Skip to content

Commit 8c304c3

Browse files
authored
Merge pull request #184570 from MicrosoftDocs/master
Merge master to live, 4 AM
2 parents afd758c + 143507a commit 8c304c3

File tree

14 files changed

+86
-87
lines changed

14 files changed

+86
-87
lines changed

articles/aks/cluster-configuration.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -173,9 +173,9 @@ az group create --name myResourceGroup --location eastus
173173
az aks create -n aks -g myResourceGroup --enable-oidc-issuer
174174
```
175175

176-
### Upgrade an AKS cluster with OIDC Issuer
176+
### Update an AKS cluster with OIDC Issuer
177177

178-
To upgrade a cluster to use OIDC Issuer.
178+
To update a cluster to use OIDC Issuer.
179179

180180
```azurecli-interactive
181181
az aks update -n aks -g myResourceGroup --enable-oidc-issuer

articles/azure-arc/kubernetes/tutorial-akv-secrets-provider.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -20,6 +20,7 @@ The Azure Key Vault Provider for Secrets Store CSI Driver allows for the integra
2020
### Support limitations for Azure Key Vault (AKV) secrets provider extension
2121
- Following Kubernetes distributions are currently supported
2222
- Cluster API Azure
23+
- Azure Kubernetes Service on Azure Stack HCI (AKS-HCI)
2324
- Google Kubernetes Engine
2425
- OpenShift Kubernetes Distribution
2526
- Canonical Kubernetes Distribution

articles/azure-arc/servers/scenario-onboard-azure-sentinel.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ Before you start, make sure that you've met the following requirements:
1717

1818
- Microsoft Sentinel [enabled in your subscription](../../sentinel/quickstart-onboard.md).
1919

20-
- You're machine or server is connected to Azure Arc-enabled servers.
20+
- Your machine or server is connected to Azure Arc-enabled servers.
2121

2222
## Onboard Azure Arc-enabled servers to Microsoft Sentinel
2323

articles/azure-monitor/essentials/activity-log.md

Lines changed: 23 additions & 22 deletions
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,7 @@ For some events, you can view the Change history, which shows what changes happe
4343

4444
![Change history list for an event](media/activity-log/change-history-event.png)
4545

46-
If there are any associated changes with the event, you'll see a list of changes that you can select. This opens up the **Change history (Preview)** page. On this page you see the changes to the resource. In the following example, you can see not only that the VM changed sizes, but what the previous VM size was before the change and what it was changed to. To learn more about change history, see [Get resource changes](../../governance/resource-graph/how-to/get-resource-changes.md).
46+
If there are any associated changes with the event, you'll see a list of changes that you can select. This opens up the **Change history (Preview)** page. On this page, you see the changes to the resource. In the following example, you can see not only that the VM changed sizes, but what the previous VM size was before the change and what it was changed to. To learn more about change history, see [Get resource changes](../../governance/resource-graph/how-to/get-resource-changes.md).
4747

4848
![Change history page showing differences](media/activity-log/change-history-event-details.png)
4949

@@ -65,7 +65,8 @@ You can also access Activity log events using the following methods.
6565
- Use log alerts with Activity entries allowing for more complex alerting logic.
6666
- Store Activity log entries for longer than the Activity Log retention period.
6767
- No data ingestion charges for Activity log data stored in a Log Analytics workspace.
68-
- No data retention charges until after the Activity Log retention period expires for given entires.
68+
- No data retention charges for the first 90 days for Activity log data stored in a Log Analytics workspace.
69+
6970

7071
[Create a diagnostic setting](./diagnostic-settings.md) to send the Activity log to a Log Analytics workspace. You can send the Activity log from any single subscription to up to five workspaces.
7172

@@ -87,7 +88,7 @@ AzureActivity
8788

8889

8990
## Send to Azure Event Hubs
90-
Send the Activity Log to Azure Event Hubs to send entries outside of Azure, for example to a third-party SIEM or other log analytics solutions. Activity log events from event hubs are consumed in JSON format with a `records` element containing the records in each payload. The schema depends on the category and is described in [Schema from storage account and event hubs](activity-log-schema.md).
91+
Send the Activity Log to Azure Event Hubs to send entries outside of Azure, for example to a third-party SIEM or other log analytics solutions. Activity log events from Event Hubs are consumed in JSON format with a `records` element containing the records in each payload. The schema depends on the category and is described in [Schema from Storage Account and Event Hubs](activity-log-schema.md).
9192

