Skip to content

Commit 6bb2011

Browse files
committed
Merge branch 'master' into update-0319
2 parents cfda489 + e4c4258 commit 6bb2011

File tree

8 files changed

+13
-19
lines changed

8 files changed

+13
-19
lines changed

articles/app-service/app-service-web-tutorial-php-mysql.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -208,7 +208,8 @@ az mysql server firewall-rule create --name AllowLocalClient --server <mysql_ser
208208
In the local terminal window, connect to the MySQL server in Azure. Use the value you specified previously for _&lt;mysql_server_name>_. When prompted for a password, use the password you specified when you created the database in Azure.
209209

210210
```bash
211-
mysql -u <admin_user>@<mysql_server_name> -h <mysql_server_name>.mysql.database.azure.com -P 3306 -p
211+
mysql -u <admin_user>@<mysql_server_name> -h <mysql_server_name>.mysql.database.azure.com -P 3306 -p<PASSWORD> --ssl-mode=REQUIRED --ssl-ca=<PATH_TO_PEM>
212+
212213
```
213214

214215
### Create a production database

articles/azure-monitor/platform/alerts-activity-log.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -123,7 +123,7 @@ A simple analogy for understanding conditions on which alert rules can be create
123123

124124

125125
## Azure Resource Manager template
126-
To create an activity log rule by using an Azure Resource Manager template, you create a resource of the type `microsoft.insights/activityLogAlerts`. Then you fill in all related properties. Here's a template that creates an activity log rule:
126+
To create an activity log alert rule by using an Azure Resource Manager template, you create a resource of the type `microsoft.insights/activityLogAlerts`. Then you fill in all related properties. Here's a template that creates an activity log alert rule:
127127

128128
```json
129129
{

articles/governance/resource-graph/reference/supported-tables-resources.md

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Supported Resource Manager resource types
33
description: Provide a list of the Resource Manager resource types supported by Azure Resource Graph and Change History.
4-
ms.date: 03/09/2020
4+
ms.date: 03/19/2020
55
ms.topic: reference
66
---
77
# Azure Resource Graph table and resource type reference
@@ -287,6 +287,7 @@ part of a **table** in Resource Graph.
287287
- microsoft.network/networkinterfaces
288288
- microsoft.network/networkprofiles
289289
- microsoft.network/networksecuritygroups
290+
- microsoft.network/networkvirtualappliances
290291
- microsoft.network/networkwatchers
291292
- microsoft.network/networkwatchers/connectionmonitors
292293
- microsoft.network/networkwatchers/flowlogs
@@ -303,6 +304,7 @@ part of a **table** in Resource Graph.
303304
- microsoft.network/routefilters
304305
- microsoft.network/routetables
305306
- microsoft.network/sampleresources
307+
- microsoft.network/securitypartnerproviders
306308
- microsoft.network/serviceendpointpolicies
307309
- microsoft.network/trafficmanagerprofiles
308310
- microsoft.network/virtualhubs
@@ -335,6 +337,7 @@ part of a **table** in Resource Graph.
335337
- microsoft.projectarcadia/workspaces/sparkcomputes
336338
- microsoft.projectarcadia/workspaces/sqlcomputes
337339
- microsoft.projectbabylon/accounts
340+
- microsoft.quantum/workspaces
338341
- microsoft.recoveryservices/vaults
339342
- microsoft.redhatopenshift/openshiftclusters
340343
- microsoft.relay/namespaces
@@ -437,6 +440,8 @@ part of a **table** in Resource Graph.
437440
- u2uconsult.theidentityhub/services
438441
- wandisco.fusion/fusiongroups
439442
- wandisco.fusion/fusiongroups/azurezones
443+
- wandisco.fusion/fusiongroups/azurezones/plugins
444+
- wandisco.fusion/fusiongroups/managedonpremzones
440445
- wandisco.fusion/fusiongroups/onpremzones
441446
- wandisco.fusion/fusiongroups/replicationrules
442447

articles/iot-central/core/overview-iot-central.md

Lines changed: 0 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -38,9 +38,6 @@ This article outlines, for IoT Central:
3838
- Device capability models must have all the interfaces defined inline in the same file.
3939
- Support for [IoT Plug and Play](../../iot-pnp/overview-iot-plug-and-play.md) is in preview and is only supported only in selected regions.
4040

41-
> [!NOTE]
42-
> Contact technical support for access to create a Preview application with support for IoT Plug and Play devices.
43-
4441
## Personas
4542

4643
The IoT Central documentation refers to four personas who interact with an IoT Central application:

articles/iot-central/core/tutorial-connect-pnp-device.md

Lines changed: 0 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -18,9 +18,6 @@ A _device capability model_ (DCM) describes the capabilities of an [IoT Plug and
1818

1919
Support for [IoT Plug and Play](../../iot-pnp/overview-iot-plug-and-play.md) is in preview and is only supported only in selected regions.
2020

21-
> [!NOTE]
22-
> Contact technical support for access to create a preview application with support for IoT Plug and Play devices.
23-
2421
In this tutorial, you learn how to:
2522

2623
> [!div class="checklist"]

articles/iot-pnp/howto-install-pnp-cli.md

Lines changed: 0 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -56,9 +56,6 @@ To use the Azure IoT extension for the Azure CLI, you need:
5656

5757
- An Azure IoT hub. There are many ways to add an IoT hub to your Azure subscription, such as [Create an IoT hub using the Azure CLI](../iot-hub/iot-hub-create-using-cli.md). You need the IoT hub's connection string to run the Azure IoT extension commands. If you don't have an Azure subscription, create a [free account](https://azure.microsoft.com/free/?WT.mc_id=A261C142F) before you begin.
5858

59-
> [!NOTE]
60-
> During public preview, IoT Plug and Play features are only available on IoT hubs created in the **Central US**, **North Europe**, and **Japan East** regions.
61-
6259
- A device registered in your IoT hub. You can use the following Azure CLI command to register a device, be sure to replace the `{YourIoTHubName}` and `{YourDeviceID}` placeholders with your values:
6360

6461
```cmd/sh

