Skip to content

Commit 732122c

Browse files
committed
Merging changes synced from https://github.com/MicrosoftDocs/azure-docs-pr (branch live)
2 parents 588e9c2 + e9776e6 commit 732122c

21 files changed

+429
-94
lines changed

articles/aks/azure-disk-customer-managed-keys.md

Lines changed: 10 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: mlearned
66

77
ms.service: container-service
88
ms.topic: article
9-
ms.date: 01/09/2020
9+
ms.date: 01/12/2020
1010
ms.author: mlearned
1111
---
1212

@@ -57,7 +57,7 @@ az account list-locations
5757
az group create -l myAzureRegionName -n myResourceGroup
5858
5959
# Create an Azure Key Vault resource in a supported Azure region
60-
az keyvault create -n myKeyVaultName -g myResourceGroup-l myAzureRegionName --enable-purge-protection true --enable-soft-delete true
60+
az keyvault create -n myKeyVaultName -g myResourceGroup -l myAzureRegionName --enable-purge-protection true --enable-soft-delete true
6161
```
6262

6363
## Create an instance of a DiskEncryptionSet
@@ -72,7 +72,7 @@ keyVaultId=$(az keyvault show --name myKeyVaultName --query [id] -o tsv)
7272
keyVaultKeyUrl=$(az keyvault key show --vault-name myKeyVaultName --name myKeyName --query [key.kid] -o tsv)
7373
7474
# Create a DiskEncryptionSet
75-
az disk-encryption-set create -n myDiskEncryptionSetName -l myAzureRegionName -g myResourceGroup--source-vault $keyVaultId --key-url $keyVaultKeyUrl
75+
az disk-encryption-set create -n myDiskEncryptionSetName -l myAzureRegionName -g myResourceGroup --source-vault $keyVaultId --key-url $keyVaultKeyUrl
7676
```
7777

7878
## Grant the DiskEncryptionSet resource access to the key vault
@@ -81,46 +81,37 @@ Use the DiskEncryptionSet and resource groups you created on the prior steps, an
8181

8282
```azurecli-interactive
8383
# Retrieve the DiskEncryptionSet value and set a variable
84-
desIdentity=$(az disk-encryption-set show -n myDiskEncryptionSetName -g myResourceGroup--query [identity.principalId] -o tsv)
84+
desIdentity=$(az disk-encryption-set show -n myDiskEncryptionSetName -g myResourceGroup --query [identity.principalId] -o tsv)
8585
8686
# Update security policy settings
87-
az keyvault set-policy -n myKeyVaultName -g myResourceGroup--object-id $desIdentity --key-permissions wrapkey unwrapkey get
87+
az keyvault set-policy -n myKeyVaultName -g myResourceGroup --object-id $desIdentity --key-permissions wrapkey unwrapkey get
8888
8989
# Assign the reader role
9090
az role assignment create --assignee $desIdentity --role Reader --scope $keyVaultId
9191
```
9292

9393
## Create a new AKS cluster and encrypt the OS disk with a customer-manged key
9494

95-
Create a new resource group and AKS cluster, then use your key to encrypt the OS disk.
95+
Create a new resource group and AKS cluster, then use your key to encrypt the OS disk. Customer managed key is only supported in kubernetes versions greater than 1.17
9696

9797
```azurecli-interactive
9898
# Retrieve the DiskEncryptionSet value and set a variable
99-
diskEncryptionSetId=$(az resource show -n $diskEncryptionSetName -g ssecmktesting --resource-type "Microsoft.Compute/diskEncryptionSets" --query [id] -o tsv)
99+
diskEncryptionSetId=$(az resource show -n diskEncryptionSetName -g myResourceGroup --resource-type "Microsoft.Compute/diskEncryptionSets" --query [id] -o tsv)
100100
101101
# Create a resource group for the AKS cluster
102102
az group create -n myResourceGroup-l myAzureRegionName
103103
104104
# Create the AKS cluster
105-
az aks create -n myAKSCluster -g myResourceGroup --node-osdisk-diskencryptionsetid diskEncryptionId
105+
az aks create -n myAKSCluster -g myResourceGroup --node-osdisk-diskencryptionset-id $diskEncryptionSetId --kubernetes-version 1.17.0
106106
```
107107

