Skip to content

Commit 5ad7d99

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into erdirectportal
2 parents 8c06071 + 240397a commit 5ad7d99

24 files changed

+81
-61
lines changed

articles/application-gateway/tutorial-protect-application-gateway.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ ms.custom: template tutorial
1616
This article helps you create an Azure Application Gateway with a DDoS protected virtual network. Azure DDoS Protection Standard enables enhanced DDoS mitigation capabilities such as adaptive tuning, attack alert notifications, and monitoring to protect your application gateways from large scale DDoS attacks.
1717

1818
> [!IMPORTANT]
19-
> Azure DDoS protection Standard incurs a cost per public IP address in the virtual network where you enable the service. Ensure you delete the resources in this tutorial if you aren't using the resources in the future. For more information about Azure DDoS protection, see [What is Azure DDoS Protection?](/azure/ddos-protection/ddos-protection-overview).
19+
> Azure DDoS protection Standard incurs a cost per public IP address in the virtual network where you enable the service. Ensure you delete the resources in this tutorial if you aren't using the resources in the future. For information about pricing, see [Azure DDoS Protection Pricing](https://azure.microsoft.com/pricing/details/ddos-protection/). For more information about Azure DDoS protection, see [What is Azure DDoS Protection?](/azure/ddos-protection/ddos-protection-overview).
2020
2121
In this tutorial, you learn how to:
2222

articles/bastion/tutorial-protect-bastion-host.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ In this tutorial, you deploy Bastion using the Standard SKU tier and adjust host
1818
Azure Bastion is a PaaS service that's maintained for you, not a bastion host that you install on one of your VMs and maintain yourself. For more information about Azure Bastion, see [What is Azure Bastion?](bastion-overview.md)
1919

2020
> [!IMPORTANT]
21-
> Azure DDoS protection Standard incurs a cost per public IP address in the virtual network where you enable the service. Ensure you delete the resources in this tutorial if you aren't using the resources in the future. For more information about Azure DDoS protection, see [What is Azure DDoS Protection?](/azure/ddos-protection/ddos-protection-overview).
21+
> Azure DDoS protection Standard incurs a cost per public IP address in the virtual network where you enable the service. Ensure you delete the resources in this tutorial if you aren't using the resources in the future. For information about pricing, see [Azure DDoS Protection Pricing](https://azure.microsoft.com/pricing/details/ddos-protection/). For more information about Azure DDoS protection, see [What is Azure DDoS Protection?](/azure/ddos-protection/ddos-protection-overview).
2222
2323
In this tutorial, you'll learn how to:
2424

articles/defender-for-cloud/continuous-export.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -248,6 +248,10 @@ Continuous export can be helpful in to prepare for BCDR scenarios where the targ
248248

249249
Learn more in [Azure Event Hubs - Geo-disaster recovery](../event-hubs/event-hubs-geo-dr.md).
250250

251+
### What is the minimum SAS policy permissions required when exporting data to Azure Event Hub?
252+
253+
**Send** is the minimum SAS policy permissions required. For step-by-step instructions, see **Step 1. Create an Event Hubs namespace and event hub with send permissions** in [this article](./export-to-splunk-or-qradar.md#step-1-create-an-event-hubs-namespace-and-event-hub-with-send-permissions).
254+
251255
## Next steps
252256

253257
In this article, you learned how to configure continuous exports of your recommendations and alerts. You also learned how to download your alerts data as a CSV file.

articles/healthcare-apis/iot/deploy-new-bicep-powershell-cli.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: msjasteppe
55
ms.service: healthcare-apis
66
ms.subservice: fhir
77
ms.topic: quickstart
8-
ms.date: 12/16/2022
8+
ms.date: 12/27/2022
99
ms.author: jasteppe
1010
---
1111

@@ -168,15 +168,15 @@ When deployment is completed, the following resources and access roles are creat
168168

169169
- Azure Event Hubs namespace and device message event hub. In this deployment, the device message event hub is named *devicedata*.
170170

171-
- An event hub consumer group. In this deployment, the consumer group is named *$Default*.
171+
- An event hub consumer group. In this deployment, the consumer group is named *$Default*.
172172

173-
- The Azure Event Hubs Data Sender role. In this deployment, the sender role is named *devicedatasender*.
173+
- An Azure Event Hubs Data Sender role. In this deployment, the sender role is named *devicedatasender* and can be used to provide access to the device event hub using a shared access signature (SAS). To learn more about authorizing access using a SAS, see [Authorizing access to Event Hubs resources using Shared Access Signatures](/azure/event-hubs/authorize-access-shared-access-signature).
174174

175175
- A Health Data Services workspace.
176176

177177
- A Health Data Services Fast Healthcare Interoperability Resources (FHIR®) service.
178178

179-
- An instance of the MedTech service for Health Data Services, with the required [system-assigned managed identity](../../active-directory/managed-identities-azure-resources/overview.md) roles:
179+
- A Health Data Services MedTech service with the required [system-assigned managed identity](../../active-directory/managed-identities-azure-resources/overview.md) roles:
180180

