description |Quantity|
41+
|-------------- | --------------| --------- |
42+
|**P55428-B21** | HPE OEM ProLiant DL360 Gen11 SFF NC Configure-to-order Server |1|
43+
|**P55428-B21#B19** | HPE OEM ProLiant DL360 Gen11 SFF NC Configure-to-order Server |1|
44+
|**P67824-B21** | INT Xeon-S 4510 CPU for HPE OEM |2|
45+
|**P64706-B21** | HPE 32GB (1x32GB) Dual Rank x8 DDR5-5600 CAS-46-45-45 EC8 Registered Smart Memory Kit |4|
46+
|**P48896-B21** | HPE ProLiant DL360 Gen11 8SFF x4 U.3 Tri-Mode Backplane Kit |1|
47+
|**P28352-B21** | HPE 2.4TB SAS 12G Mission Critical 10K SFF BC 3-year Warranty 512e Multi Vendor HDD |6|
48+
|**P48901-B21** | HPE ProLiant DL360 Gen11 x16 Full Height Riser Kit |1|
49+
|**P51178-B21** | Broadcom BCM5719 Ethernet 1Gb 4-port BASE-T Adapter for HPE |1|
50+
|**P47789-B21** | HPE MR216i-o Gen11 x16 Lanes without Cache OCP SPDM Storage Controller |1|
51+
|**P10097-B21** | Broadcom BCM57416 Ethernet 10Gb 2-port BASE-T OCP3 Adapter for HPE |1|
52+
|**P48907-B21** | HPE ProLiant DL3X0 Gen11 1U Standard Fan Kit |1|
53+
|**P54697-B21** | HPE ProLiant DL3X0 Gen11 1U 2P Standard Fan Kit |1|
54+
|**865438-B21** | HPE 800W Flex Slot Titanium Hot Plug Low Halogen Power Supply Kit |2|
55+
|**AF573A** | HPE C13 - C14 WW 250V 10Amp Flint Gray 2.0m Jumper Cord |2|
56+
|**P48830-B21** | HPE ProLiant DL3XX Gen11 CPU2 to OCP2 x8 Enablement Kit |1|
57+
|**P52416-B21** | HPE ProLiant DL360 Gen11 OROC Tri-Mode Cable Kit |1|
58+
|**BD505A** | HPE iLO Advanced 1-server License with 3yr Support on iLO Licensed Features |1|
59+
|**P48904-B21** | HPE ProLiant DL3X0 Gen11 1U Standard Heat Sink Kit |2|
60+
|**P52341-B21** | HPE ProLiant DL3XX Gen11 Easy Install Rail 3 Kit |1|
61+
62+
## HPE ProLiant DL360 Gen 11 installation
63+
64+
This section describes how to install OT sensor software on the HPE ProLiant DL360 Gen 11 appliance and includes adjusting the appliance's BIOS configuration.
65+
66+
During this procedure, you configure the iLO port. We recommend that you also change the default password provided for the administrative user.
67+
68+
> [!NOTE]
69+
> Installation procedures are only relevant if you need to re-install software on a pre-configured device, or if you buy your own hardware and configure the appliance yourself.
70+
>
71+
72+
### Enable remote access and update the password
73+
74+
Use the following procedure to set up network options and update the default password.
75+
76+
**To enable and update the password**:
77+
78+
1. Connect a screen and a keyboard to the HP appliance, turn on the appliance, and press **F9**.
79+
80+
:::image type="content" source="../media/tutorial-install-components/hpe-proliant-screen-v2.png" alt-text="Screenshot that shows the HPE ProLiant window.":::
81+
82+
1. Go to **System Utilities** > **System Configuration** > **iLO 5 Configuration Utility** > **Network Options**.
83+
84+
:::image type="content" source="../media/tutorial-install-components/system-configuration-window-v2.png" alt-text="Screenshot that shows the System Configuration window.":::
85+
86+
1. Select **Shared Network Port-LOM** from the **Network Interface Adapter** field.
87+
88+
1. Set **Enable DHCP** to **Off**.
89+
90+
1. Enter the IP address, subnet mask, and gateway IP address.
91+
92+
1. Select **F10: Save**.
93+
94+
1. Select **Esc** to get back to the **iLO 5 Configuration Utility**, and then select **User Management**.
95+
96+
1. Select **Edit/Remove User**. The administrator is the only default user defined.
97+
98+
1. Change the default password and select **F10: Save**.
99+
100+
### Set up the BIOS and RAID array
101+
102+
This procedure describes how to configure the BIOS configuration for an unconfigured sensor appliance.
103+
If any of the steps below are missing in the BIOS, make sure that the hardware matches the specifications above.
104+
105+
HPE BIOS iLO is a system management software designed to give administrators control of HPE hardware remotely. It allows administrators to monitor system performance, configure settings, and troubleshoot hardware issues from a web browser. It can also be used to update system BIOS and firmware. The BIOS can be set up locally or remotely. To set up the BIOS remotely from a management computer, you need to define the HPE IP address and the management computer's IP address on the same subnet.
106+
107+
**To configure the HPE BIOS**:
108+
109+
> [!IMPORTANT]
110+
> Please make sure your server is using the HPE SPP 2022.03.1 (BIOS version U32 v2.6.2) or later.
111+
112+
1. Select **System Utilities** > **System Configuration** > **BIOS/Platform Configuration (RBSU)**.
113+
114+
1. In the **BIOS/Ethernet Adapter/NIC Configuration**, disable LLDP Agent for all NIC cards.
115+
116+
1. In the **BIOS/Platform Configuration (RBSU)** form, select **Boot Options**.
117+
118+
1. Change **Boot Mode** to **UEFI BIOS Mode**, and then select **F10: Save**.
119+
120+
1. Select **Esc** twice to close the **System Configuration** form.
121+
122+
1. Select **Embedded RAID1: HPE Smart Array P408i-a SR Gen 10** > **Array Configuration** > **Create Array**.
123+
124+
1. In the **Create Array** form, select all the drives, and enable RAID Level 5.
125+
126+
> [!NOTE]
127+
> For **Data-at-Rest** encryption, see the HPE guidance for activating RAID Secure Encryption or using Self-Encrypting-Drives (SED).
128+
>
129+
130+
[!INCLUDE [install iLO remotely from virtual drive and change timeout settings](../includes/ilo-remote-install-hpe.md)]
131+
132+
### Install OT sensor software on the HPE DL360
133+
134+
This procedure describes how to install OT sensor software on the HPE DL360.
135+
136+
The installation process takes about 20 minutes. After the installation, the system is restarted several times.
137+
138+
**To install OT sensor software**:
139+
140+
1. Connect a screen and keyboard to the appliance, and then connect to the CLI.
141+
142+
1. Connect an external CD or disk-on-key that contains the sensor software you downloaded from the Azure portal.
143+
144+
1. Continue with the generic procedure for installing OT sensor software. For more information, see [Defender for IoT software installation](../how-to-install-software.md).
145+
146+
## Next steps
147+
148+
Continue understanding system requirements for physical or virtual appliances. For more information, see [Which appliances do I need?](../ot-appliance-sizing.md).
149+
150+
Then, use any of the following procedures to continue:
151+
152+
- [Download software for an OT sensor](../ot-deploy/install-software-ot-sensor.md#download-software-files-from-the-azure-portal)
153+
- [Download software files for an on-premises management console](../legacy-central-management/install-software-on-premises-management-console.md#download-software-files-from-the-azure-portal)

