You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/azure-cache-for-redis/managed-redis/managed-redis-how-to-scale.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -37,9 +37,9 @@ There are four tiers of Azure Managed Redis available, each with different perfo
37
37
38
38
Three tiers are for in-memory data:
39
39
40
-
-_Memory Optimized_. Ideal for memory-intensive use cases that require a high memory-to-vCPU ratio (1:8) but don't need the highest throughput performance. It provides a lower price point for scenarios where less processing power or throughput is necessary, making it an excellent choice for development and testing environments.
41
-
-_Balanced (Memory + Compute)_. Offers a balanced memory-to-vCPU (1:4) ratio, making it ideal for standard workloads. It provides a healthy balance of memory and compute resources.
42
-
-_Compute Optimized_. Designed for performance-intensive workloads requiring maximum throughput, with a low memory-to-vCPU (1:2) ratio. It's ideal for applications that demand the highest performance.
40
+
-_Memory Optimized_. Ideal for memory-intensive use cases that require a high memory-to-vCPU ratio (8:1) but don't need the highest throughput performance. It provides a lower price point for scenarios where less processing power or throughput is necessary, making it an excellent choice for development and testing environments.
41
+
-_Balanced (Memory + Compute)_. Offers a balanced memory-to-vCPU (4:1) ratio, making it ideal for standard workloads. It provides a healthy balance of memory and compute resources.
42
+
-_Compute Optimized_. Designed for performance-intensive workloads requiring maximum throughput, with a low memory-to-vCPU (2:1) ratio. It's ideal for applications that demand the highest performance.
Copy file name to clipboardExpand all lines: articles/azure-cache-for-redis/managed-redis/managed-redis-overview.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -48,9 +48,9 @@ There are four tiers of Azure Managed Redis available, each with different perfo
48
48
49
49
Three tiers are for in-memory data:
50
50
51
-
-**Memory Optimized** Ideal for memory-intensive use cases that require a high memory-to-vCPU ratio (1:8) but don't need the highest throughput performance. It provides a lower price point for scenarios where less processing power or throughput is necessary, making it an excellent choice for development and testing environments.
52
-
-**Balanced (Memory + Compute)** Offers a balanced memory-to-vCPU (1:4) ratio, making it ideal for standard workloads. This tier provides a healthy balance of memory and compute resources.
53
-
-**Compute Optimized** Designed for performance-intensive workloads requiring maximum throughput, with a low memory-to-vCPU (1:2) ratio. It's ideal for applications that demand the highest performance.
51
+
-**Memory Optimized** Ideal for memory-intensive use cases that require a high memory-to-vCPU ratio (8:1) but don't need the highest throughput performance. It provides a lower price point for scenarios where less processing power or throughput is necessary, making it an excellent choice for development and testing environments.
52
+
-**Balanced (Memory + Compute)** Offers a balanced memory-to-vCPU (4:1) ratio, making it ideal for standard workloads. This tier provides a healthy balance of memory and compute resources.
53
+
-**Compute Optimized** Designed for performance-intensive workloads requiring maximum throughput, with a low memory-to-vCPU (2:1) ratio. It's ideal for applications that demand the highest performance.
54
54
55
55
One tier stores data both in-memory and on-disk:
56
56
<!--Kyle [umanag] should On-disk section callout the difference from Persistance which uses attached managed disk too -->
Copy file name to clipboardExpand all lines: articles/sentinel/feature-availability.md
+9-3Lines changed: 9 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ ms.author: bagol
6
6
ms.topic: feature-availability
7
7
ms.custom: references_regions
8
8
ms.service: microsoft-sentinel
9
-
ms.date: 09/30/2024
9
+
ms.date: 11/07/2024
10
10
11
11
12
12
#Customer intent: As a security operations manager, I want to understand the Microsoft Sentinel's feature availability across different Azure environments so that I can effectively plan and manage our security operations.
@@ -17,12 +17,18 @@ ms.date: 09/30/2024
17
17
18
18
This article describes the features available in Microsoft Sentinel across different Azure environments. Features are listed as GA (generally available), public preview, or shown as not available.
19
19
20
-
While Microsoft Sentinel is also available in the [Microsoft Defender portal](microsoft-sentinel-defender-portal.md), this article only covers Azure environments. Microsoft Sentinel within the Microsoft unified security operations platform is currently supported only in the Azure commercial cloud.
21
-
22
20
> [!NOTE]
23
21
> These lists and tables do not include feature or bundle availability in the Azure Government Secret or Azure Government Top Secret clouds.
24
22
> For more information about specific availability for air-gapped clouds, please contact your account team.
