You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/azure-resource-manager/templates/template-specs-create-linked.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -23,7 +23,7 @@ Create the main template and the linked template.
23
23
24
24
To link a template, add a [deployments resource](/azure/templates/microsoft.resources/deployments) to your main template. In the `templateLink` property, specify the relative path of the linked template in accordance with the path of the parent template.
25
25
26
-
The linked template is called **linkedTemplate.json**, and is stored in a subfolder called **artifacts** in the path where the main template is stored. You can use one of the follow values for the relativePath:
26
+
The linked template is called **linkedTemplate.json**, and is stored in a subfolder called **artifacts** in the path where the main template is stored. You can use one of the following values for the relativePath:
Copy file name to clipboardExpand all lines: articles/iot-hub-device-update/device-update-agent-provisioning.md
+26-8Lines changed: 26 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -76,8 +76,25 @@ Follow these instructions to provision the Device Update agent on [IoT Edge enab
76
76
77
77
1. Follow the instructions to [Install and provision the Azure IoT Edge runtime](https://docs.microsoft.com/azure/iot-edge/how-to-install-iot-edge?view=iotedge-2020-11&preserve-view=true).
78
78
79
-
1. Then install the Device Update agent from [Artifacts](https://github.com/Azure/iot-hub-device-update/releases) and you are now ready to start the Device Update agent on your IoT Edge device.
80
-
79
+
1. Install the Device Update image update agent
80
+
- We provide sample images in [Artifacts](https://github.com/Azure/iot-hub-device-update/releases) to try image update rollouts to different versions using a base image (adu-base-image) and one update image (adu-update-image). See example of [how to flash the image to your IoT Hub device](https://docs.microsoft.com/azure/iot-hub-device-update/device-update-raspberry-pi#flash-sd-card-with-image).
81
+
82
+
1. Install the Device Update package update agent
83
+
- For latest agent versions from packages.miscrosoft.com: Update package lists on your device and install the Device Update agent package and its dependencies using:
- For upcoming release candidate versions from [Artifacts](https://github.com/Azure/iot-hub-device-update/releases) : Download the .dep file to the machine you want to install the Device Update agent on, then:
93
+
```shell
94
+
Sudo apt-get install -y ./"<PATH TO FILE>"/"<.DEP FILE NAME>"
95
+
```
96
+
97
+
1. You are now ready to start the Device Update agent on your IoT Edge device.
81
98
82
99
### On non-Edge IoT Linux devices
83
100
@@ -125,14 +142,15 @@ Follow these instructions to provision the Device Update agent on your IoT Linux
125
142
sudo aziotctl config apply
126
143
```
127
144
128
-
1. Finally install the Device Update agent from [Artifacts](https://github.com/Azure/iot-hub-device-update/releases) and you are now ready to start the Device Update agent on your IoT Edge device.
145
+
1. Finally install the Device Update agent. We provide sample images in[Artifacts](https://github.com/Azure/iot-hub-device-update/releases) to try image update rollouts to different versions using a base image (adu-base-image) and one update image (adu-update-image). See example of [how to flash the image to your IoT Hub device](https://docs.microsoft.com/azure/iot-hub-device-update/device-update-raspberry-pi#flash-sd-card-with-image).
129
146
147
+
1. You are now ready to start the Device Update agent on your IoT device.
130
148
131
149
### Other IoT devices
132
150
133
151
The Device Update agent can also be configured without the IoT Identity service for testing or on constrained devices. Follow the below steps to provision the Device Update agent using a connection string (from the Module or Device).
134
152
135
-
1. Install Device Update agent from [Artifacts](https://github.com/Azure/iot-hub-device-update/releases).
153
+
1. We provide sample images in [Artifacts](https://github.com/Azure/iot-hub-device-update/releases) to try image update rollouts to different versions using a base image (adu-base-image) and one update image (adu-update-image). See example of [how to flash the image to your IoT Hub device](https://docs.microsoft.com/azure/iot-hub-device-update/device-update-raspberry-pi#flash-sd-card-with-image).
136
154
137
155
1. Log onto the machine or IoT Edge device/IoT device.
138
156
@@ -145,16 +163,16 @@ The Device Update agent can also be configured without the IoT Identity service
145
163
146
164
1. You should see a window open with some text in it. Delete the entire string following 'connection_String=' the first-time you provision the Device Update agent on the IoT device. It is just place holder text.
147
165
148
-
1. In the terminal, replace <your-connection-string> with the connection string of the device for your instance of Device Update agent.
166
+
1. In the terminal, replace "<your-connection-string>" with the connection string of the device for your instance of Device Update agent.
1. Now you are now ready to start the Device Update agent on your IoT Edge device.
175
+
1. Now you are now ready to start the Device Update agent on your IoT device.
158
176
159
177
160
178
## How to start the Device Update Agent
@@ -187,7 +205,7 @@ You can also build and modify your own customer Device Update agent.
187
205
Follow the instructions to [build](https://github.com/Azure/iot-hub-device-update/blob/main/docs/agent-reference/how-to-build-agent-code.md) the Device Update Agent
188
206
from source.