articles/defender-for-iot/organizations/appliance-catalog/index.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -24,6 +24,8 @@ landingContent:
2424
url: dell-poweredge-r660.md
2525
- text: HPE ProLiant DL360
2626
url: hpe-proliant-dl360.md
27+
- text: HPE ProLiant DL360 Gen11
28+
url: hpe-proliant-dl360-gen11.md
2729

2830
# Card
2931
- title: Large enterprises
Loading

articles/frontdoor/TOC.yml

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -312,23 +312,23 @@
312312
items:
313313
- name: Connect to an internal load balancer
314314
href: standard-premium/how-to-enable-private-link-internal-load-balancer.md
315-
- name: Connect to a storage account
315+
- name: Connect to Azure Storage Account
316316
items:
317317
- name: Azure portal
318318
href: standard-premium/how-to-enable-private-link-storage-account.md
319319
- name: Azure CLI
320320
href: standard-premium/how-to-enable-private-link-storage-account-cli.md
321-
- name: Connect to a storage static website
321+
- name: Connect to Azure Storage static website
322322
href: how-to-enable-private-link-storage-static-website.md
323-
- name: Connect to an App service
323+
- name: Connect to Azure App Service
324324
items:
325325
- name: Azure portal
326326
href: standard-premium/how-to-enable-private-link-web-app.md
327327
- name: Azure CLI
328328
href: standard-premium/how-to-enable-private-link-web-app-cli.md
329-
- name: Connect to an application gateway
329+
- name: Connect to Azure Application Gateway
330330
href: how-to-enable-private-link-application-gateway.md
331-
- name: Connect to an API management
331+
- name: Connect to Azure API Management
332332
href: standard-premium/how-to-enable-private-link-apim.md
333333
- name: Monitor and reports
334334
items:

articles/frontdoor/end-to-end-tls.md

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -12,6 +12,9 @@ zone_pivot_groups: front-door-tiers
1212

