Skip to content

Commit 52f5ddf

Browse files
authored
Merge pull request #291025 from MicrosoftDocs/main
11/25/2024 AM Publish
2 parents d4b7461 + 1691852 commit 52f5ddf

File tree

47 files changed

+259
-267
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

47 files changed

+259
-267
lines changed

articles/active-directory-b2c/add-captcha.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -234,9 +234,9 @@ For the various page layouts, use the following page layout versions:
234234

235235
|Page layout |Page layout version range |
236236
|---------|---------|
237-
| Selfasserted | >=2.1.30 |
238-
| Unifiedssp | >=2.1.18 |
239-
| Multifactor | >=1.2.16 |
237+
| Selfasserted | >=2.1.33 |
238+
| Unifiedssp | >=2.1.21 |
239+
| Multifactor | >=1.2.19 |
240240

241241
**Example:**
242242

articles/active-directory-b2c/localization-string-ids.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -274,6 +274,7 @@ The following example shows the use of some of the user interface elements in th
274274
<LocalizedString ElementType="ErrorMessage" StringId="UserMessageIfInvalidInput">{0} has invalid input.</LocalizedString>
275275
<LocalizedString ElementType="ErrorMessage" StringId="UserMessageIfMissingRequiredElement">Missing required element: {0}</LocalizedString>
276276
<LocalizedString ElementType="ErrorMessage" StringId="UserMessageIfValidationError">Error in validation by: {0}</LocalizedString>
277+
<LocalizedString ElementType="ErrorMessage" StringId="InvalidUserInput"> An Invalid value was presented for a property</LocalizedString>
277278
</LocalizedStrings>
278279
</LocalizedResources>
279280
```

articles/azure-vmware/configure-virtual-trusted-platform-module.md

Lines changed: 29 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Configure Virtual Machines - Virtual Trusted Platform Module (vTPM)
33
description: Learn how to configure Virtual Machines - Virtual Trusted Platform Module (vTPM).
44
ms.topic: how-to
55
ms.service: azure-vmware
6-
ms.date: 11/22/2024
6+
ms.date: 11/25/2024
77
ms.custom: engagement-fy25
88
---
99

@@ -13,9 +13,9 @@ This article demonstrates how to enable the virtual Trusted Platform Module (vTP
1313

1414
A virtual Trusted Platform Module (vTPM) in VMware vSphere is a virtual counterpart of a physical TPM 2.0 chip, utilizing VM Encryption. It provides the same functionalities as a physical TPM but operates within VMs. Each VM can have its own unique and isolated vTPM, which helps secure sensitive information and maintain system integrity. This setting enables VMs to apply security features like BitLocker disk encryption and authenticate virtual hardware devices, creating a more secure virtual environment.
1515

16-
## Pre-requisites
16+
## Prerequisites
1717

18-
Before configuring vTPM on a VM in Azure VMware Solution, ensure the following pre-requisites are met:
18+
Before configuring vTPM on a VM in Azure VMware Solution, ensure the following prerequisites are met:
1919

2020
- The virtual machine must use EFI firmware.
2121
- The virtual machine must be at hardware version 14 or later.
@@ -24,6 +24,31 @@ Before configuring vTPM on a VM in Azure VMware Solution, ensure the following p
2424
>[!IMPORTANT]
2525
>Customers do not need to configure a key provider to use vTPM with Azure VMware Solution. Azure VMware Solution already provides and manages key providers for each environment.
2626
27+
## Trusted Launch for Azure VMware Solution
28+
29+
Trusted Launch is a comprehensive security solution that encompasses three key components: Secure Boot, Virtual Trusted Platform Module (vTPM), and Virtualization-based security (VBS). Each of these components plays a vital role in fortifying the security posture of VMs.
30+
31+
## Benefits
32+
33+
• Securely deploy VMs with verified boot loaders, operating system (OS) kernels, and drivers.
34+
35+
• Securely protect keys, certificates, and secrets in the VMs.
36+
• Gain insights and confidence of the entire boot chain's integrity.
37+
38+
• Ensure that workloads are trusted and verifiable.
39+
40+
### Secure Boot
41+
42+
Secure Boot is the first line of defense in Trusted Launch. It establishes a "root of trust" for VMs by ensuring that only signed operating systems and drivers are allowed to boot. This prevents the installation of malware-based rootkits and bootkits, which can compromise the security of the entire system. With Secure Boot enabled, every aspect of the boot process, from the boot loader to the kernel and kernel drivers, must be digitally signed by trusted publishers. This creates a robust shield against unauthorized modifications and ensures that the VM starts in a secure and trusted state.
