Skip to content

Commit 3f7ebd8

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into vm-toc
2 parents 2405ecd + 20873ab commit 3f7ebd8

File tree

6 files changed

+38
-33
lines changed

6 files changed

+38
-33
lines changed

articles/communication-services/concepts/numbers/sub-eligibility-number-capability.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -120,6 +120,8 @@ The following tables summarize current availability:
120120
| :---------------- | :-------- | :------------------- | :------------------- | :------------- | :--------------- |
121121
| France | Local** | - | - | Public Preview | Public Preview\* |
122122
| France | Toll-Free** | - | - | Public Preview | Public Preview\* |
123+
| Norway | Local** | - | - | Public Preview | Public Preview\* |
124+
| Norway | Toll-Free | - | - | Public Preview | Public Preview\* |
123125
| France, Germany, Netherlands, United Kingdom, Australia, Switzerland, Sweden, Italy, Spain, Denmark, Ireland, Portugal, Poland, Austria, Lithuania, Latvia, Estonia | Alphanumeric Sender ID \*** | Public Preview | - | - | - |
124126

125127
\* Please refer to [Inbound calling capabilities page](../telephony/inbound-calling-capabilities.md) for details.
@@ -301,6 +303,8 @@ The following tables summarize current availability:
301303
| Denmark | Local | - | - | Public Preview | Public Preview\* |
302304
| Italy | Toll-Free** | - | - | General Availability | General Availability\* |
303305
| Italy | Local** | - | - | General Availability | General Availability\* |
306+
| Norway | Local** | - | - | Public Preview | Public Preview\* |
307+
| Norway | Toll-Free | - | - | Public Preview | Public Preview\* |
304308
| Sweden, Germany, Netherlands, United Kingdom, Australia, France, Switzerland, Italy, Spain, Denmark, Ireland, Portugal, Poland, Austria, Lithuania, Latvia, Estonia | Alphanumeric Sender ID \** | Public Preview | - | - | - |
305309

306310
\* Please refer to [Inbound calling capabilities page](../telephony/inbound-calling-capabilities.md) for details.

articles/defender-for-cloud/defender-for-containers-vulnerability-assessment-azure.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Identify vulnerabilities in Azure Container Registry with Microsoft Defen
33
description: Learn how to use Defender for Containers to scan images in your Azure Container Registry to find vulnerabilities.
44
author: dcurwin
55
ms.author: dacurwin
6-
ms.date: 06/14/2023
6+
ms.date: 06/21/2023
77
ms.topic: how-to
88
ms.custom: ignite-2022, build-2023
99
---
@@ -134,10 +134,10 @@ To create a rule:
134134

135135
1. From the recommendations detail page for [Container registry images should have vulnerability findings resolved-(powered by Qualys)](https://portal.azure.com/#blade/Microsoft_Azure_Security/RecommendationsBlade/assessmentKey/dbd0cb49-b563-45e7-9724-889e799fa648), select **Disable rule**.
136136
1. Select the relevant scope.
137-
1. Define your criteria.
138-
1. Select **Apply rule**.
139137

140138
:::image type="content" source="./media/defender-for-containers-vulnerability-assessment-azure/disable-rule.png" alt-text="Screenshot showing how to create a disable rule for VA findings on registry." lightbox="media/defender-for-containers-vulnerability-assessment-azure/disable-rule.png":::
139+
1. Define your criteria.
140+
1. Select **Apply rule**.
141141

142142
1. To view, override, or delete a rule:
143143
1. Select **Disable rule**.
-11.4 KB
Loading

articles/defender-for-cloud/upcoming-changes.md

Lines changed: 21 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -24,6 +24,7 @@ If you're looking for the latest release notes, you can find them in the [What's
2424
| [DevOps Resource Deduplication for Defender for DevOps](#devops-resource-deduplication-for-defender-for-devops) | July 2023 |
2525
| [General availability release of agentless container posture in Defender CSPM](#general-availability-ga-release-of-agentless-container-posture-in-defender-cspm) | July 2023 |
2626
| [Business model and pricing updates for Defender for Cloud plans](#business-model-and-pricing-updates-for-defender-for-cloud-plans) | July 2023 |
27+
| [Recommendation set to be released for GA: Running container images should have vulnerability findings resolved (powered by Microsoft Defender Vulnerability Management)](#recommendation-set-to-be-released-for-ga-running-container-images-should-have-vulnerability-findings-resolved-powered-by-microsoft-defender-vulnerability-management) | July 2023 |
2728
| [Change to the Log Analytics daily cap](#change-to-the-log-analytics-daily-cap) | September 2023 |
2829

2930
### Replacing the "Key Vaults should have purge protection enabled" recommendation with combined recommendation "Key Vaults should have deletion protection enabled".
@@ -107,6 +108,8 @@ With this release, the recommendation `Container registry images should have vul
107108