9293
Following is sample output data from Event Hubs for an Activity log:
9394

@@ -147,11 +148,10 @@ Following is sample output data from Event Hubs for an Activity log:
147148
}
148149
```
149150

150-
151151
## Send to Azure storage
152-
Send the Activity Log to an Azure Storage account for audit, static analysis, or backup if you want to retain your log data longer than the Activity Log retention period. There is no need to set up Azure storage unless you need to retain the entries for one of these reasons.
152+
Send the Activity Log to an Azure Storage Account if you want to retain your log data longer than 90 days for audit, static analysis, or backup. If you only need to retain your events for 90 days or less you do not need to set up archival to a Storage Account, since Activity Log events are retained in the Azure platform for 90 days.
153153

154-
When you send the Activity log to Azure, a storage container is created in the storage account as soon as an event occurs. The blobs in the container use the following naming convention:
154+
When you send the Activity log to Azure, a storage container is created in the Storage Account as soon as an event occurs. The blobs in the container use the following naming convention:
155155

156156
```
157157
insights-activity-logs/resourceId=/SUBSCRIPTIONS/{subscription ID}/y={four-digit numeric year}/m={two-digit numeric month}/d={two-digit numeric day}/h={two-digit 24-hour clock hour}/m=00/PT1H.json
@@ -165,18 +165,18 @@ insights-logs-networksecuritygrouprulecounter/resourceId=/SUBSCRIPTIONS/00000000
165165

166166
Each PT1H.json blob contains a JSON blob of events that occurred within the hour specified in the blob URL (for example, h=12). During the present hour, events are appended to the PT1H.json file as they occur. The minute value (m=00) is always 00, since resource log events are broken into individual blobs per hour.
167167

168-
Each event is stored in the PT1H.json file with the following format that uses a common top level schema but is otherwise unique for each category as described in [Activity log schema](activity-log-schema.md).
168+
Each event is stored in the PT1H.json file with the following format that uses a common top-level schema but is otherwise unique for each category as described in [Activity log schema](activity-log-schema.md).
169169

170170
``` JSON
171171
{ "time": "2020-06-12T13:07:46.766Z", "resourceId": "/SUBSCRIPTIONS/00000000-0000-0000-0000-000000000000/RESOURCEGROUPS/MY-RESOURCE-GROUP/PROVIDERS/MICROSOFT.COMPUTE/VIRTUALMACHINES/MV-VM-01", "correlationId": "0f0cb6b4-804b-4129-b893-70aeeb63997e", "operationName": "Microsoft.Resourcehealth/healthevent/Updated/action", "level": "Information", "resultType": "Updated", "category": "ResourceHealth", "properties": {"eventCategory":"ResourceHealth","eventProperties":{"title":"This virtual machine is starting as requested by an authorized user or process. It will be online shortly.","details":"VirtualMachineStartInitiatedByControlPlane","currentHealthStatus":"Unknown","previousHealthStatus":"Unknown","type":"Downtime","cause":"UserInitiated"}}}
172172
```
173173

174174

175175
## Legacy collection methods
176-
This section describes legacy methods for collecting the Activity log that were used prior to diagnostic settings. If you're using these methods, you should consider transitioning to diagnostic settings which provide better functionality and consistency with resource logs.
176+
This section describes legacy methods for collecting the Activity log that were used prior to diagnostic settings. If you're using these methods, you should consider transitioning to diagnostic settings that provide better functionality and consistency with resource logs.
177177

178178
### Log profiles
179-
Log profiles are the legacy method for sending the Activity log to Azure storage or event hubs. Use the following procedure to continue working with a log profile or to disable it in preparation for migrating to a diagnostic setting.
179+
Log profiles are the legacy method for sending the Activity log to Azure storage or Event Hubs. Use the following procedure to continue working with a log profile or to disable it in preparation for migrating to a diagnostic setting.
180180

181181
1. From the **Azure Monitor** menu in the Azure portal, select **Activity log**.
182182
3. Click **Diagnostic settings**.
@@ -188,7 +188,6 @@ Log profiles are the legacy method for sending the Activity log to Azure storage
188188
![Legacy experience](media/activity-log/legacy-experience.png)
189189