43+
44+
## Virtual Trusted Platform Module (vTPM)
45+
46+
The vTPM is a virtualized version of a hardware Trusted Platform Module (TPM) 2.0 device. It serves as a dedicated secure vault for storing keys, certificates, and secrets. What sets vTPM apart is its ability to operate in a secure environment outside the reach of any VM, making it tamper-resistant and highly secure. One of the key functions of vTPM is attestation. It measures the entire boot chain of a VM, including UEFI, OS, system components, and drivers, to certify that the VM booted securely. This attestation mechanism is invaluable for verifying the integrity of VMs and ensuring that they haven't been compromised.
47+
48+
## Virtualization-based Security (VBS)
49+
50+
VBS is the final piece of the Trusted Launch puzzle. It leverages the hypervisor to create isolated, secure memory regions within the VM. VBS uses virtualization to enhance system security by creating an isolated, hypervisor-restricted, specialized subsystem. It provides protection against unauthorized access of credential, prevents malware from running on windows system and ensures only trusted code runs from bootloader onwards.
51+
2752
## How to Configure vTPM
2853

2954
To configure vTPM on a VM in Azure VMware Solution, follow these steps:
@@ -43,7 +68,7 @@ To configure vTPM on a VM in Azure VMware Solution, follow these steps:
4368
4469
## Unsupported scenarios
4570

46-
Migration of VMs with vTPM may not be supported by some tools. Check the documentation of the migration tool. If it is not supported, you can follow VMware documentation to safely disable vTPM and re-enable it post-migration.
71+
Migration of VMs with vTPM might not be supported by some tools. Check the documentation of the migration tool. If it isn't supported, you can follow VMware documentation to safely disable vTPM and re-enable it post-migration.
4772

4873
## More information
4974
[Securing Virtual Machines with Virtual Trusted Platform Module](https://docs.vmware.com/en/VMware-vSphere/7.0/com.vmware.vsphere.vm_admin.doc/GUID-A43B6914-E5F9-4CB1-9277-448AC9C467FB.html)

articles/backup/quick-install-backup-extension.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,10 +2,10 @@
22
title: Quickstart - Install Azure Backup extension in an AKS cluster
33
description: In this quickstart, learn how to install the Azure Backup extension in an AKS cluster and get it ready to configure backup.
44
ms.topic: quickstart
5-
ms.date: 11/14/2023
5+
ms.date: 07/31/2024
66
ms.service: azure-backup
77
ms.custom:
8-
- ignite-2023
8+
- ignite-2023, engagement-fy24
99
author: AbhishekMallick-MS
1010
ms.author: v-abhmallick
1111
---

articles/event-grid/mqtt-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -102,7 +102,7 @@ Event Grid allows you to route your MQTT messages to Azure services or webhooks
102102
:::image type="content" source="media/mqtt-overview/routing-high-res.png" alt-text="Diagram of the MQTT message routing." border="false":::
103103

104104
### Edge MQTT broker integration
105-
Event Grid integrates with [Azure IoT MQ](https://aka.ms/iot-mq) to bridge its MQTT broker capability on the edge with Azure Event Grid’s MQTT broker feature in the cloud. Azure IoT MQ is a new distributed MQTT broker for edge computing, running on Arc enabled Kubernetes clusters. It can connect to Event Grid MQTT broker with Microsoft Entra ID (formerly Azure Active Directory) authentication using system-assigned managed identity, which simplifies credential management. Azure IoT MQ provides high availability, scalability, and security for your IoT devices and applications. It's now available in [public preview](https://aka.ms/iot-mq-preview) as part of Azure IoT Operations. [Learn more about connecting Azure IoT MQ to Azure Event Grid's MQTT broker](https://aka.ms/iot-mq-eg-bridge).
105+
Event Grid integrates with [Azure IoT Operations](https://aka.ms/iot-mq) to bridge its MQTT broker capability on the edge with Azure Event Grid’s MQTT broker feature in the cloud. Azure IoT Operations provides a new distributed MQTT broker for edge computing, running on Arc enabled Kubernetes clusters. It can connect to Event Grid MQTT broker with Microsoft Entra ID (formerly Azure Active Directory) authentication using system-assigned managed identity, which simplifies credential management. MQTT Broker provides high availability, scalability, and security for your IoT devices and applications. It's now available in [public preview](https://aka.ms/iot-mq-preview) as part of Azure IoT Operations. [Learn more about connecting Azure IoT Operations MQTT Broker to Azure Event Grid's MQTT broker](https://aka.ms/iot-mq-eg-bridge).
