Skip to content

Commit 5ec4db0

Browse files
committed
Updated redirection file
1 parent 7b7b754 commit 5ec4db0

File tree

4 files changed

+13
-37
lines changed

4 files changed

+13
-37
lines changed

articles/batch/security-baseline.md

Lines changed: 5 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -1060,25 +1060,14 @@ https://docs.microsoft.com/azure/governance/policy/tutorials/create-and-manage
10601060

10611061
**Guidance**: Use Azure Policy aliases in the "Microsoft.Batch" namespace to create custom policies to audit or enforce the configuration of your Azure Batch instance. You may also use any built-in policies created specifically for Azure Batch or the resources used by Azure Batch, such as:
10621062

1063+
- Subnets should be associated with a Network Security Group
1064+
- Storage Accounts should use a virtual network service endpoint
1065+
- Diagnostic logs in Batch accounts should be enabled
10631066

1067+
How to view available Azure Policy Aliases: https://docs.microsoft.com/powershell/module/az.resources/get-azpolicyalias?view=azps-3.3.0
10641068

1065-
Subnets should be associated with a Network Security Group
1066-
1067-
Storage Accounts should use a virtual network service endpoint
1068-
1069-
Diagnostic logs in Batch accounts should be enabled
1070-
1071-
1072-
1073-
How to view available Azure Policy Aliases:
1074-
1075-
https://docs.microsoft.com/powershell/module/az.resources/get-azpolicyalias?view=azps-3.3.0
1076-
1077-
1078-
1079-
How to configure and manage Azure Policy:
1069+
How to configure and manage Azure Policy: https://docs.microsoft.com/azure/governance/policy/tutorials/create-and-manage
10801070

1081-
https://docs.microsoft.com/azure/governance/policy/tutorials/create-and-manage
10821071

10831072
**Azure Security Center monitoring**: Currently not available
10841073

articles/hdinsight/TOC.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -220,7 +220,7 @@
220220
href: https://docs.microsoft.com/java/api/overview/azure/hdinsight?view=azure-java-stable
221221
- name: SDK for Go
222222
href: ./hdinsight-go-sdk-overview.md
223-
- name: .NET (Apache HBASE)
223+
- name: .NET (Apache HBase)
224224
href: https://www.nuget.org/packages/Microsoft.HBase.Client/
225225
- name: REST API
226226
href: /rest/api/hdinsight/

articles/hdinsight/security-baseline.md

Lines changed: 5 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -928,27 +928,14 @@ https://docs.microsoft.com/azure/azure-resource-manager/resource-group-using-tag
928928

929929
**Guidance**: Use Azure policy to put restrictions on the type of resources that can be created in customer subscription(s) using the following built-in policy definitions:
930930

931-
932-
933-
Not allowed resource types
934-
935-
Allowed resource types
936-
937-
931+
- Not allowed resource types
932+
- Allowed resource types
938933

939934
Use Azure Resource Graph to query/discover resources within your subscription(s). Ensure that all Azure resources present in the environment are approved.
940935

936+
How to configure and manage Azure Policy: https://docs.microsoft.com/azure/governance/policy/tutorials/create-and-manage
941937

942-
943-
How to configure and manage Azure Policy:
944-
945-
https://docs.microsoft.com/azure/governance/policy/tutorials/create-and-manage
946-
947-
948-
949-
How to create queries with Azure Graph:
950-
951-
https://docs.microsoft.com/azure/governance/resource-graph/first-query-portal
938+
How to create queries with Azure Graph: https://docs.microsoft.com/azure/governance/resource-graph/first-query-portal
952939

953940
**Azure Security Center monitoring**: Currently not available
954941

@@ -1008,7 +995,7 @@ How to deny a specific resource type with Azure Policy: https://docs.microsoft.c
1008995

1009996
### 6.11: Limit users' ability to interact with Azure Resources Manager via scripts
1010997

1011-
**Guidance**: Use Azure Conditional Access to limit users' ability to interact with Azure Resource manager by configuring "Block access" for the "Microsoft Azure Management" App.
998+
**Guidance**: Use Azure Conditional Access to limit users' ability to interact with Azure Resource Manager by configuring "Block access" for the "Microsoft Azure Management" App.
1012999

10131000

10141001
How to configure Conditional Access to block access to Azure Resource Manager:

articles/sql-database/security-baseline.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -166,7 +166,7 @@ https://docs.microsoft.com/azure/virtual-network/service-tags-overview
166166

167167
**Guidance**: Define and implement network security configurations for your Azure SQL Database server instances with Azure Policy. You may use the "Microsoft.Sql" namespace to define custom policy definitions, or use any of the built-in policy definitions designed for Azure SQL Database server network protection. An example of an applicable built-in network security policy for Azure SQL Database server would be: "SQL Server should use a virtual network service endpoint"
168168

169-
Use Azure Blueprints to simplify largescale Azure deployments by packaging key environment artifacts, such as Azure Resource Management templates, Role-based access control (RBAC), and policies, in a single blueprint definition. Easily apply the blueprint to new subscriptions and environments, and fine-tune control and management through versioning.
169+
Use Azure Blueprints to simplify large scale Azure deployments by packaging key environment artifacts, such as Azure Resource Management templates, Role-based access control (RBAC), and policies, in a single blueprint definition. Easily apply the blueprint to new subscriptions and environments, and fine-tune control and management through versioning.
170170

171171
How to configure and manage Azure Policy: https://docs.microsoft.com/azure/governance/policy/tutorials/create-and-manage
172172

@@ -1055,7 +1055,7 @@ https://docs.microsoft.com/azure/security-center/security-center-sql-service-rec
10551055

10561056
### 7.10: Implement automated configuration monitoring for operating systems
10571057

1058-
**Guidance**: Not applicable; this recomendation is intended for compute resources.
1058+
**Guidance**: Not applicable; this recommendation is intended for compute resources.
10591059

10601060
**Azure Security Center monitoring**: Not applicable
10611061

0 commit comments

Comments
 (0)