Skip to content

Commit 8737e03

Browse files
authored
Merge pull request #289795 from MicrosoftDocs/main
11/4/2024 AM Publish
2 parents 14dbbbf + c36abca commit 8737e03

File tree

46 files changed

+360
-381
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

46 files changed

+360
-381
lines changed

articles/active-directory-b2c/whats-new-docs.md

Lines changed: 11 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: "What's new in Azure Active Directory business-to-customer (B2C)"
33
description: "New and updated documentation for the Azure Active Directory business-to-customer (B2C)."
4-
ms.date: 10/01/2024
4+
ms.date: 11/04/2024
55
ms.service: azure-active-directory
66
ms.subservice: b2c
77
ms.topic: whats-new
@@ -19,6 +19,16 @@ manager: CelesteDG
1919

2020
Welcome to what's new in Azure Active Directory B2C documentation. This article lists new docs that have been added and those that have had significant updates in the last three months. To learn what's new with the B2C service, see [What's new in Microsoft Entra ID](../active-directory/fundamentals/whats-new.md), [Azure AD B2C developer release notes](custom-policy-developer-notes.md) and [What's new in Microsoft Entra External ID](/entra/external-id/whats-new-docs).
2121

22+
## October 2024
23+
24+
### Updated articles
25+
26+
- [Secure APIs used for API connectors in Azure AD B2C](secure-rest-api.md) - ROPC flow updates
27+
- [Application types that can be used in Active Directory B2C](application-types.md) - Implicit grant flow updates
28+
- [Configure authentication in a sample single-page application by using Azure AD B2C](configure-authentication-sample-spa-app.md) - Implicit grant flow updates
29+
- [Single-page application sign-in using the OAuth 2.0 implicit flow in Azure Active Directory B2C](implicit-flow-single-page-application.md) - Implicit grant flow updates
30+
- [Register a single-page application in Azure Active Directory B2C](tutorial-register-spa.md) - Implicit grant flow updates
31+
2232
## September 2024
2333

2434
### Updated articles
@@ -33,9 +43,3 @@ This month, we changed Twitter to X in numerous articles and code samples.
3343

3444
- [Tutorial: Configure Keyless with Azure Active Directory B2C](partner-keyless.md) - Editorial updates
3545

36-
## July 2024
37-
38-
### Updated articles
39-
40-
- [Developer notes for Azure Active Directory B2C](custom-policy-developer-notes.md) - Updated Twitter to X
41-
- [Custom email verification with SendGrid](custom-email-sendgrid.md) - Updated the localization script

articles/api-management/limit-concurrency-policy.md

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -16,6 +16,8 @@ ms.author: danlep
1616

1717
The `limit-concurrency` policy prevents enclosed policies from executing by more than the specified number of requests at any time. When that number is exceeded, new requests will fail immediately with the `429` Too Many Requests status code.
1818

19+
[!INCLUDE [api-management-rate-limit-accuracy](../../includes/api-management-rate-limit-accuracy.md)]
20+
1921
[!INCLUDE [api-management-policy-generic-alert](../../includes/api-management-policy-generic-alert.md)]
2022

2123
## Policy statement
@@ -40,6 +42,10 @@ The `limit-concurrency` policy prevents enclosed policies from executing by more
4042
- [**Policy scopes:**](./api-management-howto-policies.md#scopes) global, workspace, product, API, operation
4143
- [**Gateways:**](api-management-gateways-overview.md) classic, v2, consumption, self-hosted, workspace
4244

45+
### Usage notes
46+
47+
* The maximum number of requests enforced by API Management is lower when multiple capacity units are deployed in a region.
48+
4349
## Example
4450

4551
The following example demonstrates how to limit number of requests forwarded to a backend based on the value of a context variable.

articles/app-service/configure-vnet-integration-routing.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ Your app is already integrated using the regional virtual network integration fe
1717

1818
## Configure application routing
1919

20-
Application routing defines what traffic is routed from your app and into the virtual network. We recommend that you use the `vnetRouteAllEnabled` site setting to enable routing of all traffic. Using the configuration setting allows you to audit the behavior with [a built-in policy](https://portal.azure.com/#blade/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2Fproviders%2FMicrosoft.Authorization%2FpolicyDefinitions%2F33228571-70a4-4fa1-8ca1-26d0aba8d6ef). The existing `WEBSITE_VNET_ROUTE_ALL` app setting can still be used, and you can enable all traffic routing with either setting.
20+
Application routing defines what traffic is routed from your app and into the virtual network. We recommend that you use the `vnetRouteAllEnabled` site setting to enable routing of all traffic. Using the configuration setting allows you to audit the behavior with [a built-in policy](https://portal.azure.com/#view/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2Fproviders%2FMicrosoft.Authorization%2FpolicyDefinitions%2Ff5c0bfb3-acea-47b1-b477-b0edcdf6edc1). The existing `WEBSITE_VNET_ROUTE_ALL` app setting can still be used, and you can enable all traffic routing with either setting.
2121

