Skip to content

Commit 4c8f6b5

Browse files
Merge pull request #303106 from MicrosoftDocs/main
Auto Publish – main to live - 2025-07-22 17:00 UTC
2 parents 8da4413 + 927393d commit 4c8f6b5

21 files changed

+349
-245
lines changed

articles/automation/manage-runtime-environment.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -313,7 +313,7 @@ PATCH
313313
https://management.azure.com/subscriptions/<subscriptionId>/resourceGroups/<resourceGroup>/providers/Microsoft.Automation/automationAccounts/<accountName>/runbooks/<runbookName>?api-version=2024-10-23
314314
{
315315
"properties": {
316-
"type": "PowerShell"
316+
"type": "PowerShell",
317317
"runtimeEnvironment": "<runtimeEnvironmentName>"
318318
}
319319
}

articles/azure-functions/function-keys-how-to.md

Lines changed: 40 additions & 40 deletions
Large diffs are not rendered by default.

articles/azure-functions/functions-app-settings.md

Lines changed: 89 additions & 86 deletions
Large diffs are not rendered by default.

articles/azure-functions/storage-considerations.md

Lines changed: 50 additions & 49 deletions
Large diffs are not rendered by default.

articles/azure-netapp-files/manage-cool-access.md

Lines changed: 6 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: azure-netapp-files
55
author: b-ahibbard
66
ms.service: azure-netapp-files
77
ms.topic: how-to
8-
ms.date: 06/06/2025
8+
ms.date: 07/22/2025
99
ms.author: anfdocs
1010
ms.custom:
1111
- build-2025
@@ -69,8 +69,11 @@ There are several considerations to be aware of when using cool access.
6969

7070
### Considerations for cross-region and cross-zone replication
7171

72-
* With [cross-region](cross-region-replication-introduction.md) and [cross-zone](cross-zone-replication-introduction.md) replication, the cool access setting on the destination volume is updated automatically to match the source volume. This update occurs whenever the setting is changed on the source volume or during authorization. The setting is also updated automatically when a reverse resync of the replication is performed, but only if the destination volume is in a cool access-enabled capacity pool. Changes to the cool access setting on the destination volume don't affect the setting on the source volume.
73-
* In a cross-region or cross-zone replication configuration, you can enable cool access exclusively for destination volumes to enhance data protection and create cost savings without affecting latency in source volumes.
72+
* In a [cross-region](cross-region-replication-introduction.md) or [cross-zone](cross-zone-replication-introduction.md) replication configuration, you can enable cool access exclusively for destination volumes to enhance data protection and create cost savings without affecting latency in source volumes.
73+
* When you enable cool access on a source volume with cross-region and cross-zone replication, the cool access settings are automatically propagated to the destination volume. These settings include the enablement of cool access, the retrieval policy, and the coolness period.
74+
* Settings are only propagated between the source and destination volumes at enablement.
75+
* After you enable cool access, changes are not propagated between source and destination volumes. If you update the retention policy or coolness period or disable cool access on the source volume, those changes are _not_ propagated to the destination. If you apply any of those changes to the destination volume, those settings aren't applied to the source volume.
76+
* If you enable cool access on the destination volume, the cool access settings are not propagated to the source volume.
7477

7578
### Considerations for snapshot restore
7679

articles/backup/back-up-hyper-v-virtual-machines-mabs.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Back up Hyper-V virtual machines with MABS
33
description: This article contains the procedures for backing up and recovery of virtual machines using Microsoft Azure Backup Server (MABS).
44
ms.topic: how-to
5-
ms.date: 12/23/2024
5+
ms.date: 07/22/2025
66
ms.service: azure-backup
77
ms.custom: engagement-fy24
88
author: AbhishekMallick-MS
@@ -149,7 +149,7 @@ To open the Recovery Wizard and recover a virtual machine, follow these steps:
149149
- **Recover as virtual machine to any host**: MABS supports alternate location recovery (ALR), which provides a seamless recovery of a protected Hyper-V virtual machine to a different Hyper-V host, independent of processor architecture. Hyper-V virtual machines that are recovered to a cluster node won't be highly available. If you choose this option, the Recovery Wizard presents you with an additional screen for identifying the destination and destination path.
150150