108109
Customers with both Defender for Containers plan and Defender CSPM plan should [disable the Qualys recommendation](tutorial-security-policy.md#disable-a-security-recommendation), to avoid multiple reports for the same images with potential impact on secure score. If you're currently using the sub-assesment API or Azure Resource Graph or continuous export, you should also update your requests to the new schema used by the MDVM recommendation prior to disabling the Qualys recommendation and using MDVM results instead.
109110

111+
If you are also using our public preview offering for Windows containers vulnerability assessment powered by Qualys, and you would like to continue using it, you need to [disable Linux findings](https://learn.microsoft.com/azure/defender-for-cloud/defender-for-containers-vulnerability-assessment-azure#disable-specific-findings) using disable rules rather than disable the registry recommendation.
112+
110113
Learn more about [Agentless Containers Posture in Defender CSPM](concept-agentless-containers.md).
111114

112115
### Business model and pricing updates for Defender for Cloud plans
@@ -135,6 +138,23 @@ Existing customers of Defender for Key-Vault, Defender for Azure Resource Manage
135138

136139
For more information on all of these plans, check out the [Defender for Cloud pricing page](https://azure.microsoft.com/pricing/details/defender-for-cloud/?v=17.23h)
137140

141+
### Recommendation set to be released for GA: Running container images should have vulnerability findings resolved (powered by Microsoft Defender Vulnerability Management) 
142+
143+
**Estimated date for change: July 2023**
144+
145+
The recommendation `Running container images should have vulnerability findings resolved (powered by Microsoft Defender Vulnerability Management)` is set to be released as GA (General Availability):
146+
147+
|Recommendation | Description | Assessment Key|
148+
|--|--|--|
149+
| Running container images should have vulnerability findings resolved (powered by Microsoft Defender Vulnerability Management) | Container image vulnerability assessment scans your registry for commonly known vulnerabilities (CVEs) and provides a detailed vulnerability report for each image. This recommendation provides visibility to vulnerable images currently running in your Kubernetes clusters. Remediating vulnerabilities in container images that are currently running is key to improving your security posture, significantly reducing the attack surface for your containerized workloads. | c609cf0f-71ab-41e9-a3c6-9a1f7fe1b8d5
150+
151+
Customers with both Defender for the Containers plan and Defender CSPM plan should [disable the Qualys running containers recommendation](https://learn.microsoft.com/azure/defender-for-cloud/tutorial-security-policy#disable-a-security-recommendation), to avoid multiple reports for the same images with potential impact on the secure score.
152+
153+
If you're currently using the sub-assesment API or Azure Resource Graph or continuous export, you should also update your requests to the new schema used by the MDVM recommendation prior to disabling the Qualys recommendation and use MDVM results instead.
154+
155+
If you are also using our public preview offering for Windows containers vulnerability assessment powered by Qualys, and you would like to continue using it, you need to [disable Linux findings](https://learn.microsoft.com/azure/defender-for-cloud/defender-for-containers-vulnerability-assessment-azure#disable-specific-findings) using disable rules rather than disable the runtime recommendation.
156+
157+
Learn more about [Agentless Containers Posture in Defender CSPM](concept-agentless-containers.md).
138158

139159
### Change to the Log Analytics daily cap
140160

@@ -160,7 +180,7 @@ Starting on September 18, 2023 the Log Analytics Daily Cap will no longer exclud
160180

161181
At that time, all billable data types will be capped if the daily cap is met. This change improves your ability to fully contain costs from higher-than-expected data ingestion.
162182

163-
Learn more about [workspaces with Microsoft Defender for Cloud](../azure-monitor/logs/daily-cap.md#workspaces-with-microsoft-defender-for-cloud)
183+
Learn more about [workspaces with Microsoft Defender for Cloud](../azure-monitor/logs/daily-cap.md#workspaces-with-microsoft-defender-for-cloud).
164184

165185
## Next steps
166186

articles/virtual-desktop/install-office-on-wvd-master-image.md

Lines changed: 8 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,17 +1,17 @@
11
---
2-
title: Install Office on a master VHD image - Azure
3-
description: How to install and customize Office on a Azure Virtual Desktop master image to Azure.
2+
title: Install Office on a custom VHD image - Azure
3+
description: How to install and customize Office on a Azure Virtual Desktop custom image to Azure.
44
author: Heidilohr
55
ms.topic: how-to
66
ms.date: 05/02/2019
77
ms.author: helohr
88
manager: femila
99
---
10-
# Install Office on a master VHD image
10+
# Install Office on a custom VHD image
1111

12-
This article tells you how to install Microsoft 365 Apps for enterprise, OneDrive, and other common applications on a master virtual hard disk (VHD) image for upload to Azure. If your users need to access certain line of business (LOB) applications, we recommend you install them after completing the instructions in this article.
12+
This article tells you how to install Microsoft 365 Apps for enterprise, OneDrive, and other common applications on a custom virtual hard disk (VHD) image for upload to Azure. If your users need to access certain line of business (LOB) applications, we recommend you install them after completing the instructions in this article.
1313