2222
### Configure in the Azure portal
2323

@@ -75,4 +75,4 @@ az resource update --resource-group <group-name> --name <app-name> --resource-ty
7575
## Next steps
7676

7777
- [Enable virtual network integration](./configure-vnet-integration-enable.md)
78-
- [General networking overview](./networking-features.md)
78+
- [General networking overview](./networking-features.md)

articles/backup/azure-kubernetes-service-cluster-backup-concept.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -100,7 +100,7 @@ Also, as part of the backup and restore operations, the following roles are assi
100100
| Reader | Backup vault | Snapshot resource group | Allows the Backup vault to perform _List_ and _Read_ operations on snapshot resource group. |
101101
| Contributor | AKS cluster | Snapshot resource group | Allows AKS cluster to store persistent volume snapshots in the resource group. |
102102
| Storage Blob Data Contributor | Extension Identity | Storage account | Allows Backup Extension to store cluster resource backups in the blob container. |
103-
| Data Operator for Managed Disk | Backup vault | Snapshot Resource Group | Allows Backup Vault service to move incremental snapshot data to the Vault. |
103+
| Data Operator for Managed Disks | Backup vault | Snapshot Resource Group | Allows Backup Vault service to move incremental snapshot data to the Vault. |
104104
| Disk Snapshot Contributor | Backup vault | Snapshot Resource Group | Allows Backup Vault to access Disks snapshots and perform Vaulting operation. |
105105
| Storage Blob Data Reader | Backup vault | Storage Account | Allow Backup Vault to access Blob Container with backup data stored to move to Vault. |
106106
| Contributor | Backup vault | Staging Resource Group | Allows Backup Vault to hydrate backups as Disks stored in Vault Tier. |

articles/governance/policy/how-to/migrate-from-automanage-best-practices.md

Lines changed: 21 additions & 67 deletions
Original file line numberDiff line numberDiff line change
@@ -31,33 +31,19 @@ Automanage designers created an experience for Azure customers to onboard new an
3131
This functionality is available in Azure Policy as an initiative with various configurable parameters, Azure services, regional availability, compliance states, and remediation actions. Configuration profiles are the main onboarding vehicle for Automanage customers. Just like Azure Policy initiatives, Automanage configuration profiles apply to VMs at the subscription and resource group level. They enable further specification of the zone of
3232
applicability. The following Automanage feature parities are available in Azure Policy.
3333

34-
### Azure Monitor agent
35-
36-
The Azure Monitor agent collects monitoring data from the guest operating system of Azure and hybrid VMs. The agent delivers the data to Azure Monitor for use by features, insights, and other services, such as Microsoft Sentinel and Microsoft Defender for Cloud. The Azure Monitor agent replaces all of the Azure Monitor legacy monitoring agents.
34+
### Azure Monitor Insights and analytics
3735

38-
Deploy this extension by using the following policies:
36+
[Azure Monitor][13] is a suite of tools designed to enhance the performance, reliability, and quality of your applications. It offers features like application performance management, monitoring alerts, metrics analysis, diagnostic settings, and logs. With Azure Monitor Insights, you can gain valuable insights into your application's behavior, troubleshoot issues, and optimize performance.
3937

40-
- Configure Linux VMs to run the Azure Monitor agent with user-assigned managed-identity-based authentication.
41-
- Configure Windows machines to associate with a data collection rule or a data collection endpoint.
42-
- Configure Windows VMs to run the Azure Monitor agent with user-assigned managed-identity-based authentication.
43-
- Configure Linux machines to associate with a data collection rule or a data collection endpoint.
44-
- Deploy a dependency agent for Linux VMs with Azure Monitor agent settings.
45-
- Deploy a dependency agent that you can enable on Windows VMs with Azure Monitor agent settings.
38+
The Azure Monitor agent collects monitoring data from the guest operating system of Azure and hybrid VMs. The agent delivers the data to Azure Monitor for use by features, insights, and other services, such as Microsoft Sentinel and Microsoft Defender for Cloud. The Azure Monitor agent replaces all of the Azure Monitor legacy monitoring agents like the deprecated Microsoft Monitor Agent. The new Azure Monitor Agent is unsupported in Automanage but can be configured at-scale using Azure Policy. Visit [Azure Monitor Agent Built-In Policy][12] to learn more.
4639