181181
- For the device message event hub, the Azure Events Hubs Data Receiver role is assigned in the [Access control section (IAM)](../../role-based-access-control/overview.md) of the device message event hub.
182182

articles/healthcare-apis/iot/deploy-new-button.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: msjasteppe
55
ms.service: healthcare-apis
66
ms.subservice: fhir
77
ms.topic: quickstart
8-
ms.date: 12/16/2022
8+
ms.date: 12/27/2022
99
ms.author: jasteppe
1010
---
1111

@@ -98,15 +98,15 @@ When deployment is completed, the following resources and access roles are creat
9898

9999
- Azure Event Hubs namespace and device message event hub. In this deployment, the device message event hub is named *devicedata*.
100100

101-
- An event hub consumer group. In this deployment, the consumer group is named *$Default*.
101+
- An event hub consumer group. In this deployment, the consumer group is named *$Default*.
102102

103-
- The Azure Event Hubs Data Sender role. In this deployment, the sender role is named *devicedatasender*.
103+
- An Azure Event Hubs Data Sender role. In this deployment, the sender role is named *devicedatasender* and can be used to provide access to the device event hub using a shared access signature (SAS). To learn more about authorizing access using a SAS, see [Authorizing access to Event Hubs resources using Shared Access Signatures](/azure/event-hubs/authorize-access-shared-access-signature).
104104

105105
- A Health Data Services workspace.
106106

107107
- A Health Data Services Fast Healthcare Interoperability Resources (FHIR®) service.
108108

109-
- An instance of the MedTech service for Health Data Services, with the required [system-assigned managed identity](../../active-directory/managed-identities-azure-resources/overview.md) roles:
109+
- A Health Data Services MedTech service with the required [system-assigned managed identity](../../active-directory/managed-identities-azure-resources/overview.md) roles:
110110

111111
- For the device message event hub, the Azure Events Hubs Data Receiver role is assigned in the [Access control section (IAM)](../../role-based-access-control/overview.md) of the device message event hub.
112112

articles/healthcare-apis/iot/deploy-new-powershell-cli.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: msjasteppe
55
ms.service: healthcare-apis
66
ms.subservice: fhir
77
ms.topic: quickstart
8-
ms.date: 12/16/2022
8+
ms.date: 12/27/2022
99
ms.author: jasteppe
1010
---
1111

@@ -161,15 +161,15 @@ When deployment is completed, the following resources and access roles are creat
161161

162162
- Azure Event Hubs namespace and device message event hub. In this deployment, the device message event hub is named *devicedata*.
163163

164-
- An event hub consumer group. In this deployment, the consumer group is named *$Default*.
164+
- An event hub consumer group. In this deployment, the consumer group is named *$Default*.
165165

166-
- The Azure Event Hubs Data Sender role. In this deployment, the sender role is named *devicedatasender*.
166+
- An Azure Event Hubs Data Sender role. In this deployment, the sender role is named *devicedatasender* and can be used to provide access to the device event hub using a shared access signature (SAS). To learn more about authorizing access using a SAS, see [Authorizing access to Event Hubs resources using Shared Access Signatures](/azure/event-hubs/authorize-access-shared-access-signature).
167167

168168
- A Health Data Services workspace.
169169

170170
- A Health Data Services Fast Healthcare Interoperability Resources (FHIR®) service.
171171

172-
- An instance of the MedTech service for Health Data Services, with the required [system-assigned managed identity](../../active-directory/managed-identities-azure-resources/overview.md) roles:
172+
- A Health Data Services MedTech service with the required [system-assigned managed identity](../../active-directory/managed-identities-azure-resources/overview.md) roles:
173173

174174
- For the device message event hub, the Azure Events Hubs Data Receiver role is assigned in the [Access control section (IAM)](../../role-based-access-control/overview.md) of the device message event hub.
175175

articles/healthcare-apis/iot/device-data-through-iot-hub.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: msjasteppe
66
ms.service: healthcare-apis
77
ms.subservice: iomt
88
ms.topic: tutorial
9-
ms.date: 12/22/2022
9+
ms.date: 12/27/2022
1010
ms.author: jasteppe
1111
---
1212

@@ -117,9 +117,9 @@ When deployment is completed, the following resources and access roles are creat
117117

118118
- An Azure Event Hubs namespace and a device message event hub. In this deployment, the event hub is named *devicedata*.
119119

120-
- An event hub consumer group. In this deployment, the consumer group is named *$Default*.
120+
- An event hub consumer group. In this deployment, the consumer group is named *$Default*.
121121

122-
- An Azure Event Hubs Data Sender role. In this deployment, the role is named *devicedatasender*. The Azure Event Hubs Data Sender role isn't used in this tutorial.
122+
- An Azure Event Hubs Data Sender role. In this deployment, the sender role is named *devicedatasender* and can be used to provide access to the device event hub using a shared access signature (SAS). To learn more about authorizing access using a SAS, see [Authorizing access to Event Hubs resources using Shared Access Signatures](/azure/event-hubs/authorize-access-shared-access-signature). The Azure Event Hubs Data Sender role isn't used in this tutorial.
123123