25
23
24
+
## Experience in the Defender portal
25
+
26
+
Microsoft Sentinel is also available in the [Microsoft Defender portal](microsoft-sentinel-defender-portal.md) as Microsoft's unified security operations (SecOps) platform. In the Defender portal, all features in general availability are available in both commercial and GCC High and DoD clouds. Features still in preview are available only in the commercial cloud.
27
+
28
+
While [attack disruption in the Defender portal](/defender-xdr/automatic-attack-disruption) is generally available, [SAP support for attack disruption](/defender-xdr/automatic-attack-disruption#automated-response-actions-for-sap-with-microsoft-sentinel) with Microsoft's unified SecOps platform is available only in the commercial cloud.
29
+
30
+
For more information, see [Microsoft Defender XDR for US Government customers](/defender-xdr/usgov).
31
+
26
32
## Analytics
27
33
28
34
|Feature |Feature stage |Azure commercial |Azure Government |Azure China 21Vianet |
@@ -103,7 +103,7 @@ This preview doesn't support the following services, operations, and protocols o
103
103
-[Lifecycle management](../blobs/lifecycle-management-overview.md) for Azure Blob Storage
104
104
-[SSH File transfer protocol (SFTP)](../blobs/secure-file-transfer-protocol-support.md) over Azure Blob Storage
105
105
- Network file system (NFS) protocol with [Azure Blob Storage](../blobs/network-file-system-protocol-support.md) and [Azure Files](../files/files-nfs-protocol.md).
106
-
- Server message block (SMB) protocol with Azure Files can only be achieved thru IP allowlisting at this time.
106
+
- Server message block (SMB) protocol with Azure Files can only be achieved through IP allowlisting at this time.
We recommend you don't enable Network Security Perimeter if you need to use any of these services, operations, or protocols. This is to prevent any potential data loss or data exfiltration risk.
@@ -152,19 +152,13 @@ You must set the default rule to **deny**, or network rules have no effect. Howe
152
152
153
153
2. In the service menu, under **Security + networking**, select **Networking**.
3.Choose what network access is enabled through the storage account's public endpoint:
156
156
157
-
4. Choose what network access is enabled through the storage account's public endpoint:
157
+
- Select either **Enabled from all networks** or **Enabled from selected virtual networks and IP addresses**. If you select the second option, you'll be prompted to add virtual networks and IP address ranges.
158
158
159
-
- To allow inbound and outbound access with the option to restrict inbound access to specific virtual networks and IP addresses, select **Enable**. Then select either **Enable from all networks** or **Enable from selected networks**. If you select the second option, you'll be prompted to save and configure your settings. Select **Save + Configure**, and you'll be directed to the resource settings page to add virtual networks and IP addresses.
159
+
- To restrict inbound access while allowing outbound access, select **Disabled**.
160
160
161
-
- To restrict inbound access while allowing outbound access, select **Disable**.
162
-
163
-
- To restrict inbound and outbound access using a Network Security Perimeter, select **Secure by perimeter**.
164
-
165
-
5. Select **Save** to apply your changes.
166
-
167
-
6. If you selected **Secure by perimeter**, then you'll need to [associate a network perimeter](#associate-a-network-security-perimeter-with-a-storage-account) with your storage account.
161
+
4. Select **Save** to apply your changes.
168
162
169
163
<aid="powershell"></a>
170
164
@@ -218,9 +212,6 @@ You must set the default rule to **deny**, or network rules have no effect. Howe
218
212
219
213
---
220
214
221
-
> [!CAUTION]
222
-
> By design, access to a storage account from trusted services takes the highest precedence over other network access restrictions. If you set **Public network access** to **Disabled** after previously setting it to **Enabled from selected virtual networks and IP addresses**, any [resource instances](#grant-access-from-azure-resource-instances) and [exceptions](#manage-exceptions) that you previously configured, including [Allow Azure services on the trusted services list to access this storage account](#grant-access-to-trusted-azure-services), will remain in effect. As a result, those resources and services might still have access to the storage account.
223
-
224
215
## Grant access from a virtual network
225
216
226
217
You can configure storage accounts to allow access only from specific subnets. The allowed subnets can belong to a virtual network in the same subscription or a different subscription, including those that belong to a different Microsoft Entra tenant. With [cross-region service endpoints](#azure-storage-cross-region-service-endpoints), the allowed subnets can also be in different regions from the storage account.
