You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/azure-netapp-files/manage-cool-access.md
+6-3Lines changed: 6 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ services: azure-netapp-files
5
5
author: b-ahibbard
6
6
ms.service: azure-netapp-files
7
7
ms.topic: how-to
8
-
ms.date: 06/06/2025
8
+
ms.date: 07/22/2025
9
9
ms.author: anfdocs
10
10
ms.custom:
11
11
- build-2025
@@ -69,8 +69,11 @@ There are several considerations to be aware of when using cool access.
69
69
70
70
### Considerations for cross-region and cross-zone replication
71
71
72
-
* With [cross-region](cross-region-replication-introduction.md) and [cross-zone](cross-zone-replication-introduction.md) replication, the cool access setting on the destination volume is updated automatically to match the source volume. This update occurs whenever the setting is changed on the source volume or during authorization. The setting is also updated automatically when a reverse resync of the replication is performed, but only if the destination volume is in a cool access-enabled capacity pool. Changes to the cool access setting on the destination volume don't affect the setting on the source volume.
73
-
* In a cross-region or cross-zone replication configuration, you can enable cool access exclusively for destination volumes to enhance data protection and create cost savings without affecting latency in source volumes.
72
+
* In a [cross-region](cross-region-replication-introduction.md) or [cross-zone](cross-zone-replication-introduction.md) replication configuration, you can enable cool access exclusively for destination volumes to enhance data protection and create cost savings without affecting latency in source volumes.
73
+
* When you enable cool access on a source volume with cross-region and cross-zone replication, the cool access settings are automatically propagated to the destination volume. These settings include the enablement of cool access, the retrieval policy, and the coolness period.
74
+
* Settings are only propagated between the source and destination volumes at enablement.
75
+
* After you enable cool access, changes are not propagated between source and destination volumes. If you update the retention policy or coolness period or disable cool access on the source volume, those changes are _not_ propagated to the destination. If you apply any of those changes to the destination volume, those settings aren't applied to the source volume.
76
+
* If you enable cool access on the destination volume, the cool access settings are not propagated to the source volume.
Copy file name to clipboardExpand all lines: articles/backup/back-up-hyper-v-virtual-machines-mabs.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,7 +2,7 @@
2
2
title: Back up Hyper-V virtual machines with MABS
3
3
description: This article contains the procedures for backing up and recovery of virtual machines using Microsoft Azure Backup Server (MABS).
4
4
ms.topic: how-to
5
-
ms.date: 12/23/2024
5
+
ms.date: 07/22/2025
6
6
ms.service: azure-backup
7
7
ms.custom: engagement-fy24
8
8
author: AbhishekMallick-MS
@@ -149,7 +149,7 @@ To open the Recovery Wizard and recover a virtual machine, follow these steps:
149
149
-**Recover as virtual machine to any host**: MABS supports alternate location recovery (ALR), which provides a seamless recovery of a protected Hyper-V virtual machine to a different Hyper-V host, independent of processor architecture. Hyper-V virtual machines that are recovered to a cluster node won't be highly available. If you choose this option, the Recovery Wizard presents you with an additional screen for identifying the destination and destination path.
150
150
151
151
>[!NOTE]
152
-
>If you select the original host the behavior is the same as **Recover to original instance**. The original VHD and all associated checkpoints will be deleted.
152
+
>If you select the original standalone Hyper-V host or the original Hyper-V cluster and restore to any node of the cluster the behavior is the same as Recover to original instance. The original Virtual Machine and all associated checkpoints are deleted.
153
153
154
154
-**Copy to a network folder**: MABS supports item-level recovery (ILR), which allows you to do item-level recovery of files, folders, volumes, and virtual hard disks (VHDs) from a host-level backup of Hyper-V virtual machines to a network share or a volume on a MABS protected server. The MABS protection agent doesn't have to be installed inside the guest to perform item-level recovery. If you choose this option, the Recovery Wizard presents you with an additional screen for identifying the destination and destination path.
Copy file name to clipboardExpand all lines: articles/external-attack-surface-management/data-connections.md
+33-1Lines changed: 33 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -68,6 +68,36 @@ To successfully create a data connection, you must first ensure that you've comp
68
68
69
69
1. Expand the **Log Analytics agent instructions** section to view your workspace ID and primary key. These values are used to set up your data connection.
70
70
71
+
> [!NOTE]
72
+
> The **HTTP Data Collector API**, currently used by the **Defender EASM Log Analytics Data Connector**, will be **deprecated on September 14, 2026**.
73
+
>
74
+
> All new Log Analytics Data Connectors will use the **Logs Ingestion API**, which requires additional permission configurations as outlined below.
75
+
76
+
77
+
### Configure Resource Group Role Assignments
78
+
79
+
1. On the leftmost pane, select **Overview** and navigate to the **Resource group** under **Essentials** on the main pane.
80
+
1. Open the Resource group that contains the Log Analytics workspace.
81
+
1. On the leftmost pane, select **Access control (IAM)**.
82
+
1. Search and select the **Reader** role.
83
+
1. Search and select the **EASM API** as the member for the role assignment.
84
+

85
+
1. Be sure the Assignment type is **Permanent** and then click **Review + assign**.
86
+
1. Repeat this and add the **Monitoring Contributor**, **Log Analytics Contributor**, and the **Monitoring Metrics Publisher** roles for the **EASM API** app.
87
+
88
+
> [!NOTE]
89
+
> The role assignments for the **EASM API** may take a few minutes to be assigned after. After configuring the assignments, please wait for a few minutes to create a new data connection.
90
+
91
+
### Configure Subscription Resource Providers
92
+
93
+
1. Open the Subscription that contains the Resource Group and Log Analytics workspace.
94
+
1. On the leftmost pane, under **Settings** select **Resource Providers**.
95
+
1. Search for **microsoft.insights** and register the provider.
96
+

97
+
98
+
> [!NOTE]
99
+
> Using the new Log Analytics API, the Defender EASM resource and Log Analytics workspace that will ingest your Defender EASM data **must be in the same tenant**.
100
+
71
101
Use of this data connection is subject to the pricing structure of Log Analytics. For more information, see [Azure Monitor pricing](https://azure.microsoft.com/pricing/details/monitor/).
72
102
73
103
## Configure Azure Data Explorer permissions
@@ -104,12 +134,14 @@ A configuration pane opens on the right side of the **Data Connections** page. T
104
134
105
135
-**Name**: Enter a name for this data connection.
106
136
-**Workspace ID**: Enter the workspace ID for the Log Analytics instance where you want to export Defender EASM data.
107
-
-**API key**: Enter the API key for the Log Analytics instance.
108
137
-**Content**: Select to integrate asset data, attack surface insights, or both datasets.
109
138
-**Frequency**: Select the frequency that the Defender EASM connection uses to send updated data to the tool of your choice. Available options are daily, weekly, and monthly.
110
139
111
140

112
141
142
+
> [!NOTE]
143
+
> All new data connections will use the Log Analytics API and **will not** use an API key.
0 commit comments