Skip to content

Commit 497999c

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into afdfreshness1
2 parents 95b6af6 + 5839631 commit 497999c

11 files changed

+40
-59
lines changed

articles/azure-cache-for-redis/managed-redis/managed-redis-how-to-scale.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -37,9 +37,9 @@ There are four tiers of Azure Managed Redis available, each with different perfo
3737

3838
Three tiers are for in-memory data:
3939

40-
- _Memory Optimized_. Ideal for memory-intensive use cases that require a high memory-to-vCPU ratio (1:8) but don't need the highest throughput performance. It provides a lower price point for scenarios where less processing power or throughput is necessary, making it an excellent choice for development and testing environments.
41-
- _Balanced (Memory + Compute)_. Offers a balanced memory-to-vCPU (1:4) ratio, making it ideal for standard workloads. It provides a healthy balance of memory and compute resources.
42-
- _Compute Optimized_. Designed for performance-intensive workloads requiring maximum throughput, with a low memory-to-vCPU (1:2) ratio. It's ideal for applications that demand the highest performance.
40+
- _Memory Optimized_. Ideal for memory-intensive use cases that require a high memory-to-vCPU ratio (8:1) but don't need the highest throughput performance. It provides a lower price point for scenarios where less processing power or throughput is necessary, making it an excellent choice for development and testing environments.
41+
- _Balanced (Memory + Compute)_. Offers a balanced memory-to-vCPU (4:1) ratio, making it ideal for standard workloads. It provides a healthy balance of memory and compute resources.
42+
- _Compute Optimized_. Designed for performance-intensive workloads requiring maximum throughput, with a low memory-to-vCPU (2:1) ratio. It's ideal for applications that demand the highest performance.
4343

4444
One tier stores data both in-memory and on-disk:
4545

articles/azure-cache-for-redis/managed-redis/managed-redis-overview.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -48,9 +48,9 @@ There are four tiers of Azure Managed Redis available, each with different perfo
4848

4949
Three tiers are for in-memory data:
5050

51-
- **Memory Optimized** Ideal for memory-intensive use cases that require a high memory-to-vCPU ratio (1:8) but don't need the highest throughput performance. It provides a lower price point for scenarios where less processing power or throughput is necessary, making it an excellent choice for development and testing environments.
52-
- **Balanced (Memory + Compute)** Offers a balanced memory-to-vCPU (1:4) ratio, making it ideal for standard workloads. This tier provides a healthy balance of memory and compute resources.
53-
- **Compute Optimized** Designed for performance-intensive workloads requiring maximum throughput, with a low memory-to-vCPU (1:2) ratio. It's ideal for applications that demand the highest performance.
51+
- **Memory Optimized** Ideal for memory-intensive use cases that require a high memory-to-vCPU ratio (8:1) but don't need the highest throughput performance. It provides a lower price point for scenarios where less processing power or throughput is necessary, making it an excellent choice for development and testing environments.
52+
- **Balanced (Memory + Compute)** Offers a balanced memory-to-vCPU (4:1) ratio, making it ideal for standard workloads. This tier provides a healthy balance of memory and compute resources.
53+
- **Compute Optimized** Designed for performance-intensive workloads requiring maximum throughput, with a low memory-to-vCPU (2:1) ratio. It's ideal for applications that demand the highest performance.
5454

5555
One tier stores data both in-memory and on-disk:
5656
<!--Kyle [umanag] should On-disk section callout the difference from Persistance which uses attached managed disk too -->

articles/sentinel/feature-availability.md

Lines changed: 9 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.author: bagol
66
ms.topic: feature-availability
77
ms.custom: references_regions
88
ms.service: microsoft-sentinel
9-
ms.date: 09/30/2024
9+
ms.date: 11/07/2024
1010

1111

1212
#Customer intent: As a security operations manager, I want to understand the Microsoft Sentinel's feature availability across different Azure environments so that I can effectively plan and manage our security operations.
@@ -17,12 +17,18 @@ ms.date: 09/30/2024
1717

1818
This article describes the features available in Microsoft Sentinel across different Azure environments. Features are listed as GA (generally available), public preview, or shown as not available.
1919

