Skip to content

Commit 63a5a24

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into msid-content-health-auth-ado-1976187
1 parent 2318913 commit 63a5a24

16 files changed

+108
-49
lines changed

articles/app-service/security-controls-policy.md

Lines changed: 14 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Azure Policy Regulatory Compliance controls for Azure App Service
33
description: Lists Azure Policy Regulatory Compliance controls available for Azure App Service. These built-in policy definitions provide common approaches to managing the compliance of your Azure resources.
4-
ms.date: 08/17/2022
4+
ms.date: 08/29/2022
55
ms.topic: sample
66
ms.service: app-service
77
ms.custom: subject-policy-compliancecontrols
@@ -21,6 +21,19 @@ compliant with the specific standard.
2121

2222
## Release notes
2323

24+
### August 2022
25+
- **App Service apps should only be accessible over HTTPS**
26+
- Update scope of policy to remove slots
27+
- Creation of "App Service app slots should only be accessible over HTTPS" to monitor slots
28+
- Add "Deny" effect
29+
- Creation of "Configure App Service apps to only be accessible over HTTPS" for enforcement of policy
30+
- **App Service app slots should only be accessible over HTTPS**
31+
- New policy created
32+
- **Configure App Service apps to only be accessible over HTTPS**
33+
- New policy created
34+
- **Configure App Service app slots to only be accessible over HTTPS**
35+
- New policy created
36+
2437
### July 2022
2538

2639
- Deprecation of the following policies:

articles/cosmos-db/sql/how-to-use-stored-procedures-triggers-udfs.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -358,9 +358,9 @@ const container = client.database("myDatabase").container("myContainer");
358358
const triggerId = "trgPreValidateToDoItemTimestamp";
359359
await container.items.create({
360360
category: "Personal",
361-
name : "Groceries",
362-
description : "Pick up strawberries",
363-
isComplete : false
361+
name: "Groceries",
362+
description: "Pick up strawberries",
363+
isComplete: false
364364
}, {preTriggerInclude: [triggerId]});
365365
```
366366

articles/defender-for-cloud/defender-for-servers-introduction.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ Defender for Servers provides two plans you can choose from:
2727
- **Licensing**: Charges Defender for Endpoint licenses per hour instead of per seat, lowering costs by protecting virtual machines only when they are in use.
2828
- **Plan 2**
2929
- **Plan 1**: Includes everything in Defender for Servers Plan 1.
30-
- **Additional features**: All other enhanced Defender for Servers security capabilities for Windows and Linux machines running in Azure, AWS, GCP, and on-premises.
30+
- **Additional features**: All other enhanced Defender for Servers security features.
3131

3232
## Plan features
3333

articles/defender-for-cloud/integration-defender-for-endpoint.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -231,7 +231,7 @@ You can also enable the MDE unified solution at scale through the supplied REST
231231

232232
This is an example request body for the PUT request to enable the MDE unified solution:
233233

234-
URI: `https://management.microsoft.com/subscriptions/<subscriptionId>/providers/Microsoft.Security/settings&api-version=2022-05-01-preview`
234+
URI: `https://management.azure.com/subscriptions/<subscriptionId>/providers/Microsoft.Security/settings&api-version=2022-05-01-preview`
235235

236236
```json
237237
{

articles/defender-for-cloud/multi-factor-authentication-enforcement.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -61,7 +61,7 @@ To see which accounts don't have MFA enabled, use the following Azure Resource G
6161
```kusto
6262
securityresources
6363
| where type == "microsoft.security/assessments"
64-
| where properties.displayName == "MFA should be enabled on accounts with owner permissions on your subscription"
64+
| where properties.displayName == "MFA should be enabled on accounts with owner permissions on subscriptions"
6565
| where properties.status.code == "Unhealthy"
6666
```
6767

articles/firewall/protect-azure-virtual-desktop.md

Lines changed: 44 additions & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -15,63 +15,84 @@ Azure Virtual Desktop is a desktop and app virtualization service that runs on A
1515

1616
[ ![Azure Virtual Desktop architecture](media/protect-windows-virtual-desktop/windows-virtual-desktop-architecture-diagram.png) ](media/protect-windows-virtual-desktop/windows-virtual-desktop-architecture-diagram.png#lightbox)
1717