189
207
190
-
Once the agent is successfully building, it's time [run](https://github.com/Azure/iot-hub-device-update/blob/main/docs/agent-reference/how-to-run-agent.md)
208
+
Once the agent is successfully building, it's time to [run](https://github.com/Azure/iot-hub-device-update/blob/main/docs/agent-reference/how-to-run-agent.md)
191
209
the agent.
192
210
193
211
Now, make the changes needed to incorporate the agent into your image. Look at how to
Copy file name to clipboardExpand all lines: articles/purview/register-scan-amazon-s3.md
+23-6Lines changed: 23 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -112,10 +112,31 @@ This procedure describes how to create a new Purview credential to use when scan
112
112
113
113
Select **Create** when you're done to finish creating the credential.
114
114
115
-
For more information about Purview credentials, see the [Azure Purview public preview documentation](manage-credentials.md).
115
+
1. If you haven't yet, copy and paste the **Microsoft account ID** and **External ID** values for use when [creating a new AWS role for Purview](#create-a-new-aws-role-for-purview), which is your next step.
116
+
117
+
For more information about Purview credentials, see [Credentials for source authentication in Azure Purview](manage-credentials.md).
116
118
117
119
### Create a new AWS role for Purview
118
120
121
+
This procedure requires that you enter the values for your Azure Account ID and External ID when creating your AWS role.
122
+
123
+
If you don't have these values, locate them first in your [Purview credential](#create-a-purview-credential-for-your-aws-bucket-scan).
124
+
125
+
**To locate your Microsoft Account ID and External ID**:
126
+
127
+
1. In Purview, navigate to the **Management Center** > **Security and access** > **Credentials**.
128
+
129
+
1. Select the credential that you [created for your AWS bucket scan](#create-a-purview-credential-for-your-aws-bucket-scan), and then in the toolbar, select **Edit**.
130
+
131
+
1. In the **Edit credential** pane that appears on the right, copy the **Microsoft account ID** and **External ID** values to a separate file, or have them handy for pasting into the relevant field in AWS.
132
+
133
+
For example:
134
+
135
+
[](./media/register-scan-amazon-s3/locate-account-id-external-id.png#lightbox)
136
+
137
+
138
+
**To create your AWS role for Purview**:
139
+
119
140
1. Open your **Amazon Web Services** console, and under **Security, Identity, and Compliance**, select **IAM**.
120
141
121
142
1. Select **Roles** and then **Create role**.
@@ -125,13 +146,9 @@ For more information about Purview credentials, see the [Azure Purview public pr
125
146
|Field |Description |
126
147
|---------|---------|
127
148
|**Account ID**| Enter your Microsoft Account ID. For example: `615019938638`|
128
-
|**External ID**| Under options, select **Require external ID...**, and then enter your External ID in the designated field. <br>For example: `e7e2b8a3-0a9f-414f-a065-afaf4ac6d994`<br><br>You can find this external ID when you . |
149
+
|**External ID**| Under options, select **Require external ID...**, and then enter your External ID in the designated field. <br>For example: `e7e2b8a3-0a9f-414f-a065-afaf4ac6d994`|
129
150
|||
130
151
131
-
> [!NOTE]
132
-
> You can find the values for both the **Microsoft Account ID** and **External ID** in the Purview **Management Center** > **Credentials** area, where you [created your Purview credentials](#create-a-purview-credential-for-your-aws-bucket-scan).
133
-
>
134
-
135
152
For example:
136
153
137
154

Copy file name to clipboardExpand all lines: articles/security-center/release-notes.md
+43-13Lines changed: 43 additions & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ author: memildin
5
5
manager: rkarlin
6
6
ms.service: security-center
7
7
ms.topic: reference
8
-
ms.date: 04/06/2021
8
+
ms.date: 04/11/2021
9
9
ms.author: memildin
10
10
11
11
---
@@ -24,26 +24,22 @@ To learn about *planned* changes that are coming soon to Security Center, see [I
24
24
## April 2021
25
25
26
26
Updates in April include:
27
-
-[Four new recommendations related to guest configuration (preview)](#four-new-recommendations-related-to-guest-configuration-preview)
27
+
-[Recently pulled container registry images are now rescanned weekly (General Availability)](#recently-pulled-container-registry-images-are-now-rescanned-weekly-general-availability)
28
28
-[Use Azure Defender for Kubernetes to protect hybrid and multi-cloud Kubernetes deployments (preview)](#use-azure-defender-for-kubernetes-to-protect-hybrid-and-multi-cloud-kubernetes-deployments-preview)
29
+
-[Four new recommendations related to guest configuration (preview)](#four-new-recommendations-related-to-guest-configuration-preview)
30
+
-[CMK recommendations moved to best practices security control](#cmk-recommendations-moved-to-best-practices-security-control)
-[Two recommendations from "Apply system updates" security control were deprecated](#two-recommendations-from-apply-system-updates-security-control-were-deprecated)
31
33
32
-
### Four new recommendations related to guest configuration (preview)
34
+
### Recently pulled container registry images are now rescanned weekly (General Availability)
33
35
34
-
Azure's [Guest Configuration extension](../governance/policy/concepts/guest-configuration.md) reports to Security Center to help ensure your virtual machines' in-guest settings are hardened. The extension isn't required for Arc enabled servers because it's included in the Arc Connected Machine agent. The extension requires a system-managed identity on the machine.