151151
>[!NOTE]
152-
>If you select the original host the behavior is the same as **Recover to original instance**. The original VHD and all associated checkpoints will be deleted.
152+
>If you select the original standalone Hyper-V host or the original Hyper-V cluster and restore to any node of the cluster the behavior is the same as Recover to original instance. The original Virtual Machine and all associated checkpoints are deleted.
153153
154154
- **Copy to a network folder**: MABS supports item-level recovery (ILR), which allows you to do item-level recovery of files, folders, volumes, and virtual hard disks (VHDs) from a host-level backup of Hyper-V virtual machines to a network share or a volume on a MABS protected server. The MABS protection agent doesn't have to be installed inside the guest to perform item-level recovery. If you choose this option, the Recovery Wizard presents you with an additional screen for identifying the destination and destination path.
155155

articles/external-attack-surface-management/data-connections.md

Lines changed: 33 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -68,6 +68,36 @@ To successfully create a data connection, you must first ensure that you've comp
6868

6969
1. Expand the **Log Analytics agent instructions** section to view your workspace ID and primary key. These values are used to set up your data connection.
7070

71+
> [!NOTE]
72+
> The **HTTP Data Collector API**, currently used by the **Defender EASM Log Analytics Data Connector**, will be **deprecated on September 14, 2026**.
73+
>
74+
> All new Log Analytics Data Connectors will use the **Logs Ingestion API**, which requires additional permission configurations as outlined below.
75+
76+
77+
### Configure Resource Group Role Assignments
78+
79+
1. On the leftmost pane, select **Overview** and navigate to the **Resource group** under **Essentials** on the main pane.
80+
1. Open the Resource group that contains the Log Analytics workspace.
81+
1. On the leftmost pane, select **Access control (IAM)**.
82+
1. Search and select the **Reader** role.
83+
1. Search and select the **EASM API** as the member for the role assignment.
84+
![Screenshot that shows Members for role assignments, specifically the EASM API app.](media/data-connections/add-role-assignment.png)
85+
1. Be sure the Assignment type is **Permanent** and then click **Review + assign**.
86+
1. Repeat this and add the **Monitoring Contributor**, **Log Analytics Contributor**, and the **Monitoring Metrics Publisher** roles for the **EASM API** app.
87+
88+
> [!NOTE]
89+
> The role assignments for the **EASM API** may take a few minutes to be assigned after. After configuring the assignments, please wait for a few minutes to create a new data connection.
90+
91+
### Configure Subscription Resource Providers
92+
93+
1. Open the Subscription that contains the Resource Group and Log Analytics workspace.
94+
1. On the leftmost pane, under **Settings** select **Resource Providers**.
95+
1. Search for **microsoft.insights** and register the provider.
96+
![Screenshot that shows Resource providers, specifically microsoft.insights.](media/data-connections/register-resource-provider.png)
97+
98+
> [!NOTE]
99+
> Using the new Log Analytics API, the Defender EASM resource and Log Analytics workspace that will ingest your Defender EASM data **must be in the same tenant**.
100+
71101
Use of this data connection is subject to the pricing structure of Log Analytics. For more information, see [Azure Monitor pricing](https://azure.microsoft.com/pricing/details/monitor/).
72102

73103
## Configure Azure Data Explorer permissions
@@ -104,12 +134,14 @@ A configuration pane opens on the right side of the **Data Connections** page. T
104134

105135
- **Name**: Enter a name for this data connection.
106136
- **Workspace ID**: Enter the workspace ID for the Log Analytics instance where you want to export Defender EASM data.
107-
- **API key**: Enter the API key for the Log Analytics instance.
108137
- **Content**: Select to integrate asset data, attack surface insights, or both datasets.
109138
- **Frequency**: Select the frequency that the Defender EASM connection uses to send updated data to the tool of your choice. Available options are daily, weekly, and monthly.
110139

111140
![Screenshot that shows the Add data connection screen for Log Analytics.](media/data-connections/data-connector-11.png)
112141

142+
> [!NOTE]
143+
> All new data connections will use the Log Analytics API and **will not** use an API key.
144+
113145

114146
### Azure Data Explorer
115147

92 KB
Loading
-835 Bytes
Loading
110 KB
Loading

0 commit comments

Comments
 (0)