124124
- An Azure IoT Hub with [message routing](../../iot-hub/iot-hub-devguide-messages-d2c.md) configured to send device messages to the device message event hub.
125125

@@ -129,7 +129,7 @@ When deployment is completed, the following resources and access roles are creat
129129

130130
- A Health Data Services FHIR service.
131131

132-
- A Health Data Services MedTech service with the required [system-assigned managed identity](../../active-directory/managed-identities-azure-resources/overview.md) access roles:
132+
- A Health Data Services MedTech service with the required [system-assigned managed identity](../../active-directory/managed-identities-azure-resources/overview.md) roles:
133133

134134
- For the device message event hub, the Azure Events Hubs Data Receiver role is assigned in the [Access control section (IAM)](../../role-based-access-control/overview.md) of the device message event hub.
135135

articles/key-vault/general/monitor-key-vault.md

Lines changed: 11 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -83,6 +83,17 @@ For a list of the tables used by Azure Monitor Logs and queryable by Log Analyti
8383
8484
Here are some queries that you can enter into the **Log search** bar to help you monitor your Key Vault resources. These queries work with the [new language](../../azure-monitor/logs/log-query-overview.md).
8585

86+
* Are there any clients using old TLS version (<1.2)?
87+
88+
```kusto
89+
AzureDiagnostics
90+
| where TimeGenerated > ago(90d)
91+
| where ResourceProvider =="MICROSOFT.KEYVAULT"
92+
| where isnotempty(tlsVersion_s) and strcmp(tlsVersion_s,"TLS1_2") <0
93+
| project TimeGenerated,Resource, OperationName, requestUri_s, CallerIPAddress, OperationVersion,clientInfo_s,tlsVersion_s,todouble(tlsVersion_s)
94+
| sort by TimeGenerated desc
95+
```
96+
8697
* Are there any slow requests?
8798
8899
```Kusto

articles/key-vault/general/rbac-migration.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ Azure RBAC key benefits over vault access policies:
2727
Azure RBAC disadvantages:
2828
- Latency for role assignments - it can take several minutes for role assignments to be applied. Vault access policies are assigned instantly.
2929
- Limited number of role assignments - Azure RBAC allows only 2000 roles assignments across all services per subscription versus 1024 access policies per Key Vault
30-
-Not able to fetch SSL certificates for an app service when used. [configure ssl certificate](../../app-service/configure-ssl-certificate.md)
30+
- Not able to fetch SSL certificates for an app service when used. [configure ssl certificate](../../app-service/configure-ssl-certificate.md)
3131

3232
## Access policies to Azure roles mapping
3333

articles/key-vault/general/security-features.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ Azure Private Link Service enables you to access Azure Key Vault and Azure hoste
3838
- Despite known vulnerabilities in TLS protocol, there is no known attack that would allow a malicious agent to extract any information from your key vault when the attacker initiates a connection with a TLS version that has vulnerabilities. The attacker would still need to authenticate and authorize itself, and as long as legitimate clients always connect with recent TLS versions, there is no way that credentials could have been leaked from vulnerabilities at old TLS versions.
3939

4040
> [!NOTE]
41-
> For Azure Key Vault, ensure that the application accessing the Keyvault service should be running on a platform that supports TLS 1.2 or recent version. If the application is dependent on .Net framework, it should be updated as well. You can also make the registry changes mentioned in [this article](/troubleshoot/azure/active-directory/enable-support-tls-environment) to explicitly enable the use of TLS 1.2 at OS level and for .Net framework. To meet with compliance obligations and to improve security posture, Key Vault connections via TLS 1.0 & 1.1 are considered a security risk, and any connections using old TLS protocols will be disallowed in 2023.
41+
> For Azure Key Vault, ensure that the application accessing the Keyvault service should be running on a platform that supports TLS 1.2 or recent version. If the application is dependent on .Net framework, it should be updated as well. You can also make the registry changes mentioned in [this article](/troubleshoot/azure/active-directory/enable-support-tls-environment) to explicitly enable the use of TLS 1.2 at OS level and for .Net framework. To meet with compliance obligations and to improve security posture, Key Vault connections via TLS 1.0 & 1.1 are considered a security risk, and any connections using old TLS protocols will be disallowed in 2023. You can monitor TLS version used by clients by monitoring Key Vault logs with sample Kusto query [here](monitor-key-vault.md#sample-kusto-queries).
4242
4343
> [!WARNING]
4444
> TLS 1.0 and 1.1 is deprecated by Azure Active Directory and tokens to access key vault may not longer be issued for users or services requesting them with deprecated protocols. This may lead to loss of access to Key vaults. More information on AAD TLS support can be found in [Azure AD TLS 1.1 and 1.0 deprecation](/troubleshoot/azure/active-directory/enable-support-tls-environment/#why-this-change-is-being-made)

0 commit comments

Comments
 (0)