Skip to content

Commit 66bb330

Browse files
authored
Merge pull request #245165 from MicrosoftDocs/repo_sync_working_branch
Confirm merge from repo_sync_working_branch to main to sync with https://github.com/MicrosoftDocs/azure-docs (branch main)
2 parents 202dec5 + 1f58b55 commit 66bb330

File tree

5 files changed

+30
-5
lines changed

5 files changed

+30
-5
lines changed

articles/active-directory/cloud-infrastructure-entitlement-management/product-rule-based-anomalies.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -60,7 +60,7 @@ Rule-based anomalies identify recent activity in Permissions Management that is
6060
1. Select one of the following conditions:
6161
- **Any Resource Accessed for the First Time**: The identity accesses a resource for the first time during the specified time interval.
6262
- **Identity Performs a Particular Task for the First Time**: The identity does a specific task for the first time during the specified time interval.
63-
- **Identity Performs a Task for the First Time**: The identity performs any task for the first time during the specified time interval
63+
- **Identity Performs a Task for the First Time**: The identity performs any task for the first time during the specified time interval.
6464
1. Select **Next**.
6565
1. On the **Authorization Systems** tab, select the available authorization systems and folders, or select **All**.
6666

articles/aks/operator-best-practices-cluster-security.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -53,6 +53,10 @@ For more information about Azure AD integration, Kubernetes RBAC, and Azure RBAC
5353
>
5454
> Add a network policy in all user namespaces to block pod egress to the metadata endpoint.
5555
56+
> [!NOTE]
57+
> To implement Network Policy, include the attribute `--network-policy azure` when creating the AKS cluster. Use the following command to create the cluster:
58+
> `az aks create -g myResourceGroup -n myManagedCluster --enable-managed-identity --network-plugin azure --network-policy azure`
59+
5660
```yaml
5761
apiVersion: networking.k8s.io/v1
5862
kind: NetworkPolicy

articles/sentinel/dynamics-365/deploy-dynamics-365-finance-operations-solution.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -44,8 +44,8 @@ Before you begin, verify that:
4444
## Deploy the solution and enable the data connector
4545

4646
1. Navigate to the **Microsoft Sentinel** service.
47-
1. Select **Content hub**, and in the search bar, search for *Dynamics 365 F&O*.
48-
1. Select **Dynamics 365 F&O**.
47+
1. Select **Content hub**, and in the search bar, search for *Dynamics 365 Finance and Operations*.
48+
1. Select **Dynamics 365 Finance and Operations**.
4949
1. Select **Install**.
5050

5151
For more information about how to manage the solution components, see [Discover and deploy out-of-the-box content](../sentinel-solutions-deploy.md).

articles/sentinel/normalization-develop-parsers.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -425,7 +425,7 @@ Handle the results as follows:
425425
To make sure that your parser produces valid values, use the ASIM data tester by running the following query in the Microsoft Sentinel **Logs** page:
426426

427427
```KQL
428-
<parser name> | limit <X> | invoke ASimDataTester ( ['<schema>'] )
428+
<parser name> | limit <X> | invoke ASimDataTester ('<schema>')
429429
```
430430

431431
Specifying a schema is optional. If a schema is not specified, the `EventSchema` field is used to identify the schema the event should adhere to. Ig an event does not include an `EventSchema` field, only common fields will be verified. If a schema is specified as a parameter, this schema will be used to test all records. This is useful for older parsers that do not set the `EventSchema` field.

articles/virtual-machines/maintenance-configurations.md

Lines changed: 22 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -59,7 +59,7 @@ This scope is integrated with [update management center](../update-center/overvi
5959

6060
- The upper maintenance window is 3 hours 55 mins.
6161
- A minimum of 1 hour and 30 minutes is required for the maintenance window.
62-
- There is no limit to the recurrence of your schedule.
62+
- The value of **Repeat** should be at least 6 hours.
6363

6464
To learn more about this topic, checkout [update management center and scheduled patching](../update-center/scheduled-patching.md)
6565

@@ -80,6 +80,27 @@ You can create and manage maintenance configurations using any of the following
8080
8181
For an Azure Functions sample, see [Scheduling Maintenance Updates with Maintenance Configurations and Azure Functions](https://github.com/Azure/azure-docs-powershell-samples/tree/master/maintenance-auto-scheduler).
8282

83+
## Service Limits
84+
85+
The following are the recommended limits for the mentioned indicators
86+
87+
| Indicator | Limit |
88+
|----------|----------------------------|
89+
| Number of schedules per Subscription per Region | 250 |
90+
| Total number of Resource associations to a schedule | 3000 |
91+
| Resource associations on each dynamic scope | 1000 |
92+
| Number of dynamic scopes per Resource Group or Subscription per Region | 250 |
93+
94+
The following are the Dynamic Scope Limits for **each dynamic scope**
95+
96+
| Resource | Limit |
97+
|----------|----------------------------|
98+
| Resource associations | 1000 |
99+
| Number of tag filters | 50 |
100+
| Number of Resource Group filters | 50 |
101+
102+
**Please note that the above limits are for the Dynamic Scoping in the Guest scope only.**
103+
83104
## Next steps
84105

85106
To learn more, see [Maintenance and updates](maintenance-and-updates.md).

0 commit comments

Comments
 (0)