20-
While Microsoft Sentinel is also available in the [Microsoft Defender portal](microsoft-sentinel-defender-portal.md), this article only covers Azure environments. Microsoft Sentinel within the Microsoft unified security operations platform is currently supported only in the Azure commercial cloud.
21-
2220
> [!NOTE]
2321
> These lists and tables do not include feature or bundle availability in the Azure Government Secret or Azure Government Top Secret clouds.
2422
> For more information about specific availability for air-gapped clouds, please contact your account team.
2523
24+
## Experience in the Defender portal
25+
26+
Microsoft Sentinel is also available in the [Microsoft Defender portal](microsoft-sentinel-defender-portal.md) as Microsoft's unified security operations (SecOps) platform. In the Defender portal, all features in general availability are available in both commercial and GCC High and DoD clouds. Features still in preview are available only in the commercial cloud.
27+
28+
While [attack disruption in the Defender portal](/defender-xdr/automatic-attack-disruption) is generally available, [SAP support for attack disruption](/defender-xdr/automatic-attack-disruption#automated-response-actions-for-sap-with-microsoft-sentinel) with Microsoft's unified SecOps platform is available only in the commercial cloud.
29+
30+
For more information, see [Microsoft Defender XDR for US Government customers](/defender-xdr/usgov).
31+
2632
## Analytics
2733

2834
|Feature |Feature stage |Azure commercial |Azure Government |Azure China 21Vianet |

articles/storage/common/storage-network-security.md

Lines changed: 17 additions & 32 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: normesta
66
ms.service: azure-storage
77
ms.subservice: storage-common-concepts
88
ms.topic: how-to
9-
ms.date: 11/06/2024
9+
ms.date: 11/19/2024
1010
ms.author: normesta
1111
ms.reviewer: santoshc
1212
ms.custom: devx-track-azurepowershell, devx-track-azurecli, build-2023, engagement
@@ -103,7 +103,7 @@ This preview doesn't support the following services, operations, and protocols o
103103
- [Lifecycle management](../blobs/lifecycle-management-overview.md) for Azure Blob Storage
104104
- [SSH File transfer protocol (SFTP)](../blobs/secure-file-transfer-protocol-support.md) over Azure Blob Storage
105105
- Network file system (NFS) protocol with [Azure Blob Storage](../blobs/network-file-system-protocol-support.md) and [Azure Files](../files/files-nfs-protocol.md).
106-
- Server message block (SMB) protocol with Azure Files can only be achieved thru IP allowlisting at this time.
106+
- Server message block (SMB) protocol with Azure Files can only be achieved through IP allowlisting at this time.
107107
- [Azure Blob Inventory](../blobs/blob-inventory.md)
108108

109109
We recommend you don't enable Network Security Perimeter if you need to use any of these services, operations, or protocols. This is to prevent any potential data loss or data exfiltration risk.
@@ -152,19 +152,13 @@ You must set the default rule to **deny**, or network rules have no effect. Howe
152152

153153
2. In the service menu, under **Security + networking**, select **Networking**.
154154

155-
3. Under **Public network access**, select **Manage**.
155+
3. Choose what network access is enabled through the storage account's public endpoint:
156156

157-
4. Choose what network access is enabled through the storage account's public endpoint:
157+
- Select either **Enabled from all networks** or **Enabled from selected virtual networks and IP addresses**. If you select the second option, you'll be prompted to add virtual networks and IP address ranges.
158158

159-
- To allow inbound and outbound access with the option to restrict inbound access to specific virtual networks and IP addresses, select **Enable**. Then select either **Enable from all networks** or **Enable from selected networks**. If you select the second option, you'll be prompted to save and configure your settings. Select **Save + Configure**, and you'll be directed to the resource settings page to add virtual networks and IP addresses.
159+
- To restrict inbound access while allowing outbound access, select **Disabled**.
160160

161-
- To restrict inbound access while allowing outbound access, select **Disable**.
162-
163-
- To restrict inbound and outbound access using a Network Security Perimeter, select **Secure by perimeter**.
164-
165-
5. Select **Save** to apply your changes.
166-
167-
6. If you selected **Secure by perimeter**, then you'll need to [associate a network perimeter](#associate-a-network-security-perimeter-with-a-storage-account) with your storage account.
161+
4. Select **Save** to apply your changes.
168162