4740
### Azure Backup
4841

49-
Azure Backup provides independent and isolated backups to guard against unintended destruction of the data on your VMs. Backups are stored in a Recovery Services vault with built-in management of recovery points. To back up Azure VMs, Backup installs an extension on the VM agent running on the machine.
50-
51-
Configure Backup by using the following policies:
52-
53-
- Configure backup on VMs with a specific tag to an existing Recovery Services vault in the same location.
54-
- Enable Backup for VMs.
55-
56-
To configure Backup time and duration, create a custom Azure policy based on the properties of the Backup policy resource or by a REST API call. For more information, see [Create Recovery Services backup policies by using the REST API][02].
42+
[Azure Backup][14] provides independent and isolated backups to guard against unintended destruction of the data on your VMs. Backups are stored in a Recovery Services vault with built-in management of recovery points. To back up Azure VMs, Backup installs an extension on the VM agent running on the machine. Visit [Azure Backup Built-In Policy][11] to learn how to configure Backup at scale through Azure Policy. To configure Backup time and duration, create a custom Azure policy based on the properties of the Backup policy resource or by a REST API call. For more information, see [Create Recovery Services backup policies by using the REST API][02].
5743

5844
### Microsoft Antimalware for Azure
5945

60-
Microsoft Antimalware for Azure Cloud Services and Virtual Machines offers free real-time protection that helps identify and remove viruses, spyware, and other malicious software. It generates alerts when known malicious or unwanted software tries to install itself or run on your Azure systems. The Azure Guest agent (or the Microsoft Fabric agent) opens the Microsoft Antimalware for Azure extension and applies the antimalware configuration settings that were supplied as input. This step enables the antimalware service with either default or custom configuration settings.
46+
[Microsoft Antimalware][10] for Azure Cloud Services and Virtual Machines offers free real-time protection that helps identify and remove viruses, spyware, and other malicious software. It generates alerts when known malicious or unwanted software tries to install itself or run on your Azure systems. The Azure Guest agent (or the Microsoft Fabric agent) opens the Microsoft Antimalware for Azure extension and applies the antimalware configuration settings that were supplied as input. This step enables the antimalware service with either default or custom configuration settings.
6147

6248
Deploy the following Microsoft Antimalware for Azure policies in Azure Policy:
6349

@@ -73,26 +59,9 @@ You can create a custom Azure policy based on the properties of the Azure `IaaSA
7359

7460
For more information, see [this webpage][03].
7561

76-
### Azure Monitor Insights and analytics
77-
78-
Azure Monitor Insights is a suite of tools within Azure Monitor designed to enhance the performance, reliability, and quality of your applications. It offers features like application performance management, monitoring alerts, metrics analysis, diagnostic settings, and logs. With Azure Monitor Insights, you can gain valuable insights into your application's behavior, troubleshoot issues, and optimize performance.
79-
80-
The following policies provide the same capabilities as Automanage:
81-
82-
- Assign a built-in user-assigned managed identity to VMs.
83-
- Configure Linux VMs to run the Azure Monitor agent with user-assigned authentication based on managed identity.
84-
- Configure Windows VMs to run the Azure Monitor agent with user-assigned authentication based on managed identity.
85-
- Deploy a dependency agent that you can enable on Windows VMs with Azure Monitor agent settings.
86-
- Deploy a dependency agent for Linux VMs with Azure Monitor agent settings.
87-
- Configure Linux machines to associate with a data collection rule or a data collection endpoint.
88-
- Configure Windows machines to associate with a data collection rule or a data collection endpoint.
89-
90-
To configure all the previous options, deploy the **Enable Azure Monitor for VMs with Azure
91-
Monitoring Agent (AMA)** policy initiative.
92-
9362
### Change Tracking and Inventory
9463

95-
Change Tracking and Inventory is a feature within Automation that monitors changes in VMs across Azure, on-premises, and in other cloud environments. It tracks modifications to installed software, files, registry keys, and services on both Windows and Linux systems. Change Tracking and Inventory uses the Log Analytics agent to collect data and then forwards it to Azure Monitor Logs for analysis. It also integrates with Microsoft Defender for Cloud File Integrity Monitoring to enhance security and operational insights.
64+
[Change Tracking and Inventory][15] is a feature within Automation that monitors changes in VMs across Azure, on-premises, and in other cloud environments. It tracks modifications to installed software, files, registry keys, and services on both Windows and Linux systems. Change Tracking and Inventory uses the Log Analytics agent to collect data and then forwards it to Azure Monitor Logs for analysis. It also integrates with Microsoft Defender for Cloud File Integrity Monitoring to enhance security and operational insights.
9665

9766
Enable change tracking on VMs by using the following policies:
9867

@@ -111,42 +80,15 @@ Configure the preceding Azure policies in bulk by using the following Azure Poli
11180