18-
Follow the guidelines in this article to provide additional protection for your Azure Virtual Desktop host pool using Azure Firewall.
18+
Follow the guidelines in this article to provide extra protection for your Azure Virtual Desktop host pool using Azure Firewall.
1919

2020
## Prerequisites
2121

2222
- A deployed Azure Virtual Desktop environment and host pool.
23-
- An Azure Firewall deployed with at least one Firewall Manager Policy
23+
- An Azure Firewall deployed with at least one Firewall Manager Policy.
24+
- DNS and DNS Proxy enabled in the Firewall Policy to use [FQDN in Network Rules](../firewall/fqdn-filtering-network-rules.md).
2425

25-
For more information, see [Tutorial: Create a host pool by using the Azure portal](../virtual-desktop/create-host-pools-azure-marketplace.md)
26+
For more information, see [Tutorial: Create a host pool by using the Azure portal](../virtual-desktop/create-host-pools-azure-marketplace.md)
2627

2728
To learn more about Azure Virtual Desktop environments see [Azure Virtual Desktop environment](../virtual-desktop/environment-setup.md).
2829

2930
## Host pool outbound access to Azure Virtual Desktop
3031

3132
The Azure virtual machines you create for Azure Virtual Desktop must have access to several Fully Qualified Domain Names (FQDNs) to function properly. Azure Firewall provides an Azure Virtual Desktop FQDN Tag to simplify this configuration. Use the following steps to allow outbound Azure Virtual Desktop platform traffic:
3233

33-
You will need to create an Azure Firewall Policy and create Rule Collections for Network Rules and Applications Rules. Give the Rule Collection a priority and an allow or deny action.
34+
You'll need to create an Azure Firewall Policy and create Rule Collections for Network Rules and Applications Rules. Give the Rule Collection a priority and an allow or deny action.
35+
In order to identify a specific AVD Host Pool as "Source" in the tables below, [IP Group](../firewall/ip-groups.md) can be created to represent it.
3436

3537
### Create network rules
3638

37-
| Name | Source type | Source | Protocol | Destination ports | Destination type | Destination |
38-
| --------- | ----------- | ------------------------- | -------- | ----------------- | ---------------- | --------------------------------- |
39-
| Rule Name | IP Address | VNet or Subnet IP Address | TCP | 80 | IP Address | 169.254.169.254, 168.63.129.16 |
40-
| Rule Name | IP Address | VNet or Subnet IP Address | TCP | 443 | Service Tag | AzureCloud, WindowsVirtualDesktop, AzureFrontDoor.Frontend |
41-
| Rule Name | IP Address | VNet or Subnet IP Address | TCP, UDP | 53 | IP Address | * |
42-
|Rule name | IP Address | VNet or Subnet IP Address | TCP | 1688 | IP address | 20.118.99.224, 40.83.235.53 (azkms.core.windows.net)|
43-
|Rule name | IP Address | VNet or Subnet IP Address | TCP | 1688 | IP address | 23.102.135.246 (kms.core.windows.net)|
39+
Based on the Azure Virtual Desktop (AVD) [reference article](../virtual-desktop/safe-url-list.md), these are the ***mandatory*** rules to allow outbound access to the control plane and core dependent services:
40+
41+
| Name | Source type | Source | Protocol | Destination ports | Destination type | Destination |
42+
| --------- | -------------------- | ------------------------------------- | -------- | ----------------- | ---------------- | --------------------------------- |
43+
| Rule Name | IP Address or Group | IP Group or VNet or Subnet IP Address | TCP | 80 | IP Address | 169.254.169.254, 168.63.129.16 |
44+
| Rule Name | IP Address or Group | IP Group or VNet or Subnet IP Address | TCP | 443 | Service Tag | WindowsVirtualDesktop, AzureFrontDoor.Frontend, AzureMonitor |
45+
| Rule Name | IP Address or Group | IP Group or VNet or Subnet IP Address | TCP, UDP | 53 | IP Address | * |
46+
| Rule name | IP Address or Group | IP Group or VNet or Subnet IP Address | TCP | 1688 | IP address | 20.118.99.224, 40.83.235.53 (azkms.core.windows.net) |
47+
| Rule name | IP Address or Group | IP Group or VNet or Subnet IP Address | TCP | 1688 | IP address | 23.102.135.246 (kms.core.windows.net) |
48+
| Rule name | IP Address or Group | IP Group or VNet or Subnet IP Address | TCP | 443 | FQDN | mrsglobalsteus2prod.blob.core.windows.net |
49+
| Rule name | IP Address or Group | IP Group or VNet or Subnet IP Address | TCP | 443 | FQDN | wvdportalstorageblob.blob.core.windows.net |
50+
| Rule name | IP Address or Group | IP Group or VNet or Subnet IP Address | TCP | 80 | FQDN | oneocsp.microsoft.com |
51+
| Rule name | IP Address or Group | IP Group or VNet or Subnet IP Address | TCP | 80 | FQDN | www.microsoft.com |
4452