14-
This article assumes you've already created a virtual machine (VM). If not, see [Prepare and customize a master VHD image](set-up-customize-master-image.md#create-a-vm)
14+
This article assumes you've already created a virtual machine (VM). If not, see [Prepare and customize a custom VHD image](set-up-customize-master-image.md#create-a-vm)
1515

1616
This article also assumes you have elevated access on the VM, whether it's provisioned in Azure or Hyper-V Manager. If not, see [Elevate access to manage all Azure subscription and management groups](../role-based-access-control/elevate-access-global-admin.md).
1717

@@ -87,6 +87,7 @@ After installing Office, you can update the default Office behavior. Run the fol
8787
```cmd
8888
rem Mount the default user registry hive
8989
reg load HKU\TempDefault C:\Users\Default\NTUSER.DAT
90+
rem Disable the option for Office Insider under File > Account.
9091
rem Must be executed with default registry hive mounted.
9192
reg add HKU\TempDefault\SOFTWARE\Policies\Microsoft\office\16.0\common /v InsiderSlabBehavior /t REG_DWORD /d 2 /f
9293
rem Set Outlook's Cached Exchange Mode behavior
@@ -98,7 +99,7 @@ reg add "HKU\TempDefault\software\policies\microsoft\office\16.0\outlook\cached
9899
rem Unmount the default user registry hive
99100
reg unload HKU\TempDefault
100101
101-
rem Set the Office Update UI behavior.
102+
rem Set the Office Update UI behavior for updates.
102103
reg add HKLM\SOFTWARE\Policies\Microsoft\office\16.0\common\officeupdate /v hideupdatenotifications /t REG_DWORD /d 1 /f
103104
reg add HKLM\SOFTWARE\Policies\Microsoft\office\16.0\common\officeupdate /v hideenabledisableupdates /t REG_DWORD /d 1 /f
104105
```
@@ -157,4 +158,4 @@ For help with installing Microsoft Teams, see [Use Microsoft Teams on Azure Virt
157158
158159
## Next steps
159160
160-
Now that you've added Office to the image, you can continue to customize your master VHD image. See [Prepare and customize a master VHD image](set-up-customize-master-image.md).
161+
Now that you've added Office to the image, you can continue to customize your custom VHD image. See [Prepare and customize a custom VHD image](set-up-customize-master-image.md).

articles/virtual-desktop/virtual-desktop-fall-2019/diagnostics-log-analytics-2019.md

Lines changed: 2 additions & 22 deletions
Original file line numberDiff line numberDiff line change
@@ -66,53 +66,33 @@ The following example queries show how the diagnostics feature generates a repor
6666

6767
This first example shows connection activities initiated by users with supported remote desktop clients:
6868

69-
```powershell
69+
```kusto
7070
WVDActivityV1_CL
71-
7271
| where Type_s == "Connection"
73-
7472
| join kind=leftouter (
75-
7673
    WVDErrorV1_CL
77-
7874
    | summarize Errors = makelist(pack('Time', Time_t, 'Code', ErrorCode_s , 'CodeSymbolic', ErrorCodeSymbolic_s, 'Message', ErrorMessage_s, 'ReportedBy', ReportedBy_s , 'Internal', ErrorInternal_s )) by ActivityId_g
79-
8075
    ) on $left.Id_g  == $right.ActivityId_g 
81-
8276
| join  kind=leftouter (
83-
8477
    WVDCheckpointV1_CL
85-
8678
    | summarize Checkpoints = makelist(pack('Time', Time_t, 'ReportedBy', ReportedBy_s, 'Name', Name_s, 'Parameters', Parameters_s) ) by ActivityId_g
87-
8879
    ) on $left.Id_g  == $right.ActivityId_g
89-
9080
|project-away ActivityId_g, ActivityId_g1
9181
```
9282

9383
This next example query shows management activities by admins on tenants:
9484

95-
```powershell
85+
```kusto
9686
WVDActivityV1_CL
97-
9887
| where Type_s == "Management"
99-
10088
| join kind=leftouter (
101-
10289
    WVDErrorV1_CL
103-
10490
    | summarize Errors = makelist(pack('Time', Time_t, 'Code', ErrorCode_s , 'CodeSymbolic', ErrorCodeSymbolic_s, 'Message', ErrorMessage_s, 'ReportedBy', ReportedBy_s , 'Internal', ErrorInternal_s )) by ActivityId_g
105-
10691
    ) on $left.Id_g  == $right.ActivityId_g 
107-
10892
| join  kind=leftouter (
109-
11093
    WVDCheckpointV1_CL
111-
11294
    | summarize Checkpoints = makelist(pack('Time', Time_t, 'ReportedBy', ReportedBy_s, 'Name', Name_s, 'Parameters', Parameters_s) ) by ActivityId_g
113-
11495
    ) on $left.Id_g  == $right.ActivityId_g
115-
11696
|project-away ActivityId_g, ActivityId_g1
11797
```
11898

0 commit comments

Comments
 (0)