190190

191-
192191
### Configure log profile using PowerShell
193192

194193
If a log profile already exists, you first need to remove the existing log profile and then create a new one.
@@ -212,27 +211,27 @@ If a log profile already exists, you first need to remove the existing log profi
212211
| --- | --- | --- |
213212
| Name |Yes |Name of your log profile. |
214213
| StorageAccountId |No |Resource ID of the Storage Account where the Activity Log should be saved. |
215-
| serviceBusRuleId |No |Service Bus Rule ID for the Service Bus namespace you would like to have event hubs created in. This is a string with the format: `{service bus resource ID}/authorizationrules/{key name}`. |
214+
| serviceBusRuleId |No |Service Bus Rule ID for the Service Bus namespace you would like to have Event Hubs created in. This is a string with the format: `{service bus resource ID}/authorizationrules/{key name}`. |
216215
| Location |Yes |Comma-separated list of regions for which you would like to collect Activity Log events. |
217-
| RetentionInDays |Yes |Number of days for which events should be retained in the storage account, between 1 and 365. A value of zero stores the logs indefinitely. |
216+
| RetentionInDays |Yes |Number of days for which events should be retained in the Storage Account, between 1 and 365. A value of zero stores the logs indefinitely. |
218217
| Category |No |Comma-separated list of event categories that should be collected. Possible values are _Write_, _Delete_, and _Action_. |
219218
220219
### Example script
221-
Following is a sample PowerShell script to create a log profile that writes the Activity Log to both a storage account and event hub.
220+
Following is a sample PowerShell script to create a log profile that writes the Activity Log to both a Storage Account and Event Hub.
222221
223222
```powershell
224223
# Settings needed for the new log profile
225224
$logProfileName = "default"
226225
$locations = (Get-AzLocation).Location
227226
$locations += "global"
228227
$subscriptionId = "<your Azure subscription Id>"
229-
$resourceGroupName = "<resource group name your event hub belongs to>"
230-
$eventHubNamespace = "<event hub namespace>"
228+
$resourceGroupName = "<resource group name your Event Hub belongs to>"
229+
$eventHubNamespace = "<Event Hub namespace>"
231230
232231
# Build the service bus rule Id from the settings above
233232
$serviceBusRuleId = "/subscriptions/$subscriptionId/resourceGroups/$resourceGroupName/providers/Microsoft.EventHub/namespaces/$eventHubNamespace/authorizationrules/RootManageSharedAccessKey"
234233
235-
# Build the storage account Id from the settings above
234+
# Build the Storage Account Id from the settings above
236235
$storageAccountId = "/subscriptions/$subscriptionId/resourceGroups/$resourceGroupName/providers/Microsoft.Storage/storageAccounts/$storageAccountName"
237236
238237
Add-AzLogProfile -Name $logProfileName -Location $locations -StorageAccountId $storageAccountId -ServiceBusRuleId $serviceBusRuleId
@@ -248,7 +247,7 @@ If a log profile already exists, you first need to remove the existing log profi
248247
3. Use `az monitor log-profiles create` to create a new log profile:
249248

250249
```azurecli-interactive
251-
az monitor log-profiles create --name "default" --location null --locations "global" "eastus" "westus" --categories "Delete" "Write" "Action" --enabled false --days 0 --service-bus-rule-id "/subscriptions/<YOUR SUBSCRIPTION ID>/resourceGroups/<RESOURCE GROUP NAME>/providers/Microsoft.EventHub/namespaces/<EVENT HUB NAME SPACE>/authorizationrules/RootManageSharedAccessKey"
250+
az monitor log-profiles create --name "default" --location null --locations "global" "eastus" "westus" --categories "Delete" "Write" "Action" --enabled false --days 0 --service-bus-rule-id "/subscriptions/<YOUR SUBSCRIPTION ID>/resourceGroups/<RESOURCE GROUP NAME>/providers/Microsoft.EventHub/namespaces/<Event Hub NAME SPACE>/authorizationrules/RootManageSharedAccessKey"
252251
```
253252
| Property | Required | Description |
254253
| --- | --- | --- |
@@ -279,7 +278,7 @@ To disable the setting, perform the same procedure and click **Disconnect** to r
279278
### Data structure changes
280279
Diagnostic settings send the same data as the legacy method used to send the Activity log with some changes to the structure of the *AzureActivity* table.
281280

282-
The columns in the following table have been deprecated in the updated schema. They still exist in *AzureActivity* but they will have no data. The replacement for these columns are not new, but they contain the same data as the deprecated column. They are in a different format, so you may need to modify log queries that use them.
281+
The columns in the following table have been deprecated in the updated schema. They still exist in *AzureActivity* but they will have no data. The replacements for these columns are not new, but they contain the same data as the deprecated column. They are in a different format, so you may need to modify log queries that use them.
283282

284283
|Activity Log JSON | Log Analytics column name<br/>*(older deprecated)* | New Log Analytics column name | Notes |
285284
|:---------|:---------|:---------|:---------|
@@ -289,7 +288,7 @@ The columns in the following table have been deprecated in the updated schema. T
289288
|operationName | OperationName | OperationNameValue |REST API localizes operation name value. Log Analytics UI always shows English. |
290289
|resourceProviderName | ResourceProvider | ResourceProviderValue ||
291290

292-
> [!IMPORTANT]
291+
> [!Important]
293292
> In some cases, the values in these columns may be in all uppercase. If you have a query that includes these columns, you should use the [=~ operator](/azure/kusto/query/datatypes-string-operators) to do a case insensitive comparison.