108-
## Add a node pool to an existing AKS cluster and encrypt the OS disk with a customer-managed key
109-
110-
New nodepools do not use encrypted disks by default. You can add a new node pool to an existing cluster and encrypt the OS disk with your own key by using the following command.
111-
112-
```azurecli-interactive
113-
# Add a nodepool to an existing cluster with BYOK encryption
114-
nodepool add –-cluster-name myAKSCluster -n myNodePoolName -g myResourceGroup --node-osdisk-diskencryptionsetid diskEncryptionId
115-
```
108+
When new node pools are added to the cluster created above, the customer managed key provided during the create is used to encrypt the OS disk
116109

117110
## Encrypt your AKS cluster data disk with a customer-managed key
118111

119112
You can also encrypt the AKS data disks with your own keys. Replace myResourceGroup and myDiskEncryptionSetName with your real values, and apply the yaml.
120113

121-
### Deploy the sample image from ACR to AKS
122-
123-
Ensure you have the proper AKS credentials
114+
Ensure you have the proper AKS credentials. The Service principal will need to have contributor access to the resource group where the diskencryptionset is present. Otherwise, you will get an error suggesting that the service principal does not have permissions.
124115

125116
Create a file called **byok-azure-disk.yaml** that contains the following information. Replace myResourceGroup and myDiskEncrptionSetName with your values.
126117

articles/azure-monitor/app/proactive-failure-diagnostics.md

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -44,13 +44,11 @@ When an analysis is triggered, the service performs a cluster analysis on the fa
4444

4545
In the example above, the analysis has discovered that most failures are about a specific result code, request name, Server URL host, and role instance.
4646

47-
By contrast, the analysis has discovered that the client operating system property is distributed over multiple values, and so it is not listed.
48-
4947
When your service is instrumented with these calls, the analyzer looks for an exception and a dependency failure that are associated with requests in the cluster it has identified, together with an example of any trace logs associated with those requests.
5048

5149
The resulting analysis is sent to you as alert, unless you have configured it not to.
5250

53-
Like the [alerts you set manually](../../azure-monitor/app/alerts.md), you can inspect the state of the alert and configure it in the Alerts page of your Application Insights resource. But unlike other alerts, you don't need to set up or configure Smart Detection. If you want, you can disable it or change its target email addresses.
51+
Like the [alerts you set manually](../../azure-monitor/app/alerts.md), you can inspect the state of the fired alert, which can be resolved if the issue is fixed. Configure the alert rules in the Alerts page of your Application Insights resource. But unlike other alerts, you don't need to set up or configure Smart Detection. If you want, you can disable it or change its target email addresses.
5452

5553
### Alert logic details
5654

@@ -59,6 +57,7 @@ The alerts are triggered by our proprietary machine learning algorithm so we can
5957
* Analysis of the failure percentage of requests/dependencies in a rolling time window of 20 minutes.
6058
* A comparison of the failure percentage of the last 20 minutes to the rate in the last 40 minutes and the past seven days, and looking for significant deviations that exceed X-times that standard deviation.
6159
* Using an adaptive limit for the minimum failure percentage, which varies based on the app’s volume of requests/dependencies.
60+
* There is logic that can automatically resolve the fired alert monitor condition, if the issue is no longer detected for 8-24 hours.
6261

6362
## Configure alerts
6463

@@ -79,7 +78,7 @@ Click the alert to configure it.
7978

8079
[![](./media/proactive-failure-diagnostics/032.png "Rule configuration screen")](./media/proactive-failure-diagnostics/032.png#lightbox)
8180

82-
Notice that you can disable Smart Detection, but you can't delete it (or create another one).
81+
Notice that you can disable or delete a Failure Anomalies alert rule, but you can't create another one on the same Application Insights resource.
8382

8483
## Example of Failure Anomalies alert webhook payload
8584

articles/cognitive-services/bing-visual-search/concepts/sending-queries.md

Lines changed: 90 additions & 26 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: nitinme
99
ms.service: cognitive-services
1010
ms.subservice: bing-visual-search
1111
ms.topic: conceptual
12-
ms.date: 08/30/2019
12+
ms.date: 01/08/2019
1313
ms.author: aahi
1414
---
1515