169163
<a id="powershell"></a>
170164

@@ -218,9 +212,6 @@ You must set the default rule to **deny**, or network rules have no effect. Howe
218212
219213
---
220214
221-
> [!CAUTION]
222-
> By design, access to a storage account from trusted services takes the highest precedence over other network access restrictions. If you set **Public network access** to **Disabled** after previously setting it to **Enabled from selected virtual networks and IP addresses**, any [resource instances](#grant-access-from-azure-resource-instances) and [exceptions](#manage-exceptions) that you previously configured, including [Allow Azure services on the trusted services list to access this storage account](#grant-access-to-trusted-azure-services), will remain in effect. As a result, those resources and services might still have access to the storage account.
223-
224215
## Grant access from a virtual network
225216
226217
You can configure storage accounts to allow access only from specific subnets. The allowed subnets can belong to a virtual network in the same subscription or a different subscription, including those that belong to a different Microsoft Entra tenant. With [cross-region service endpoints](#azure-storage-cross-region-service-endpoints), the allowed subnets can also be in different regions from the storage account.
@@ -264,19 +255,13 @@ If you want to enable access to your storage account from a virtual network or s
264255
265256
2. In the service menu, under **Security + networking**, select **Networking**.
266257
267-
3. Check that you've chosen to enable public network access from selected networks. Under **Resource settings**, select **Manage**. If you haven't enabled public network access from selected networks, then resource settings won't be in effect, and the **Manage** option won't be available.
258+
3. Check that you've chosen to enable public network access from selected virtual networks and IP addresses.
268259
269-
4. To allow select virtual networks to connect to your storage account using service endpoints, select **+ Add a virtual network**. Then select either **Add existing virtual network** or **Add new virtual network**.
260+
4. To grant access to a virtual network by using a new network rule, under **Virtual networks**, select **Add existing virtual network**. Select the **Virtual networks** and **Subnets** options, and then select **Add**. To create a new virtual network and grant it access, select **Add new virtual network**. Provide the necessary information to create the new virtual network, and then select **Create**. Currently, only virtual networks that belong to the same Microsoft Entra tenant appear for selection during rule creation. To grant access to a subnet in a virtual network that belongs to another tenant, use PowerShell, the Azure CLI, or REST API.
270261
271-
5. To add an existing virtual network, select the subscription, virtual network, and subnets, and then select **Add**. Currently, only virtual networks that belong to the same Microsoft Entra tenant appear for selection during rule creation. To grant access to a subnet in a virtual network that belongs to another tenant, use PowerShell, the Azure CLI, or REST APIs.
262+
5. To remove a virtual network or subnet rule, select the ellipsis (**...**) to open the context menu for the virtual network or subnet, and then select **Remove**.
272263
273-
6. To create a new virtual network and subnet and grant it access, provide the necessary information and then select **Create**.
274-
275-
7. Add any IP addresses that you want to be able to access your storage account.
276-
277-
8. Check any of the exception boxes that apply to your use case.
278-
279-
9. Select **Save** to apply your changes.
264+
6. Select **Save** to apply your changes.
280265
281266
> [!IMPORTANT]
282267
> If you delete a subnet that's included in a network rule, it will be removed from the network rules for the storage account. If you create a new subnet by the same name, it won't have access to the storage account. To allow access, you must explicitly authorize the new subnet in the network rules for the storage account.
@@ -390,9 +375,9 @@ You can manage IP network rules for storage accounts through the Azure portal, P
390375
391376
2. In the service menu, under **Security + networking**, select **Networking**.
392377
393-
3. Check that you've chosen to enable public network access from selected networks. Under **Resource settings**, select **Manage**. If you haven't enabled public network access from selected networks, then resource settings won't be in effect, and the **Manage** option won't be available.
378+
3. Check that you've chosen to enable public network access from selected virtual networks and IP addresses.
394379
395-
4. To grant access to an internet IP range, enter the IP address or address range (in CIDR format) under **IP Addresses**.
380+
4. To grant access to an internet IP range, enter the IP address or address range (in CIDR format) under **Firewall** > **Address Range**.
396381
397382
5. To remove an IP network rule, select the delete icon (:::image type="icon" source="media/storage-network-security/delete-icon.png":::) next to the address range.
398383
@@ -472,7 +457,7 @@ You can manage IP network rules for storage accounts through the Azure portal, P
472457
473458
## Grant access from Azure resource instances
474459
475-
In some cases, an application might depend on Azure resources that can't be isolated through a virtual network or an IP address rule. But you still want to secure and restrict storage account access to only your application's Azure resources. You can configure storage accounts to allow access to specific resource instances of trusted Azure services by creating a resource instance rule. This will specify resource instances that will have access to your storage account based on their system-assigned managed identity.
460+
In some cases, an application might depend on Azure resources that can't be isolated through a virtual network or an IP address rule. But you still want to secure and restrict storage account access to only your application's Azure resources. You can configure storage accounts to allow access to specific resource instances of trusted Azure services by creating a resource instance rule.
476461
477462
The Azure role assignments of the resource instance determine the types of operations that a resource instance can perform on storage account data. Resource instances must be from the same tenant as your storage account, but they can belong to any subscription in the tenant.
478463
@@ -486,7 +471,7 @@ You can add or remove resource network rules in the Azure portal:
486471
487472
3. In the service menu, under **Security + networking**, select **Networking**.
488473
489-
4. Check that you've chosen to enable public network access from selected networks. Under **Resource settings**, select **Manage**. If you haven't enabled public network access from selected networks, then resource settings won't be in effect, and the **Manage** option won't be available.
474+
4. Check that you've chosen to enable public network access from selected virtual networks and IP addresses.
490475
491476
5. Scroll down to find **Resource instances**. In the **Resource type** dropdown list, select the resource type of your resource instance.
492477
@@ -708,7 +693,7 @@ To learn more about working with storage analytics, see [Use Azure Storage analy
708693