4553
> [!NOTE]
4654
> Some deployments might not need DNS rules. For example, Azure Active Directory Domain controllers forward DNS queries to Azure DNS at 168.63.129.16.
4755
56+
Azure Virtual Desktop (AVD) official documentation reports the following Network rules as **optional** depending on the usage and scenario:
57+
58+
| Name | Source type | Source | Protocol | Destination ports | Destination type | Destination |
59+
| ----------| -------------------- | ------------------------------------- | -------- | ----------------- | ---------------- | --------------------------------- |
60+
| Rule Name | IP Address or Group | IP Group or VNet or Subnet IP Address | UDP | 123 | FQDN | time.windows.com |
61+
| Rule Name | IP Address or Group | IP Group or VNet or Subnet IP Address | TCP | 443 | FQDN | login.microsoftonline.com |
62+
| Rule Name | IP Address or Group | IP Group or VNet or Subnet IP Address | TCP | 443 | FQDN | login.windows.net |
63+
| Rule Name | IP Address or Group | IP Group or VNet or Subnet IP Address | TCP | 443 | FQDN | www.msftconnecttest.com |
64+
65+
4866
### Create application rules
4967

50-
| Name | Source type | Source | Protocol | Destination type | Destination |
51-
| --------- | ----------- | ------------------------- | ---------- | ---------------- | ------------------------------------------------------------------------------------------- |
52-
| Rule Name | IP Address | VNet or Subnet IP Address | Https:443 | FQDN Tag | WindowsVirtualDesktop, WindowsUpdate, Windows Diagnostics, MicrosoftActiveProtectionService |
68+
Azure Virtual Desktop (AVD) official documentation reports the following Application rules as **optional** depending on the usage and scenario:
69+
70+
| Name | Source type | Source | Protocol | Destination type | Destination |
71+
| --------- | -------------------- | --------------------------| ---------- | ---------------- | ------------------------------------------------------------------------------------------- |
72+
| Rule Name | IP Address or Group | VNet or Subnet IP Address | Https:443 | FQDN Tag | WindowsUpdate, Windows Diagnostics, MicrosoftActiveProtectionService |
73+
| Rule Name | IP Address or Group | VNet or Subnet IP Address | Https:443 | FQDN | *.events.data.microsoft.com |
74+
| Rule Name | IP Address or Group | VNet or Subnet IP Address | Https:443 | FQDN | *.sfx.ms |
75+
| Rule Name | IP Address or Group | VNet or Subnet IP Address | Https:443 | FQDN | *.digicert.com |
76+
| Rule Name | IP Address or Group | VNet or Subnet IP Address | Https:443 | FQDN | *.azure-dns.com, *.azure-dns.net |
5377

5478
> [!IMPORTANT]
5579
> We recommend that you don't use TLS inspection with Azure Virtual Desktop. For more information, see the [proxy server guidelines](../virtual-desktop/proxy-server-support.md#dont-use-ssl-termination-on-the-proxy-server).
5680
81+
## Azure Firewall Policy Sample
82+
All the mandatory and optional rules mentioned above can be easily deployed a single Azure Firewall Policy using the template published at [this link](https://github.com/Azure/RDS-Templates/tree/master/AzureFirewallPolicyForAVD).
83+
Before deploying into production, it's highly recommended to review all the Network and Application rules defined, ensure alignment with Azure Virtual Desktop official documentation and security requirements.
84+
5785
## Host pool outbound access to the Internet
5886