@@ -264,19 +255,13 @@ If you want to enable access to your storage account from a virtual network or s
264
255
265
256
2. In the service menu, under **Security + networking**, select **Networking**.
266
257
267
-
3. Check that you've chosen to enable public network access from selected networks. Under **Resource settings**, select **Manage**. If you haven't enabled public network access from selected networks, then resource settings won't be in effect, and the **Manage** option won't be available.
258
+
3. Check that you've chosen to enable public network access from selected virtual networksand IP addresses.
268
259
269
-
4. To allow select virtual networks to connect to your storage account using service endpoints, select **+ Add a virtual network**. Then select either **Add existing virtual network** or **Add new virtual network**.
260
+
4. To grant access to a virtual network by using a new network rule, under **Virtual networks**, select **Add existing virtual network**. Select the **Virtual networks** and **Subnets** options, and then select **Add**. To create a new virtual network and grant it access, select **Add new virtual network**. Provide the necessary information to create the new virtual network, and then select **Create**. Currently, only virtual networks that belong to the same Microsoft Entra tenant appear for selection during rule creation. To grant access to a subnet in a virtual network that belongs to another tenant, use PowerShell, the Azure CLI, or REST API.
270
261
271
-
5. To add an existing virtual network, select the subscription, virtual network, and subnets, and then select **Add**. Currently, only virtual networks that belong to the same Microsoft Entra tenant appear for selection during rule creation. To grant access to a subnet in a virtual network that belongs to another tenant, use PowerShell, the Azure CLI, or REST APIs.
262
+
5. To remove a virtual network or subnet rule, select the ellipsis (**...**) to open the context menu for the virtual network or subnet, and then select **Remove**.
272
263
273
-
6. To create a new virtual network and subnet and grant it access, provide the necessary information and then select **Create**.
274
-
275
-
7. Add any IP addresses that you want to be able to access your storage account.
276
-
277
-
8. Check any of the exception boxes that apply to your use case.
278
-
279
-
9. Select **Save** to apply your changes.
264
+
6. Select **Save** to apply your changes.
280
265
281
266
> [!IMPORTANT]
282
267
> If you delete a subnet that's included in a network rule, it will be removed from the network rules for the storage account. If you create a new subnet by the same name, it won't have access to the storage account. To allow access, you must explicitly authorize the new subnet in the network rules for the storage account.
@@ -390,9 +375,9 @@ You can manage IP network rules for storage accounts through the Azure portal, P
390
375
391
376
2. In the service menu, under **Security + networking**, select **Networking**.
392
377
393
-
3. Check that you've chosen to enable public network access from selected networks. Under **Resource settings**, select **Manage**. If you haven't enabled public network access from selected networks, then resource settings won't be in effect, and the **Manage** option won't be available.
378
+
3. Check that you've chosen to enable public network access from selected virtual networksand IP addresses.
394
379
395
-
4. To grant access to an internet IP range, enter the IP address or address range (in CIDR format) under **IP Addresses**.
380
+
4. To grant access to an internet IP range, enter the IP address or address range (in CIDR format) under **Firewall** > **Address Range**.
396
381
397
382
5. To remove an IP network rule, select the delete icon (:::image type="icon" source="media/storage-network-security/delete-icon.png":::) next to the address range.
398
383
@@ -472,7 +457,7 @@ You can manage IP network rules for storage accounts through the Azure portal, P
472
457
473
458
## Grant access from Azure resource instances
474
459
475
-
In some cases, an application might depend on Azure resources that can't be isolated through a virtual network or an IP address rule. But you still want to secure and restrict storage account access to only your application's Azure resources. You can configure storage accounts to allow access to specific resource instances of trusted Azure services by creating a resource instance rule. This will specify resource instances that will have access to your storage account based on their system-assigned managed identity.
460
+
In some cases, an application might depend on Azure resources that can't be isolated through a virtual network or an IP address rule. But you still want to secure and restrict storage account access to only your application's Azure resources. You can configure storage accounts to allow access to specific resource instances of trusted Azure services by creating a resource instance rule.
476
461
477
462
The Azure role assignments of the resource instance determine the types of operations that a resource instance can perform on storage account data. Resource instances must be from the same tenant as your storage account, but they can belong to any subscription in the tenant.
478
463
@@ -486,7 +471,7 @@ You can add or remove resource network rules in the Azure portal:
486
471
487
472
3. In the service menu, under **Security + networking**, select **Networking**.
488
473
489
-
4. Check that you've chosen to enable public network access from selected networks. Under **Resource settings**, select **Manage**. If you haven't enabled public network access from selected networks, then resource settings won't be in effect, and the **Manage** option won't be available.
474
+
4. Check that you've chosen to enable public network access from selected virtual networksand IP addresses.
490
475
491
476
5. Scroll down to find **Resource instances**. In the **Resource type** dropdown list, select the resource type of your resource instance.
