Skip to content

Commit 7cfb92f

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into nat-avail-diagrams
2 parents 5da0a1f + 0e6ec4a commit 7cfb92f

13 files changed

+189
-88
lines changed

articles/active-directory/enterprise-users/licensing-service-plan-reference.md

Lines changed: 11 additions & 11 deletions
Large diffs are not rendered by default.

articles/active-directory/identity-protection/concept-workload-identity-risk.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -55,6 +55,7 @@ We detect risk on workload identities across sign-in behavior and offline indica
5555
| Leaked Credentials | Offline | This risk detection indicates that the account's valid credentials have been leaked. This leak can occur when someone checks in the credentials in public code artifact on GitHub, or when the credentials are leaked through a data breach. <br><br> When the Microsoft leaked credentials service acquires credentials from GitHub, the dark web, paste sites, or other sources, they're checked against current valid credentials in Azure AD to find valid matches. |
5656
| Malicious application | Offline | This detection indicates that Microsoft has disabled an application for violating our terms of service. We recommend [conducting an investigation](https://go.microsoft.com/fwlink/?linkid=2208429) of the application.|
5757
| Suspicious application | Offline | This detection indicates that Microsoft has identified an application that may be violating our terms of service, but has not disabled it. We recommend [conducting an investigation](https://go.microsoft.com/fwlink/?linkid=2208429) of the application.|
58+
| Anomalous service principal activity | Offline | This risk detection indicates that suspicious patterns of activity have been identified for an authenticated service principal. The post-authentication behavior of service principals is assessed for anomalies. This behavior is based on actions occurring for the account, along with any sign-in risk detected. |
5859

5960
## Identify risky workload identities
6061

articles/firewall/tutorial-firewall-deploy-portal-policy.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,9 +5,9 @@ services: firewall
55
author: vhorne
66
ms.service: firewall
77
ms.topic: tutorial
8-
ms.date: 10/18/2022
8+
ms.date: 10/28/2022
99
ms.author: victorh
10-
ms.custom: mvc
10+
ms.custom: template-tutorial, mvc, engagement-fy23
1111
#Customer intent: As an administrator new to this service, I want to control outbound network access from resources located in an Azure subnet.
1212
---
1313

articles/frontdoor/front-door-security-headers.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,8 +7,9 @@ ms.service: frontdoor
77
ms.topic: tutorial
88
ms.tgt_pltfrm: na
99
ms.workload: infrastructure-services
10-
ms.date: 10/12/2022
10+
ms.date: 10/28/2022
1111
ms.author: duau
12+
ms.custom: template-tutorial, engagement-fy23
1213
# Customer intent: As an IT admin, I want to learn about Front Door and how to configure a security header via Rules Engine.
1314
---
1415

articles/frontdoor/quickstart-create-front-door.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,12 +6,12 @@ documentationcenter: na
66
author: duongau
77
ms.author: duau
88
manager: KumudD
9-
ms.date: 10/12/2022
9+
ms.date: 10/28/2022
1010
ms.topic: quickstart
1111
ms.service: frontdoor
1212
ms.workload: infrastructure-services
1313
ms.tgt_pltfrm: na
14-
ms.custom: mode-ui
14+
ms.custom: template-tutorial, mode-ui, engagement-fy23
1515
#Customer intent: As an IT admin, I want to direct user traffic to ensure high availability of web applications.
1616
---
1717

articles/load-balancer/tutorial-load-balancer-port-forwarding-portal.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,8 +6,8 @@ author: mbender-ms
66
ms.author: mbender
77
ms.service: load-balancer
88
ms.topic: tutorial
9-
ms.date: 10/18/2022
10-
ms.custom: template-tutorial
9+
ms.date: 10/28/2022
10+
ms.custom: template-tutorial, engagement-fy23
1111
---
1212