@@ -117,6 +117,26 @@ Content-Disposition: form-data; name="knowledgeRequest"
117117
--boundary_1234-abcd--
118118
```
119119

120+
You can optionally set the `enableEntityData` attribute in the header to `true` for detailed information on the main entity in the image you upload, including links to the web and attribution information. This field is `false` by default.
121+
122+
```
123+
--boundary_1234-abcd
124+
Content-Disposition: form-data; name="knowledgeRequest"
125+
126+
{
127+
"imageInfo" : {
128+
"url" : "https://contoso.com/2018/05/fashion/red.jpg"
129+
},
130+
"knowledgeRequest" : {
131+
"invokedSkillsRequestData" : {
132+
"enableEntityData" : "true"
133+
}
134+
}
135+
}
136+
137+
--boundary_1234-abcd--
138+
```
139+
120140
If you upload a local image, the following snippet shows the form data you must include in the body of the POST. The form data must include the `Content-Disposition` header. Its `name` parameter must be set to "image" and the `filename` parameter may be set to any string. The `Content-Type` header may be set to any commonly used image mime type. The contents of the form is the binary data of the image. The maximum image size you may upload is 1 MB. The largest of the width or height should be 1,500 pixels or less.
121141

122142
```
@@ -364,37 +384,81 @@ Text recognition can also recognize the contact information on business cards, s
364384
}
365385
```
366386

367-
If the image contains a recognized entity such as a culturally well-known/popular person, place, or thing, one of the tags may include an Entity insight.
387+
If the image contains a recognized entity such as a culturally well-known/popular person, place, or thing, one of the tags may include an Entity insight. The `mainEntity` and `data` fields are only available if the `enableEntityData` attribute in the `Content-Type` header is set to `true`.
368388

369389
```json
390+
{
391+
"image" : {
392+
"thumbnailUrl" : "https:\/\/tse4.mm.bing.net\/th?q=Statue+of+Liberty..."
393+
},
394+
"displayName" : "Statue of Liberty",
395+
"boundingBox" : {
396+
"queryRectangle" : {
397+
"topLeft" : {"x" : 0.40625, "y" : 0.1757813},
398+
"topRight" : {"x" : 0.6171875, "y" : 0.1757813},
399+
"bottomRight" : {"x" : 0.6171875, "y" : 0.3867188},
400+
"bottomLeft" : {"x" : 0.40625, "y" : 0.3867188}
401+
},
402+
"displayRectangle" : {
403+
"topLeft" : {"x" : 0.40625, "y" : 0.1757813},
404+
"topRight" : {"x" : 0.6171875, "y" : 0.1757813},
405+
"bottomRight" : {"x" : 0.6171875, "y" : 0.3867188},
406+
"bottomLeft" : {"x" : 0.40625, "y" : 0.3867188}
407+
}
408+
},
409+
"actions" : [
370410
{
371-
"image" : {
372-
"thumbnailUrl" : "https:\/\/tse4.mm.bing.net\/th?q=Statue+of+Liberty..."
373-
},
411+
"_type" : "ImageEntityAction",
412+
"webSearchUrl" : "https:\/\/www.bing.com\/search?q=Statue+of+Liberty",
374413
"displayName" : "Statue of Liberty",
375-
"boundingBox" : {
376-
"queryRectangle" : {
377-
"topLeft" : {"x" : 0.40625, "y" : 0.1757813},
378-
"topRight" : {"x" : 0.6171875, "y" : 0.1757813},
379-
"bottomRight" : {"x" : 0.6171875, "y" : 0.3867188},
380-
"bottomLeft" : {"x" : 0.40625, "y" : 0.3867188}
381-
},
382-
"displayRectangle" : {
383-
"topLeft" : {"x" : 0.40625, "y" : 0.1757813},
384-
"topRight" : {"x" : 0.6171875, "y" : 0.1757813},
385-
"bottomRight" : {"x" : 0.6171875, "y" : 0.3867188},
386-
"bottomLeft" : {"x" : 0.40625, "y" : 0.3867188}
387-
}
414+
"actionType" : "Entity",
415+
"mainEntity" : {
416+
"name" = "Statue of liberty",
417+
"bingId" : "..."
388418
},
389-
"actions" : [
390-
{
391-
"_type" : "ImageEntityAction",
392-
"webSearchUrl" : "https:\/\/www.bing.com\/search?q=Statue+of+Liberty",
393-
"displayName" : "Statue of Liberty",
394-
"actionType" : "Entity",
419+
"data" : {
420+
"id" : "https://api.cognitive.microsoft.com/api/v7/entities/...",
421+
"readLink": "https://www.bingapis.com/api/v7/search?q=...",
422+
"readLinkPingSuffix": "...",
423+
"contractualRules": [
424+
{
425+
"_type": "ContractualRules/LicenseAttribution",
426+
"targetPropertyName": "description",
427+
"mustBeCloseToContent": true,
428+
"license": {
429+
"name": "CC-BY-SA",
430+
"url": "http://creativecommons.org/licenses/by-sa/3.0/",
431+
"urlPingSuffix": "..."
432+
},
433+
"licenseNotice": "Text under CC-BY-SA license"
434+
},
435+
{
436+
"_type": "ContractualRules/LinkAttribution",
437+
"targetPropertyName": "description",
438+
"mustBeCloseToContent": true,
439+
"text": "Wikipedia",
440+