1313
# End-to-end TLS with Azure Front Door
1414

15+
> [!IMPORTANT]
16+
> Support for TLS 1.0 and 1.1 will be discontinued on March 1, 2025.
17+
1518
Transport Layer Security (TLS), previously known as Secure Sockets Layer (SSL), is the standard security technology for establishing an encrypted link between a web server and a client, like a web browser. This link ensures that all data passed between the server and the client remain private and encrypted.
1619

1720
To meet your security or compliance requirements, Azure Front Door supports end-to-end TLS encryption. Front Door TLS/SSL offload terminates the TLS connection, decrypts the traffic at the Azure Front Door, and re-encrypts the traffic before forwarding it to the origin. When connections to the origin use the origin's public IP address, it's a good security practice to configure HTTPS as the forwarding protocol on your Azure Front Door. By using HTTPS as the forwarding protocol, you can enforce end-to-end TLS encryption for the entire processing of the request from the client to the origin. TLS/SSL offload is also supported if you deploy a private origin with Azure Front Door Premium using the [Private Link](private-link.md) feature.
@@ -30,11 +33,11 @@ Azure Front Door offloads the TLS sessions at the edge and decrypts client reque
3033

3134
## Supported TLS versions
3235

33-
Azure Front Door supports four versions of the TLS protocol: TLS versions 1.0, 1.1, 1.2 and 1.3. All Azure Front Door profiles created after September 2019 use TLS 1.2 as the default minimum with TLS 1.3 enabled, but TLS 1.0 and TLS 1.1 are still supported for backward compatibility.
36+
Azure Front Door currently supports four versions of the TLS protocol: TLS versions 1.0, 1.1, 1.2 and 1.3. All Azure Front Door profiles created after September 2019 use TLS 1.2 as the default minimum with TLS 1.3 enabled, but TLS 1.0 and TLS 1.1 are still supported for backward compatibility. Support for TLS 1.0 and 1.1 will be discontinued on March 1, 2025.
3437

3538
Although Azure Front Door supports TLS 1.2, which introduced client/mutual authentication in RFC 5246, currently, Azure Front Door doesn't support client/mutual authentication (mTLS) yet.
3639

37-
You can configure the minimum TLS version in Azure Front Door in the custom domain HTTPS settings using the Azure portal or the [Azure REST API](/rest/api/frontdoorservice/frontdoor/frontdoors/createorupdate#minimumtlsversion). Currently, you can choose between 1.0 and 1.2. As such, specifying TLS 1.2 as the minimum version controls the minimum acceptable TLS version Azure Front Door will accept from a client. For minimum TLS version 1.2 the negotiation will attempt to establish TLS 1.3 and then TLS 1.2, while for minimum TLS version 1.0 all four versions will be attempted. When Azure Front Door initiates TLS traffic to the origin, it will attempt to negotiate the best TLS version that the origin can reliably and consistently accept. Supported TLS versions for origin connections are TLS 1.0, TLS 1.1, TLS 1.2 and TLS 1.3.
40+
You can configure the minimum TLS version in Azure Front Door in the custom domain HTTPS settings using the Azure portal or the [Azure REST API](/rest/api/frontdoorservice/frontdoor/frontdoors/createorupdate#minimumtlsversion). Currently, you can choose between 1.0 and 1.2. As such, specifying TLS 1.2 as the minimum version controls the minimum acceptable TLS version Azure Front Door will accept from a client. For minimum TLS version 1.2 the negotiation will attempt to establish TLS 1.3 and then TLS 1.2, while for minimum TLS version 1.0 all four versions will be attempted. When Azure Front Door initiates TLS traffic to the origin, it will attempt to negotiate the best TLS version that the origin can reliably and consistently accept. Supported TLS versions for origin connections are TLS 1.0, TLS 1.1, TLS 1.2 and TLS 1.3. Support for TLS 1.0 and 1.1 will be discontinued on March 1, 2025.
3841

3942
> [!NOTE]
4043
> * Clients with TLS 1.3 enabled are required to support one of the Microsoft SDL compliant EC Curves, including Secp384r1, Secp256r1, and Secp521, in order to successfully make requests with Azure Front Door using TLS 1.3.

articles/healthcare-apis/access-healthcare-apis.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.subservice: fhir
88
ms.custom: devx-track-python
99
ms.topic: conceptual
1010
ms.date: 04/29/2024
11-
ms.author: jasteppe
11+
ms.author: kesheth
1212
---
1313

1414
# Access Azure Health Data Services

articles/healthcare-apis/availability-zones.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.subservice: fhir
88
ms.custom: devx-track-python
99
ms.topic: conceptual
1010
ms.date: 10/15/2024
11-
ms.author: jasteppe
11+
ms.author: kesheth
1212
---
1313

1414
# Availability Zones for Azure Health Data Services

0 commit comments

Comments
 (0)