1313
# Tutorial: Create a single virtual machine inbound NAT rule using the Azure portal

articles/network-watcher/connection-monitor.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,9 +7,9 @@ tags: azure-resource-manager
77
ms.service: network-watcher
88
ms.topic: tutorial
99
ms.workload: infrastructure-services
10-
ms.date: 10/17/2022
10+
ms.date: 10/28/2022
1111
ms.author: damendo
12-
ms.custom: mvc
12+
ms.custom: template-tutorial, mvc, engagement-fy23
1313
# Customer intent: I need to monitor communication between a VM and another VM. If the communication fails, I need to know why, so that I can resolve the problem.
1414
---
1515

articles/network-watcher/network-watcher-nsg-flow-logging-portal.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,9 +5,9 @@ services: network-watcher
55
author: damendo
66
ms.service: network-watcher
77
ms.topic: tutorial
8-
ms.date: 10/17/2022
8+
ms.date: 10/28/2022
99
ms.author: damendo
10-
ms.custom: mvc
10+
ms.custom: template-tutorial, mvc, engagement-fy23
1111
# Customer intent: I need to log the network traffic to and from a VM so I can analyze it for anomalies.
1212
---
1313

articles/storage/blobs/anonymous-read-access-configure.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,11 +7,11 @@ author: jimmart-dev
77

88
ms.service: storage
99
ms.topic: how-to
10-
ms.date: 03/01/2022
10+
ms.date: 10/28/2022
1111
ms.author: jammart
1212
ms.reviewer: fryu
1313
ms.subservice: blobs
14-
ms.custom: devx-track-azurepowershell, devx-track-azurecli
14+
ms.custom: devx-track-azurepowershell, devx-track-azurecli, engagement-fy23
1515
ms.devlang: azurecli
1616
---
1717

articles/storage/blobs/anonymous-read-access-prevent.md

Lines changed: 6 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -7,22 +7,25 @@ author: jimmart-dev
77

88
ms.service: storage
99
ms.topic: how-to
10-
ms.date: 12/09/2020
10+
ms.date: 10/28/2022
1111
ms.author: jammart
1212
ms.reviewer: fryu
1313
ms.subservice: blobs
14-
ms.custom: devx-track-azurepowershell
14+
ms.custom: devx-track-azurepowershell, engagement-fy23
1515
---
1616

1717
# Prevent anonymous public read access to containers and blobs
1818

19+
This article describes how to use a DRAG (Detection-Remediation-Audit-Governance) framework to continuously manage public access for your storage accounts.
20+
1921
Anonymous public read access to containers and blobs in Azure Storage is a convenient way to share data, but may also present a security risk. It's important to manage anonymous access judiciously and to understand how to evaluate anonymous access to your data. Operational complexity, human error, or malicious attack against data that is publicly accessible can result in costly data breaches. Microsoft recommends that you enable anonymous access only when necessary for your application scenario.
2022

2123
By default, public access to your blob data is always prohibited. However, the default configuration for a storage account permits a user with appropriate permissions to configure public access to containers and blobs in a storage account. For enhanced security, you can disallow all public access to storage account, regardless of the public access setting for an individual container. Disallowing public access to the storage account prevents a user from enabling public access for a container in the account. Microsoft recommends that you disallow public access to a storage account unless your scenario requires it. Disallowing public access helps to prevent data breaches caused by undesired anonymous access.
2224

2325
When you disallow public blob access for the storage account, Azure Storage rejects all anonymous requests to that account. After public access is disallowed for an account, containers in that account cannot be subsequently configured for public access. Any containers that have already been configured for public access will no longer accept anonymous requests. For more information, see [Configure anonymous public read access for containers and blobs](anonymous-read-access-configure.md).
2426

25-
This article describes how to use a DRAG (Detection-Remediation-Audit-Governance) framework to continuously manage public access for your storage accounts.
27+
> [!WARNING]
28+
> When a container is configured for public access, any client can read data in that container. Public access presents a potential security risk, so if your scenario does not require it, Microsoft recommends that you disallow it for the storage account.
2629
2730
## Detect anonymous requests from client applications
2831

0 commit comments

Comments
 (0)