59-
Depending on your organization needs, you might want to enable secure outbound internet access for your end users. If the list of allowed destinations is well-defined (for example, for [Microsoft 365 access](/microsoft-365/enterprise/microsoft-365-ip-web-service)), you can use Azure Firewall application and network rules to configure the required access. This routes end-user traffic directly to the internet for best performance. If you need to allow network connectivity for Windows 365 or Intune, see [Network requirments for Windows 365](/windows-365/requirements-network#allow-network-connectivity) and [Network endpoints for Intune](/mem/intune/fundamentals/intune-endpoints).
87+
Depending on your organization needs, you might want to enable secure outbound internet access for your end users. If the list of allowed destinations is well-defined (for example, for [Microsoft 365 access](/microsoft-365/enterprise/microsoft-365-ip-web-service)), you can use Azure Firewall application and network rules to configure the required access. This routes end-user traffic directly to the internet for best performance. If you need to allow network connectivity for Windows 365 or Intune, see [Network requirements for Windows 365](/windows-365/requirements-network#allow-network-connectivity) and [Network endpoints for Intune](/mem/intune/fundamentals/intune-endpoints).
6088

6189
If you want to filter outbound user internet traffic by using an existing on-premises secure web gateway, you can configure web browsers or other applications running on the Azure Virtual Desktop host pool with an explicit proxy configuration. For example, see [How to use Microsoft Edge command-line options to configure proxy settings](/deployedge/edge-learnmore-cmdline-options-proxy-settings). These proxy settings only influence your end-user internet access, allowing the Azure Virtual Desktop platform outbound traffic directly via Azure Firewall.
6290

6391
## Control user access to the web
6492

6593
Admins can allow or deny user access to different website categories. Add a rule to your Application Collection from your specific IP address to web categories you want to allow or deny. Review all the [web categories](web-categories.md).
6694

67-
## Additional considerations
68-
69-
You might need to configure additional firewall rules, depending on your requirements:
70-
71-
- NTP server access
72-
73-
By default, virtual machines running Windows connect to `time.windows.com` over UDP port 123 for time synchronization. Create a network rule to allow this access, or for a time server that you use in your environment.
74-
7595
## Next steps
7696

7797
- Learn more about Azure Virtual Desktop: [What is Azure Virtual Desktop?](../virtual-desktop/overview.md)
98+

articles/hdinsight/hadoop/apache-hadoop-use-mapreduce-ssh.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn how to use SSH to run MapReduce jobs using Apache Hadoop on H
44
ms.service: hdinsight
55
ms.topic: how-to
66
ms.custom: hdinsightactive
7-
ms.date: 01/10/2020
7+
ms.date: 08/30/2022
88
---
99

1010
# Use MapReduce with Apache Hadoop on HDInsight with SSH

articles/hdinsight/hbase/hbase-troubleshoot-unassigned-regions.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Issues with region servers in Azure HDInsight
33
description: Issues with region servers in Azure HDInsight
44
ms.service: hdinsight
55
ms.topic: troubleshooting
6-
ms.date: 06/30/2020
6+
ms.date: 08/30/2022
77
---
88

99
# Issues with region servers in Azure HDInsight

articles/hdinsight/hdinsight-config-for-vscode.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Azure HDInsight configuration settings reference
33
description: Introduce the configuration of Azure HDInsight extension.
44
ms.service: hdinsight
55
ms.topic: how-to
6-
ms.date: 04/07/2021
6+
ms.date: 08/30/2022
77
ms.custom: devx-track-python
88
---
99

@@ -77,4 +77,4 @@ For general information about working with settings in VS Code, refer to [User a
7777
## Next steps
7878

7979
- For information about Azure HDInsight for VSCode, see [Spark & Hive for Visual Studio Code Tools](/sql/big-data-cluster/spark-hive-tools-vscode).
80-
- For a video that demonstrates using Spark & Hive for Visual Studio Code, see [Spark & Hive for Visual Studio Code](https://go.microsoft.com/fwlink/?linkid=858706).
80+
- For a video that demonstrates using Spark & Hive for Visual Studio Code, see [Spark & Hive for Visual Studio Code](https://go.microsoft.com/fwlink/?linkid=858706).

articles/hdinsight/hdinsight-sdk-dotnet-samples.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: 'Azure HDInsight: .NET samples'
33
description: Find C# .NET examples on GitHub for common tasks using the HDInsight SDK for .NET.
44
ms.service: hdinsight
55
ms.topic: sample
6-
ms.date: 12/06/2019
6+
ms.date: 08/30/2022
77
---
88

99
# Azure HDInsight: .NET samples

0 commit comments

Comments
 (0)