492
477
@@ -708,7 +693,7 @@ To learn more about working with storage analytics, see [Use Azure Storage analy
708
693
709
694
2. In the service menu, under **Security + networking**, select **Networking**.
710
695
711
-
3. Check that you've chosen to enable public network access from selected networks. Under **Resource settings**, select **Manage**. If you haven't enabled public network access from selected networks, then resource settings won't be in effect, and the **Manage** option won't be available.
696
+
3. Check that you've chosen to enable public network access from selected virtual networksand IP addresses.
712
697
713
698
4. Under **Exceptions**, select the exceptions that you want to grant.
714
699
@@ -762,5 +747,5 @@ To learn more about working with storage analytics, see [Use Azure Storage analy
762
747
763
748
## Next steps
764
749
765
-
Learn more about [Azure network service endpoints](../../virtual-network/virtual-network-service-endpoints-overview.md).
766
-
Dig deeper into [security recommendations for Azure Blob storage](../blobs/security-recommendations.md).
750
+
- Learn more about [Azure network service endpoints](../../virtual-network/virtual-network-service-endpoints-overview.md).
751
+
- Dig deeper into [security recommendations for Azure Blob storage](../blobs/security-recommendations.md).
Copy file name to clipboardExpand all lines: articles/virtual-desktop/compare-remote-desktop-clients.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ ms.topic: concept-article
5
5
zone_pivot_groups: remote-desktop-clients
6
6
author: dknappettmsft
7
7
ms.author: daknappe
8
-
ms.date: 10/08/2024
8
+
ms.date: 11/19/2024
9
9
---
10
10
11
11
# Compare Remote Desktop app features across platforms and devices
@@ -520,7 +520,7 @@ The following table shows which credential types are available for each platform
520
520
::: zone-end
521
521
522
522
::: zone pivot="azure-virtual-desktop,windows-365,dev-box"
523
-
1.Available in preview. Requires macOS client version 10.9.8 or later. Requires iOS client version 10.5.9 or later. For more information, see [Support for FIDO2 authentication with Microsoft Entra ID](/entra/identity/authentication/concept-fido2-compatibility#native-application-support-with-authentication-broker-preview).
523
+
1. Requires macOS client version 10.9.8 or later. Requires iOS client version 10.5.9 or later. For more information, see [Support for FIDO2 authentication with Microsoft Entra ID](/entra/identity/authentication/concept-fido2-compatibility#native-application-support).
524
524
1. Available when using a web browser on a local Windows device only.
Copy file name to clipboardExpand all lines: articles/virtual-desktop/deploy-azure-virtual-desktop.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -18,7 +18,7 @@ ms.date: 10/18/2024
18
18
>
19
19
> - Azure Virtual Desktop on Azure Extended Zones.
20
20
>
21
-
> -Managing session hosts using a session host configuration. This limited preview is provided as-is, with all faults and as available, and is excluded from the service-level agreements (SLAs) or any limited warranties Microsoft provides for Azure services in general availability. To register for the limited preview, complete this form: [https://forms.office.com/r/ZziQRGR1Lz](https://forms.office.com/r/ZziQRGR1Lz).
21
+
> -Host pools with a session host configuration.
22
22
>
23
23
> For legal terms that apply to Azure features that are in beta, in preview, or otherwise not yet released into general availability, see [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/).
Copy file name to clipboardExpand all lines: articles/virtual-desktop/host-pool-management-approaches.md
+1-3Lines changed: 1 addition & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -10,9 +10,7 @@ ms.date: 10/01/2024
10
10
# Host pool management approaches for Azure Virtual Desktop
11
11
12
12
> [!IMPORTANT]
13
-
> Host pools with a session host configuration for Azure Virtual Desktop are currently in PREVIEW. This preview is provided as-is, with all faults and as available, and are excluded from the service-level agreements (SLAs) or any limited warranties Microsoft provides for Azure services in general availability. To register for the limited preview, complete this form: [https://forms.office.com/r/ZziQRGR1Lz](https://forms.office.com/r/ZziQRGR1Lz).
14
-
>
15
-
> See the [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) for legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
13
+
> Host pools with a session host configuration for Azure Virtual Desktop are currently in PREVIEW. See the [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) for legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
16
14
17
15
Host pools are logical groupings of session host virtual machines that have the same configuration and serve the same workload. You can choose one of two host pool management approaches, *standard* and using a *session host configuration* (preview). In this article, you learn about each management approach and the differences between them to help you decide which one to use.
0 commit comments