36
+
Azure Defender for container registries includes a built-in vulnerability scanner. This scanner immediately scans any image you push to your registry and any image pulled within the last 30 days.
35
37
36
-
We've added four new recommendations to Security Center to make the most of this extension.
37
-
38
-
- Two recommendations prompt you to install the extension and its required system-managed identity:
39
-
-**Guest Configuration extension should be installed on your machines**
40
-
-**Virtual machines' Guest Configuration extension should be deployed with system-assigned managed identity**
38
+
New vulnerabilities are discovered every day. With this update, container images that were pulled from your registries during the last 30 days will be **rescanned** every week. This ensures that newly discovered vulnerabilities are identified in your images.
41
39
42
-
- When the extension is installed and running, it'll begin auditing your machines and you'll be prompted to harden settings such as configuration of the operating system and environment settings. These two recommendations will prompt you to harden your Windows and Linux machines as described:
43
-
-**Windows Defender Exploit Guard should be enabled on your machines**
44
-
-**Authentication to Linux machines should require SSH keys**
40
+
Scanning is charged on a per image basis, so there's no additional charge for these rescans.
45
41
46
-
Learn more in [Understand Azure Policy's Guest Configuration](../governance/policy/concepts/guest-configuration.md).
42
+
Learn more about this scanner in [Use Azure Defender for container registries to scan your images for vulnerabilities](defender-for-container-registries-usage.md).
47
43
48
44
49
45
### Use Azure Defender for Kubernetes to protect hybrid and multi-cloud Kubernetes deployments (preview)
@@ -66,6 +62,40 @@ Learn more in [Use Azure Defender for Kubernetes with your on-premises and multi
66
62
67
63
:::image type="content" source="media/defender-for-kubernetes-azure-arc/extension-recommendation.png" alt-text="Azure Security Center's recommendation for deploying the Azure Defender extension for Azure Arc enabled Kubernetes clusters." lightbox="media/defender-for-kubernetes-azure-arc/extension-recommendation.png":::
68
64
65
+
### Four new recommendations related to guest configuration (preview)
66
+
67
+
Azure's [Guest Configuration extension](../governance/policy/concepts/guest-configuration.md) reports to Security Center to help ensure your virtual machines' in-guest settings are hardened. The extension isn't required for Arc enabled servers because it's included in the Arc Connected Machine agent. The extension requires a system-managed identity on the machine.
68
+
69
+
We've added four new recommendations to Security Center to make the most of this extension.
70
+
71
+
- Two recommendations prompt you to install the extension and its required system-managed identity:
72
+
-**Guest Configuration extension should be installed on your machines**
73
+
-**Virtual machines' Guest Configuration extension should be deployed with system-assigned managed identity**
74
+
75
+
- When the extension is installed and running, it'll begin auditing your machines and you'll be prompted to harden settings such as configuration of the operating system and environment settings. These two recommendations will prompt you to harden your Windows and Linux machines as described:
76
+
-**Windows Defender Exploit Guard should be enabled on your machines**
77
+
-**Authentication to Linux machines should require SSH keys**
78
+
79
+
Learn more in [Understand Azure Policy's Guest Configuration](../governance/policy/concepts/guest-configuration.md).
80
+
81
+
### CMK recommendations moved to best practices security control
82
+
83
+
Every organization's security program includes data encryption requirements. By default, Azure customers' data is encrypted at rest with service-managed keys. However, customer-managed keys (CMK) are commonly required to meet regulatory compliance standards. CMKs let you encrypt your data with an [Azure Key Vault](../key-vault/general/overview.md) key created and owned by you. This gives you full control and responsibility for the key lifecycle, including rotation and management.
84
+
85
+
Azure Security Center's security controls are logical groups of related security recommendations, and reflect your vulnerable attack surfaces. Each control has a maximum number of points you can add to your secure score if you remediate all of the recommendations listed in the control, for all of your resources. The **Implement security best practices** security control is worth zero points. So recommendations in this control don't affect your secure score.
86
+
87
+
The recommendations listed below are being moved to the **Implement security best practices** security control to better reflect their optional nature. This move ensures that these recommendations are in the most appropriate control to meet their objective.
88
+
89
+
- Azure Cosmos DB accounts should use customer-managed keys to encrypt data at rest
90
+
- Azure Machine Learning workspaces should be encrypted with a customer-managed key (CMK)
91
+
- Cognitive Services accounts should enable data encryption with a customer-managed key (CMK)
92
+
- Container registries should be encrypted with a customer-managed key (CMK)
93
+
- SQL managed instances should use customer-managed keys to encrypt data at rest
94
+
- SQL servers should use customer-managed keys to encrypt data at rest
95
+
- Storage accounts should use customer-managed key (CMK) for encryption
96
+
97
+
Learn which recommendations are in each security control in [Security controls and their recommendations](secure-score-security-controls.md#security-controls-and-their-recommendations).
0 commit comments