Skip to content

Commit 88ede77

Browse files
Merge pull request #121093 from Rageking8/fix-necessary-typos
Fix necessary typos
2 parents c3d5571 + c1e1880 commit 88ede77

File tree

2 files changed

+7
-7
lines changed

2 files changed

+7
-7
lines changed

articles/azure-vmware/vulnerability-management.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,6 @@ ms.date: 3/22/2024
77
ms.custom: engagement-fy24
88
---
99

10-
1110
# How Azure VMware Solution Addresses Vulnerabilities in the Infrastructure
1211

1312
At a high level, Azure VMware Solution is a Microsoft Azure service and therefore must follow all the same policies and requirements that Azure follows. Azure policies and procedures dictate that Azure VMware Solution must follow the [SDL](https://www.microsoft.com/securityengineering/sdl) and must meet several regulatory requirements as promised by Microsoft Azure.
@@ -22,16 +21,17 @@ Azure VMware Solution takes a defense in depth approach to vulnerability and ris
2221
- Details within the signal are adjudicated and assigned a CVSS score and risk rating according to compensating controls within the service.
2322
- The risk rating is used against internal bug bars, internal policies and regulations to establish a timeline for implementing a fix.
2423
- Internal engineering teams partner with appropriate parties to qualify and roll out any fixes, patches and other configuration updates necessary.
25-
- Communications are drafted when necassary and published according to the risk rating assigned.
26-
>[!tip]
27-
>Communications are surfaced through [Azure Service Health Portal](/azure/service-health/service-health-portal-update), [Known Issues](/azure/azure-vmware/azure-vmware-solution-known-issues) or Email.
24+
- Communications are drafted when necessary and published according to the risk rating assigned.
25+
26+
> [!TIP]
27+
> Communications are surfaced through [Azure Service Health Portal](/azure/service-health/service-health-portal-update), [Known Issues](/azure/azure-vmware/azure-vmware-solution-known-issues) or Email.
2828
2929
### Subset of regulations governing vulnerability and risk management
3030

3131
Azure VMware Solution is in scope for the following certifications and regulatory requirements. The regulations listed aren't a complete list of certifications Azure VMware Solution holds, rather it's a list with specific requirements around vulnerability management. These regulations don't rely on other regulations for the same purpose. IE, certain regional certifications may point to ISO requirements for vulnerability management.
3232

33-
>[!NOTE]
34-
>To access the following audit reports hosted in the Service Trust Portal, you must be an active Microsoft customer.
33+
> [!NOTE]
34+
> To access the following audit reports hosted in the Service Trust Portal, you must be an active Microsoft customer.
3535
3636
- [ISO](https://servicetrust.microsoft.com/DocumentPage/38a05a38-6181-432e-a5ec-aa86008c56c9)
3737
- [PCI](https://servicetrust.microsoft.com/viewpage/PCI) \- See the packages for DSS and 3DS for Audit Information.

articles/frontdoor/standard-premium/how-to-add-custom-domain.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -100,7 +100,7 @@ After you validate your custom domain, you can associate it to your Azure Front
100100

101101
> [!NOTE]
102102
> * If HTTPS is enabled, certificate provisioning and propagation may take a few minutes because propagation is being done to all edge locations.
103-
> * If your domain CNAME is indirectly pointed to a Front Door endpoint, for example, using Azure Traffic Manager for multi-CDN failover, the **DNS state** column shows as **CNAME/Alias record currently not detected**. Azure Front Door can't guarantee 100% detection of the CNAME record in this case. If you've configured an Azure Front Door endpoint to Azure Traffic Manager and still see this message, it doesn’t mean you didn't set up correctly, therefore further no action is neccessary from your side.
103+
> * If your domain CNAME is indirectly pointed to a Front Door endpoint, for example, using Azure Traffic Manager for multi-CDN failover, the **DNS state** column shows as **CNAME/Alias record currently not detected**. Azure Front Door can't guarantee 100% detection of the CNAME record in this case. If you've configured an Azure Front Door endpoint to Azure Traffic Manager and still see this message, it doesn’t mean you didn't set up correctly, therefore further no action is necessary from your side.
104104
105105
## Verify the custom domain
106106

0 commit comments

Comments
 (0)