11281
### Microsoft Defender for Cloud
11382

114-
Microsoft Defender for Cloud provides unified security management and advanced threat protection across hybrid cloud workloads.
115-
116-
Configure Defender for Cloud in Azure Policy through the following policy initiatives:
117-
118-
- Configure multiple Microsoft Defender for Endpoint integration settings with Defender for Cloud.
119-
- Download the Microsoft cloud security benchmark.
120-
- Configure Defender for Cloud plans.
83+
[Microsoft Defender for Cloud][16] (MDC) provides unified security management and advanced threat protection across hybrid cloud workloads. Visit [Configure Defender for Cloud in Azure Policy][17] to learn more about at-scale compliance and monitoring for MDC.
12184

12285
### Azure Update Manager
12386

124-
Azure Update Manager is a service included as part of your Azure subscription. Use it to assess your update status across your environment and manage your Windows and Linux server patching from a single pane of glass, both for on-premises and Azure. It provides a unified solution to help you keep your systems up to date. Update Manager oversees update compliance, deploys critical updates, and offers flexible patching options.
125-
126-
Configure Update Manager in Azure Policy through the following policies:
127-
128-
- Configure periodic checking for missing system updates on servers enabled by Azure Arc.
129-
- Configure machines periodically to check for missing system updates.
130-
- Schedule recurring updates by using Update Manager.
131-
- [Preview]: Set prerequisites for scheduling recurring updates on Azure VMs.
132-
- Configure periodic checking for missing system updates on Azure VMs.
87+
[Azure Update Manager][19] (AUM) is a service included as part of your Azure subscription. Use it to assess your update status across your environment and manage your Windows and Linux server patching from a single pane of glass, both for on-premises and Azure. It provides a unified solution to help you keep your systems up to date. Update Manager oversees update compliance, deploys critical updates, and offers flexible patching options. Visit [Azure Update Manager Built-In Policy][18] to learn how to configure AUM at scale through Azure Policy.
13388

13489
### Azure Automation account
13590

136-
Automation is a cloud-based service that provides consistent management across your Azure and non-Azure environments. Use it to automate repetitive tasks, enforce configuration consistency, and manage updates for VMs. By using runbooks and shared assets, you can streamline operations and reduce operational costs.
137-
138-
Configure Automation in Azure Policy through the following policies:
139-
140-
- Use managed identity for Automation accounts.
141-
- Configure private endpoint connections on Automation accounts.
142-
- Disable public network access for Automation accounts.
143-
- Configure Automation accounts with private DNS zones.
144-
- Use customer-managed keys to encrypt data at rest for Automation accounts.
145-
- Disable the local authentication method for the Automation account.
146-
- Encrypt Automation account variables.
147-
- Configure Automation accounts to disable local authentication.
148-
- Configure Automation accounts to disable public network access.
149-
- Enable private endpoint connections on Automation accounts.
91+
[Azure Automation][21] is a cloud-based service that provides consistent management across your Azure and non-Azure environments. Use it to automate repetitive tasks, enforce configuration consistency, and manage updates for VMs. By using runbooks and shared assets, you can streamline operations and reduce operational costs. Visit [Azure Automation Built-In Policy][20] to learn how to configure AUM at scale through Azure Policy.
15092

15193
### Boot diagnostics
15294

@@ -185,3 +127,15 @@ Now that you have an overview of Azure Policy and some of the key concepts, here
185127
[07]: ../concepts/definition-structure-basics.md
186128
[08]: ../assign-policy-portal.md
187129
[09]: https://azure.microsoft.com/pricing/details/azure-automanage/
130+
[10]: https://learn.microsoft.com/azure/security/fundamentals/antimalware#antimalware-deployment-scenarios
131+
[11]: https://learn.microsoft.com/azure/backup/policy-reference
132+
[12]: https://learn.microsoft.com/azure/azure-monitor/policy-reference
133+
[13]: https://learn.microsoft.com/azure/azure-monitor/overview
134+
[14]: https://learn.microsoft.com/azure/backup/backup-overview
135+
[15]: https://learn.microsoft.com/azure/automation/change-tracking/overview
136+
[16]: https://learn.microsoft.com/azure/defender-for-cloud/defender-for-cloud-introduction
137+
[17]: https://learn.microsoft.com/azure/defender-for-cloud/policy-reference
138+
[18]: https://learn.microsoft.com/azure/update-manager/periodic-assessment-at-scale
139+
[19]: https://learn.microsoft.com/azure/update-manager/overview
140+
[20]: https://learn.microsoft.com/azure/automation/policy-reference
141+
[21]: https://learn.microsoft.com/azure/automation/overview

0 commit comments

Comments
 (0)