articles/iot-pnp/overview-iot-plug-and-play.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -74,7 +74,7 @@ As a device developer, you can submit IoT hardware products for certification. Y
7474

7575
## Regional availability
7676

77-
During public preview, IoT Plug and Play is available in the North Europe, Central US, and Japan East regions. Please make sure you create your hub in one of these regions.
77+
During public preview, IoT Plug and Play is available in all regions.
7878

7979
## Message quotas in IoT Hub
8080
During public preview, IoT Plug and Play devices send separate messages per interface, which may increase the number of messages counted towards your [message quota](../iot-hub/iot-hub-devguide-quotas-throttling.md).

articles/security-center/security-center-troubleshooting-guide.md

Lines changed: 3 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -34,8 +34,6 @@ Depending on the alert types, customers can gather the necessary information to
3434
* AuditD in Linux
3535
* The Azure activity logs, and the enable diagnostic logs on the attack resource.
3636

37-
For some alerts we also have a confidence score. The confidence score in **Security Center** can help your team triage and prioritize alerts. **Security Center** automatically applies industry best practices, intelligent algorithms, and processes used by analysts to determine whether a threat is legitimate and provides meaningful insights in the form of a confidence score.
38-
3937
Customers can share feedback for the alert description and relevance. Navigate to the alert itself, select the **Was This Useful** button, select the reason, and then enter a comment to explain which explains the feedback. We consistently monitor this feedback channel to improve our alerts.
4038

4139
## Audit log
@@ -70,7 +68,7 @@ There are two installation scenarios that can produce different results when ins
7068

7169
* **Agent installed automatically by Security Center**: in this scenario you will be able to view the alerts in both locations, Security Center and Log search. You will receive email notifications to the email address that was configured in the security policy for the subscription the resource belongs to.
7270

73-
* **Agent manually installed on a VM located in Azure**: in this scenario, if you are using agents downloaded and installed manually prior to February 2017, you can view the alerts in the Security Center portal only if you filter on the subscription the workspace belongs to. If you filter on the subscription the resource belongs to, you wont see any alerts. You'll receive email notifications to the email address that was configured in the security policy for the subscription the workspace belongs to.
71+
* **Agent manually installed on a VM located in Azure**: in this scenario, if you are using agents downloaded and installed manually prior to February 2017, you can view the alerts in the Security Center portal only if you filter on the subscription the workspace belongs to. If you filter on the subscription the resource belongs to, you won't see any alerts. You'll receive email notifications to the email address that was configured in the security policy for the subscription the workspace belongs to.
7472