106106

107107
### MQTT Clients Life Cycle Events
108108

articles/event-hubs/schema-registry-concepts.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ Schema group is a logical group of similar schemas based on your business criter
2222
The security boundary imposed by the grouping mechanism help ensures that trade secrets don't inadvertently leak through metadata in situations where the namespace is shared among multiple partners. It also allows for application owners to manage schemas independent of other applications that share the same namespace.
2323

2424
### Schemas
25-
Schemas define the contract between producers and consumers. A schema defined in an Event Hubs schema registry helps manage the contract outside of event data, thus removing the payload overhead. A schema has a name, type (example: record, array, and so on.), compatibility mode (none, forward, backward, full), and serialization type (only Avro for now). You can create multiple versions of a schema and retrieve and use a specific version of a schema.
25+
Schemas define the contract between producers and consumers. A schema defined in an Event Hubs schema registry helps manage the contract outside of event data, thus removing the payload overhead. A schema has a name, type (example: record, array, and so on.), compatibility mode (none, forward, backward, full), and serialization type (both Avro and JSON). You can create multiple versions of a schema and retrieve and use a specific version of a schema.
2626

2727
### Schema formats
2828
Schema formats are used to determine the manner in which a schema is structured and defined, with each format outlining specific guidelines and syntax for defining the structure of the events that will be used for event streaming.

articles/fxt-edge-filer/add-nodes.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -10,6 +10,9 @@ ms.date: 05/26/2021
1010

1111
# Tutorial: Add cluster nodes to an Azure FXT Edge Filer cluster
1212

13+
> [!NOTE]
14+
> **Action Required:** Azure FXT Edge Filer will be retired on December 31, 2026. Please remove all Azure FXT Edge Filer resources by December 31, 2026. Visit https://aka.ms/fxtretirementfaq for more information.
15+
1316
A new Azure FXT Edge Filer cluster is created with only one node. You should add at least two more nodes and enable high availability before doing other configuration.
1417

1518
This tutorial explains how to add cluster nodes and enable the High Availability (HA) feature.

articles/fxt-edge-filer/add-storage.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -10,6 +10,9 @@ ms.date: 06/20/2019
1010

1111
# Tutorial: Add back-end storage and configure the virtual namespace
1212

13+
> [!NOTE]
14+
> **Action Required:** Azure FXT Edge Filer will be retired on December 31, 2026. Please remove all Azure FXT Edge Filer resources by December 31, 2026. Visit https://aka.ms/fxtretirementfaq for more information.
15+
1316
This tutorial explains how to add back-edge storage for your cache and how to set up the client-facing virtual filesystem.
1417

1518
The cluster connects to back-end storage systems to access the data clients request, and to store changes more permanently than in the cache.

articles/fxt-edge-filer/additional-doc.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -10,6 +10,9 @@ ms.date: 06/20/2019
1010

1111
# Additional documentation for Azure FXT Edge Filer
1212

13+
> [!NOTE]
14+
> **Action Required:** Azure FXT Edge Filer will be retired on December 31, 2026. Please remove all Azure FXT Edge Filer resources by December 31, 2026. Visit https://aka.ms/fxtretirementfaq for more information.
15+
1316
Other non-Microsoft resources might help you understand and work with your Microsoft Azure FXT Edge Filer hybrid cache.
1417

1518
## Avere vFXT for Azure cache documentation

articles/fxt-edge-filer/cluster-create.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -10,6 +10,9 @@ ms.date: 07/01/2019
1010

1111
# Tutorial: Create the Azure FXT Edge Filer cluster
1212

13+
> [!NOTE]
14+
> **Action Required:** Azure FXT Edge Filer will be retired on December 31, 2026. Please remove all Azure FXT Edge Filer resources by December 31, 2026. Visit https://aka.ms/fxtretirementfaq for more information.
15+
1316
After you install and initialize the Azure FXT Edge Filer hardware nodes for your cache, use the FXT cluster software to create the cache cluster.
1417

1518
This tutorial walks you through the steps to configure your hardware nodes as a cluster.

0 commit comments

Comments
 (0)