You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/azure-vmware/vulnerability-management.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,7 +7,6 @@ ms.date: 3/22/2024
7
7
ms.custom: engagement-fy24
8
8
---
9
9
10
-
11
10
# How Azure VMware Solution Addresses Vulnerabilities in the Infrastructure
12
11
13
12
At a high level, Azure VMware Solution is a Microsoft Azure service and therefore must follow all the same policies and requirements that Azure follows. Azure policies and procedures dictate that Azure VMware Solution must follow the [SDL](https://www.microsoft.com/securityengineering/sdl) and must meet several regulatory requirements as promised by Microsoft Azure.
@@ -22,16 +21,17 @@ Azure VMware Solution takes a defense in depth approach to vulnerability and ris
22
21
- Details within the signal are adjudicated and assigned a CVSS score and risk rating according to compensating controls within the service.
23
22
- The risk rating is used against internal bug bars, internal policies and regulations to establish a timeline for implementing a fix.
24
23
- Internal engineering teams partner with appropriate parties to qualify and roll out any fixes, patches and other configuration updates necessary.
25
-
- Communications are drafted when necassary and published according to the risk rating assigned.
26
-
>[!tip]
27
-
>Communications are surfaced through [Azure Service Health Portal](/azure/service-health/service-health-portal-update), [Known Issues](/azure/azure-vmware/azure-vmware-solution-known-issues) or Email.
24
+
- Communications are drafted when necessary and published according to the risk rating assigned.
25
+
26
+
> [!TIP]
27
+
> Communications are surfaced through [Azure Service Health Portal](/azure/service-health/service-health-portal-update), [Known Issues](/azure/azure-vmware/azure-vmware-solution-known-issues) or Email.
28
28
29
29
### Subset of regulations governing vulnerability and risk management
30
30
31
31
Azure VMware Solution is in scope for the following certifications and regulatory requirements. The regulations listed aren't a complete list of certifications Azure VMware Solution holds, rather it's a list with specific requirements around vulnerability management. These regulations don't rely on other regulations for the same purpose. IE, certain regional certifications may point to ISO requirements for vulnerability management.
32
32
33
-
>[!NOTE]
34
-
>To access the following audit reports hosted in the Service Trust Portal, you must be an active Microsoft customer.
33
+
>[!NOTE]
34
+
>To access the following audit reports hosted in the Service Trust Portal, you must be an active Microsoft customer.
Copy file name to clipboardExpand all lines: articles/frontdoor/standard-premium/how-to-add-custom-domain.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -100,7 +100,7 @@ After you validate your custom domain, you can associate it to your Azure Front
100
100
101
101
> [!NOTE]
102
102
> * If HTTPS is enabled, certificate provisioning and propagation may take a few minutes because propagation is being done to all edge locations.
103
-
> * If your domain CNAME is indirectly pointed to a Front Door endpoint, for example, using Azure Traffic Manager for multi-CDN failover, the **DNS state** column shows as **CNAME/Alias record currently not detected**. Azure Front Door can't guarantee 100% detection of the CNAME record in this case. If you've configured an Azure Front Door endpoint to Azure Traffic Manager and still see this message, it doesn’t mean you didn't set up correctly, therefore further no action is neccessary from your side.
103
+
> * If your domain CNAME is indirectly pointed to a Front Door endpoint, for example, using Azure Traffic Manager for multi-CDN failover, the **DNS state** column shows as **CNAME/Alias record currently not detected**. Azure Front Door can't guarantee 100% detection of the CNAME record in this case. If you've configured an Azure Front Door endpoint to Azure Traffic Manager and still see this message, it doesn’t mean you didn't set up correctly, therefore further no action is necessary from your side.
0 commit comments