"url": "http://en.wikipedia.org/wiki/...",
441+
"urlPingSuffix": "..."
442+
}
443+
],
444+
"webSearchUrl": "https://www.bing.com/entityexplore?q=...",
445+
"webSearchUrlPingSuffix": "...",
446+
"name": "Statue of Liberty",
447+
"image": {
448+
"thumbnailUrl": "https://tse1.mm.bing.net/th?id=...",
449+
"hostPageUrl": "http://upload.wikimedia.org/wikipedia/...",
450+
"hostPageUrlPingSuffix": "...",
451+
"width": 50,
452+
"height": 50,
453+
"sourceWidth": 474,
454+
"sourceHeight": 598
455+
},
456+
"description" : "...",
457+
"bingId": "..."
395458
}
396-
]
397-
}
459+
}
460+
]
461+
}
398462
```
399463

400464
## See also

articles/cosmos-db/cosmos-db-security-controls.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -43,11 +43,11 @@ This article documents the security controls built into Azure Cosmos DB.
4343

4444
| Security control | Yes/no | Notes |
4545
|---|---|--|
46-
| Server-side encryption at rest: Microsoft-managed keys | Yes | All Azure Cosmos databases and backups are encrypted by default; see [Data encryption in Azure Cosmos DB](database-encryption-at-rest.md). Server-side encryption with customer-managed keys is not supported. |
47-
| Server-side encryption at rest: customer-managed keys (BYOK) | No | |
46+
| Server-side encryption at rest: Microsoft-managed keys | Yes | All Azure Cosmos databases and backups are encrypted by default; see [Data encryption in Azure Cosmos DB](database-encryption-at-rest.md). |
47+
| Server-side encryption at rest: customer-managed keys (BYOK) | Yes | See [Configure customer-managed keys for your Azure Cosmos DB account](how-to-setup-cmk.md) |
4848
| Column level encryption (Azure Data Services)| Yes | Only in the Tables API Premium. Not all APIs support this feature. See [Introduction to Azure Cosmos DB: Table API](table-introduction.md). |
4949
| Encryption in transit (such as ExpressRoute encryption, in VNet encryption, and VNet-VNet encryption )| Yes | All Azure Cosmos DB data is encrypted at transit. |
50-
| API calls encrypted| Yes | All connections to Azure Cosmos DB support HTTPS. Azure Cosmos DB also supports TLS 1.2 connections, but this is not yet enforced. If customers turn off lower level TLS on their end, they can ensure to connect to Cosmos DB. |
50+
| API calls encrypted| Yes | All connections to Azure Cosmos DB support HTTPS. Azure Cosmos DB also supports TLS 1.2.<br>It is possible to enforce a minimum TLS version server-side. To do so, please contact [[email protected]](maito:[email protected]]). |
5151

5252
## Configuration management
5353

Lines changed: 23 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,23 @@
1+
---
2+
title: Azure IoT Hub data encryption at rest via customer-managed keys| Microsoft Docs
3+
description: Encryption of data at rest with customer-managed keys for IoT Hub
4+
author: ash2017
5+
manager: briz
6+
ms.service: iot-hub
7+
services: iot-hub
8+
ms.topic: conceptual
9+
ms.date: 01/08/2020
10+
ms.author: asrastog
11+
---
12+
13+
# Encryption of data at rest with customer-managed keys for IoT Hub
14+
15+
IoT Hub supports encryption of data at rest with customer-managed keys (CMK), also known as Bring your own key (BYOK), support for Azure IoT Hub. Azure IoT Hub provides encryption of data at rest and in transit. By default, IoT Hub uses Microsoft-managed keys to encrypt the data. With CMK support, customers now have the choice of encrypting the data at rest with a key encryption key, managed by the customers, using the [Azure Key Vault](https://azure.microsoft.com/services/key-vault/).
16+
17+
This capability requires the creation of a new IoT Hub (basic or standard tier), in one of the following regions: East US, West US 2, or South Central US. To try this capability, contact us through [Microsoft support](https://azure.microsoft.com/support/create-ticket/). Share your company name and subscription ID when contacting Microsoft support.
18+
19+
## Next steps
20+
21+
* [Learn more about IoT Hub](https://docs.microsoft.com/azure/iot-hub/about-iot-hub)
22+
23+
* [Learn more about Azure Key Vault](https://docs.microsoft.com/azure/key-vault/key-vault-overview)

articles/security-center/TOC.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -66,7 +66,7 @@
6666
href: security-center-alerts-data-services.md
6767
- name: Threat detection for Azure service layers
6868
href: security-center-alerts-service-layer.md
69-
- name: Threat detection for Azure WAF and Azure DDoS Protection
69+