294293
295294
The following column have been added to *AzureActivity* in the updated schema:
@@ -299,7 +298,8 @@ The following column have been added to *AzureActivity* in the updated schema:
299298
- Properties_d
300299

301300
## Activity Log Analytics monitoring solution
302-
The Azure Log Analytics monitoring solution will be deprecated soon and replaced by a workbook using the updated schema in the Log Analytics workspace. You can still use the solution if you already have it enabled, but it can only be used if you're collecting the Activity log using legacy settings.
301+
> [!Note]
302+
> The Azure Log Analytics monitoring solution will be deprecated soon and replaced by a workbook using the updated schema in the Log Analytics workspace. You can still use the solution if you already have it enabled, but it can only be used if you're collecting the Activity log using legacy settings.
303303
304304

305305

@@ -309,13 +309,14 @@ Monitoring solutions are accessed from the **Monitor** menu in the Azure portal.
309309
![Azure Activity Logs tile](media/activity-log/azure-activity-logs-tile.png)
310310

311311

312-
Click the **Azure Activity Logs** tile to open the **Azure Activity Logs** view. The view includes the visualization parts in the following table. Each part lists up to 10 items matching that parts's criteria for the specified time range. You can run a log query that returns all matching records by clicking **See all** at the bottom of the part.
312+
Click the **Azure Activity Logs** tile to open the **Azure Activity Logs** view. The view includes the visualization parts in the following table. Each part lists up to 10 items matching that part's criteria for the specified time range. You can run a log query that returns all matching records by clicking **See all** at the bottom of the part.
313313

314314
![Azure Activity Logs dashboard](media/activity-log/activity-log-dash.png)
315315

316316

317317
### Enable the solution for new subscriptions
318-
You will soon no longer be able to add the Activity Logs Analytics solution to your subscription using the Azure portal. You can add it using the following procedure with a Resource Manager template.
318+
> [!NOTE]
319+
>You will soon no longer be able to add the Activity Logs Analytics solution to your subscription using the Azure portal. You can add it using the following procedure with a Resource Manager template.
319320
320321
1. Copy the following json into a file called *ActivityLogTemplate*.json.
321322

articles/data-factory/managed-virtual-network-private-endpoint.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -163,7 +163,6 @@ Generally, managed Virtual network is available to all Azure Data Factory region
163163

164164
### Outbound communications through public endpoint from ADF Managed Virtual Network
165165
- All ports are opened for outbound communications.
166-
- Azure Storage and Azure Data Lake Gen2 are not supported to be connected through public endpoint from ADF Managed Virtual Network.
167166

168167
### Linked Service creation of Azure Key Vault
169168
- When you create a Linked Service for Azure Key Vault, there is no Azure Integration Runtime reference. So you can't create Private Endpoint during Linked Service creation of Azure Key Vault. But when you create Linked Service for data stores which references Azure Key Vault Linked Service and this Linked Service references Azure Integration Runtime with Managed Virtual Network enabled, then you are able to create a Private Endpoint for the Azure Key Vault Linked Service during the creation.

articles/defender-for-iot/device-builders/release-notes.md

Lines changed: 17 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: What's new in Microsoft Defender for IoT for device builders
33
description: Learn about the latest updates for Defender for IoT device builders.
44
ms.topic: conceptual
5-
ms.date: 12/28/2021
5+
ms.date: 01/10/2022
66
---
77

88
# What's new
@@ -13,12 +13,26 @@ This article lists new features and feature enhancements in Microsoft Defender f
1313

1414
Noted features are in PREVIEW. The [Azure Preview Supplemental Terms](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) include other legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
1515

16-
If you would like to be added to the Microsoft Defender for IoT device builders email distribution list, to get updates on new features, and release notes, send an email to: [[email protected]](mailto:[email protected])
17-
1816
## Versioning and support
1917

2018
Listed below are the support, breaking change policies for Defender for IoT, and the versions of Defender for IoT that are currently available.
2119

20+
## November 2021
21+
22+
**Version 3.13.1**:
23+
24+
- DNS network activity on managed devices is now supported. Microsoft threat intelligence security graph can now detect suspicious activity based on DNS traffic.
25+
26+
- [Leaf device proxying](../../iot-edge/how-to-connect-downstream-iot-edge-device.md#integrate-microsoft-defender-for-iot-with-iot-edge-gateway): There is now an enhanced integration with IoT Edge. This integration enhances the connectivity between the agent, and the cloud using leaf device proxying.
27+
28+
## October 2021
29+
30+
**Version 3.12.2**:
31+
32+
- More CIS benchmark checks are now supported for Debian 9: These extra checks allow you to make sure your network is compliant with the CIS best practices used to protect against pervasive cyber threats.
33+
34+
- **[Twin configuration](concept-micro-agent-configuration.md)**: The micro agent’s behavior is configured by a set of module twin properties. You can configure the micro agent to best suit your needs.
35+
2236
## September 2021
2337

2438
**Version 3.11**:

0 commit comments

Comments
 (0)