709694
2. In the service menu, under **Security + networking**, select **Networking**.
710695

711-
3. Check that you've chosen to enable public network access from selected networks. Under **Resource settings**, select **Manage**. If you haven't enabled public network access from selected networks, then resource settings won't be in effect, and the **Manage** option won't be available.
696+
3. Check that you've chosen to enable public network access from selected virtual networks and IP addresses.
712697

713698
4. Under **Exceptions**, select the exceptions that you want to grant.
714699

@@ -762,5 +747,5 @@ To learn more about working with storage analytics, see [Use Azure Storage analy
762747
763748
## Next steps
764749
765-
Learn more about [Azure network service endpoints](../../virtual-network/virtual-network-service-endpoints-overview.md).
766-
Dig deeper into [security recommendations for Azure Blob storage](../blobs/security-recommendations.md).
750+
- Learn more about [Azure network service endpoints](../../virtual-network/virtual-network-service-endpoints-overview.md).
751+
- Dig deeper into [security recommendations for Azure Blob storage](../blobs/security-recommendations.md).

articles/virtual-desktop/compare-remote-desktop-clients.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ ms.topic: concept-article
55
zone_pivot_groups: remote-desktop-clients
66
author: dknappettmsft
77
ms.author: daknappe
8-
ms.date: 10/08/2024
8+
ms.date: 11/19/2024
99
---
1010

1111
# Compare Remote Desktop app features across platforms and devices
@@ -520,7 +520,7 @@ The following table shows which credential types are available for each platform
520520
::: zone-end
521521

522522
::: zone pivot="azure-virtual-desktop,windows-365,dev-box"
523-
1. Available in preview. Requires macOS client version 10.9.8 or later. Requires iOS client version 10.5.9 or later. For more information, see [Support for FIDO2 authentication with Microsoft Entra ID](/entra/identity/authentication/concept-fido2-compatibility#native-application-support-with-authentication-broker-preview).
523+
1. Requires macOS client version 10.9.8 or later. Requires iOS client version 10.5.9 or later. For more information, see [Support for FIDO2 authentication with Microsoft Entra ID](/entra/identity/authentication/concept-fido2-compatibility#native-application-support).
524524
1. Available when using a web browser on a local Windows device only.
525525

526526
### Remote session authentication

articles/virtual-desktop/deploy-azure-virtual-desktop.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ ms.date: 10/18/2024
1818
>
1919
> - Azure Virtual Desktop on Azure Extended Zones.
2020
>
21-
> - Managing session hosts using a session host configuration. This limited preview is provided as-is, with all faults and as available, and is excluded from the service-level agreements (SLAs) or any limited warranties Microsoft provides for Azure services in general availability. To register for the limited preview, complete this form: [https://forms.office.com/r/ZziQRGR1Lz](https://forms.office.com/r/ZziQRGR1Lz).
21+
> - Host pools with a session host configuration.
2222
>
2323
> For legal terms that apply to Azure features that are in beta, in preview, or otherwise not yet released into general availability, see [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/).
2424

articles/virtual-desktop/host-pool-management-approaches.md

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -10,9 +10,7 @@ ms.date: 10/01/2024
1010
# Host pool management approaches for Azure Virtual Desktop
1111

1212
> [!IMPORTANT]
13-
> Host pools with a session host configuration for Azure Virtual Desktop are currently in PREVIEW. This preview is provided as-is, with all faults and as available, and are excluded from the service-level agreements (SLAs) or any limited warranties Microsoft provides for Azure services in general availability. To register for the limited preview, complete this form: [https://forms.office.com/r/ZziQRGR1Lz](https://forms.office.com/r/ZziQRGR1Lz).
14-
>
15-
> See the [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) for legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
13+
> Host pools with a session host configuration for Azure Virtual Desktop are currently in PREVIEW. See the [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) for legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
1614
1715
Host pools are logical groupings of session host virtual machines that have the same configuration and serve the same workload. You can choose one of two host pool management approaches, *standard* and using a *session host configuration* (preview). In this article, you learn about each management approach and the differences between them to help you decide which one to use.
1816

0 commit comments

Comments
 (0)