- name: Threat detection alerts from Azure WAF & Azure DDoS Protection
7070
href: security-center-alerts-integration.md
7171
- name: Cloud Smart Alert correlation (incidents)
7272
href: security-center-alerts-cloud-smart.md

articles/security-center/security-center-alerts-integration.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,19 +1,19 @@
11
---
2-
title: Threat detection for Azure security products in Azure Security Center
3-
description: This topic presents the Azure security products for which Azure Security Center can provide threat detection
2+
title: Threat detection alerts from Azure security products in Azure Security Center
3+
description: This topic presents the Azure security products from which Azure Security Center can display threat alerts
44
services: security-center
55
documentationcenter: na
66
author: memildin
77
manager: rkarlin
88
ms.assetid: ad4b0373-08ee-46ca-a573-638ed93a647c
99
ms.service: security-center
1010
ms.topic: conceptual
11-
ms.date: 01/05/2020
11+
ms.date: 01/12/2020
1212
ms.author: memildin
1313
---
14-
# Threat detection for Azure WAF and Azure DDoS Protection
14+
# Threat detection alerts from Azure WAF and Azure DDoS Protection
1515

16-
Azure Security Center can provide threat detection for the following Azure security products, (a separate license for each product is required):
16+
Azure Security Center can display and collect threat detection alerts generated by the following Azure security products, (a separate license for each product is required):
1717

1818
* [Azure WAF](#azure-waf)
1919
* [Azure DDoS Protection](#azure-ddos)

articles/security-center/security-center-app-services.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ To enable advanced threat protection for your Azure App Service plan, you must:
2525

2626
With the App Service plan enabled, Security Center assesses the resources covered by your App Service plan and generates security recommendations based on its findings. Security Center protects the VM instance in which your App Service is running and the management interface. It also monitors requests and responses sent to and from your apps running in App Service.
2727

28-
Security Center leverages the scale of the cloud, and the visibility that Azure has as a cloud provider, to monitor for common web app attacks. Security Center can discover attacks on your applications and identify emerging attacks - even while attackers are in the reconnaissance phase, scanning to identify vulnerabilities across multiple Azure-hosted applications. As an Azure-native service, Security Center is also in a unique position to offer host-based security analytics covering the underlying compute nodes for this PaaS, enabling Security Center to detect attacks against web applications that were already exploited.
28+
Security Center leverages the scale of the cloud, and the visibility that Azure has as a cloud provider, to monitor for common web app attacks. Security Center can discover attacks on your applications and identify emerging attacks - even while attackers are in the reconnaissance phase, scanning to identify vulnerabilities across multiple Azure-hosted applications. As an Azure-native service, Security Center is also in a unique position to offer host-based security analytics covering the underlying compute nodes for this PaaS, enabling Security Center to detect attacks against web applications that were already exploited. For details of Security Center’s threat detection alerts from Azure App Service, see [Threat detection for cloud native computing](security-center-alerts-compute.md#azure-app-service-).
2929

3030

3131
## Enabling monitoring and protection of App Service

articles/service-health/resource-health-alert-arm-template-guide.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -12,8 +12,6 @@ This article will show you how to create Resource Health Activity Log Alerts pro
1212

1313
Azure Resource Health keeps you informed about the current and historical health status of your Azure resources. Azure Resource Health alerts can notify you in near real-time when these resources have a change in their health status. Creating Resource Health alerts programmatically allow for users to create and customize alerts in bulk.
1414

15-
> [!NOTE]
16-
> Resource Health alerts are currently in preview.
1715

1816
[!INCLUDE [updated-for-az](../../includes/updated-for-az.md)]
1917

0 commit comments

Comments
 (0)