7573
> [!NOTE]
7674
> To avoid the behavior explained in the second scenario, make sure you download the latest version of the agent.
@@ -88,8 +86,8 @@ There are two installation scenarios that can produce different results when ins
8886
|Installation failed - general error | The Microsoft Monitoring Agent was installed but failed due to an error. | [Manually install the extension](../azure-monitor/learn/quick-collect-azurevm.md#enable-the-log-analytics-vm-extension) or uninstall the extension so Security Center will try to install again. |
8987
| Installation failed - local agent already installed | Microsoft Monitoring Agent install failed. Security Center identified a local agent (Log Analytics or System Center Operations Manager) already installed on the VM. To avoid multi-homing configuration, where the VM is reporting to two separate workspaces, the Microsoft Monitoring Agent installation stopped. | There are two ways to resolve: [manually install the extension](../azure-monitor/learn/quick-collect-azurevm.md#enable-the-log-analytics-vm-extension) and connect it to your desired workspace. Or, set your desired workspace as your default workspace and enable automatic provisioning of the agent. See [enable automatic provisioning](security-center-enable-data-collection.md). |
9088
| Agent cannot connect to workspace | Microsoft Monitoring Agent installed but failed due to network connectivity. Check that there is internet access or that a valid HTTP proxy has been configured for the agent. | See monitoring agent network requirements. |
91-
| Agent connected to missing or unknown workspace | Security Center identified that the Microsoft Monitoring Agent installed on the VM is connected to a workspace which it doesnt have access to. | This can happen in two cases. The workspace was deleted and no longer exists. Reinstall the agent with the correct workspace or uninstall the agent and allow Security Center to complete its automatic provisioning installation. The second case is where the workspace is part of a subscription that Security Center does not have permissions to. Security Center requires subscriptions to allow the Microsoft Security Resource Provider to access them. To enable, register the subscription to the Microsoft Security Resource Provider. This can be done by API, PowerShell, portal or by simply filtering on the subscription in the Security Center **Overview** dashboard. See [Resource providers and types](../azure-resource-manager/management/resource-providers-and-types.md#azure-portal) for more information. |
92-
| Agent not responsive or missing ID | Security Center is unable to retrieve security data scanned from the VM, even though the agent is installed. | The agent is not reporting any data, including heartbeat. The agent might be damaged or something is blocking traffic. Or, the agent is reporting data but is missing an Azure resource ID so its impossible to match the data to the Azure VM. To troubleshoot Linux, see [Troubleshooting Guide for Log Analytics Agent for Linux](https://github.com/Microsoft/OMS-Agent-for-Linux/blob/master/docs/Troubleshooting.md#im-not-seeing-any-linux-data-in-the-oms-portal). To troubleshoot Windows, see [Troubleshooting Windows Virtual Machines](https://github.com/MicrosoftDocs/azure-docs/blob/8c53ac4371d482eda3d85819a4fb8dac09996a89/articles/log-analytics/log-analytics-azure-vm-extension.md#troubleshooting-windows-virtual-machines). |
89+
| Agent connected to missing or unknown workspace | Security Center identified that the Microsoft Monitoring Agent installed on the VM is connected to a workspace which it doesn't have access to. | This can happen in two cases. The workspace was deleted and no longer exists. Reinstall the agent with the correct workspace or uninstall the agent and allow Security Center to complete its automatic provisioning installation. The second case is where the workspace is part of a subscription that Security Center does not have permissions to. Security Center requires subscriptions to allow the Microsoft Security Resource Provider to access them. To enable, register the subscription to the Microsoft Security Resource Provider. This can be done by API, PowerShell, portal or by simply filtering on the subscription in the Security Center **Overview** dashboard. See [Resource providers and types](../azure-resource-manager/management/resource-providers-and-types.md#azure-portal) for more information. |
90+
| Agent not responsive or missing ID | Security Center is unable to retrieve security data scanned from the VM, even though the agent is installed. | The agent is not reporting any data, including heartbeat. The agent might be damaged or something is blocking traffic. Or, the agent is reporting data but is missing an Azure resource ID so it's impossible to match the data to the Azure VM. To troubleshoot Linux, see [Troubleshooting Guide for Log Analytics Agent for Linux](https://github.com/Microsoft/OMS-Agent-for-Linux/blob/master/docs/Troubleshooting.md#im-not-seeing-any-linux-data-in-the-oms-portal). To troubleshoot Windows, see [Troubleshooting Windows Virtual Machines](https://github.com/MicrosoftDocs/azure-docs/blob/8c53ac4371d482eda3d85819a4fb8dac09996a89/articles/log-analytics/log-analytics-azure-vm-extension.md#troubleshooting-windows-virtual-machines). |
9391
| Agent not installed | Data collection is disabled. | Turn on data collection in the security policy or manually install the Microsoft Monitoring Agent. |
9492

9593
## Troubleshooting monitoring agent network requirements <a name="mon-network-req"></a>
@@ -146,7 +144,6 @@ In this document, you learned how to configure security policies in Azure Securi
146144
* [Alerts Validation in Azure Security Center](security-center-alert-validation.md)
147145
* [Email Notifications in Azure Security Center](security-center-provide-security-contact-details.md)
148146
* [Handling Security Incidents in Azure Security Center](security-center-incident.md)
149-
* [Alert confidence score](security-center-secure-score.md)
150147
* [Investigate Incidents and Alerts in Azure Security Center](security-center-investigation.md)
151148
* [Azure Security Center detection capabilities](security-center-detection-capabilities.md)
152149
* [Monitoring partner solutions with Azure Security Center](security-center-partner-solutions.md) — Learn how to monitor the health status of your partner solutions.

0 commit comments

Comments
 (0)