Skip to content

Commit 9102fb0

Browse files
Learn Build Service GitHub AppLearn Build Service GitHub App
authored andcommitted
Merging changes synced from https://github.com/MicrosoftDocs/azure-docs-pr (branch live)
2 parents 22c37b7 + a505eb2 commit 9102fb0

File tree

11 files changed

+444
-16
lines changed

11 files changed

+444
-16
lines changed

articles/azure-netapp-files/data-protection-disaster-recovery-options.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,14 +5,18 @@ services: azure-netapp-files
55
author: b-ahibbard
66
ms.service: azure-netapp-files
77
ms.topic: concept-article
8-
ms.date: 05/12/2025
8+
ms.date: 08/28/2025
99
ms.author: anfdocs
1010
# Customer intent: "As a data administrator, I want to assess the data protection and disaster recovery options available in Azure NetApp Files, so that I can choose the most effective solutions to ensure data integrity and availability for my organization's needs."
1111
---
1212
# Understand data protection and disaster recovery options in Azure NetApp Files
1313

1414
Learn about the different data protection and disaster recovery features in Azure NetApp Files and understand what solutions best serve your needs.
1515

16+
## On-Disk Data Protection
17+
18+
Azure NetApp Files Flexible, Standard, Premium and Ultra service levels are built on a [fault-tolerant bare-metal fleet powered by ONTAP®](azure-netapp-files-introduction.md#simplicity-and-availability), delivering enterprise-grade resilience, and uses RAID-DP® (Double Parity RAID) to safeguard data against disk failures. This mechanism distributes parity across multiple disks, enabling seamless data recovery even if two disks fail simultaneously. RAID-DP has a long-standing presence in the enterprise storage industry and is recognized for its proven reliability and fault tolerance.
19+
1620
## Snapshots
1721

1822
The foundation of data protection solutions including volume restores and clones and cross-region replication, Azure NetApp Files snapshot technology delivers stability, scalability, and swift recoverability without impacting performance.

articles/azure-netapp-files/snapshots-restore-new-volume.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: azure-netapp-files
55
author: b-hchen
66
ms.service: azure-netapp-files
77
ms.topic: how-to
8-
ms.date: 06/19/2025
8+
ms.date: 08/28/2025
99
ms.author: anfdocs
1010
# Customer intent: "As a cloud administrator, I want to restore a volume from a snapshot so that I can recover data to a specific point in time and maintain system integrity."
1111
---
@@ -24,7 +24,9 @@ ms.author: anfdocs
2424

2525
* Cross-region replication and cross-zone replication operations are suspended and cannot be added while restoring a snapshot to a new volume.
2626

27-
* Only enable backup, snapshots, and replication (cross-region or cross-zone) on the new volume _after_ it's fully restored from the snapshot. To ensure the volume is fully restored, check the progress indicator in the volume details.
27+
* Only enable backup, snapshots, and replication (cross-region or cross-zone) on the new volume _after_ it's fully restored from the snapshot. To ensure the volume is fully restored, check the progress indicator in the volume details.
28+
29+
* Depending on the size of the volume being restored, the restore operation may take a few minutes to multiple hours to complete.
2830

2931
## Steps
3032

articles/communication-services/concepts/service-limits.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -243,8 +243,6 @@ Azure Communication Services supports chat.
243243

244244
Azure Communication Services stores chat messages according to the retention policy that you set when you create a chat thread.
245245

246-
[!INCLUDE [public-preview-notice.md](../includes/public-preview-include-document.md)]
247-
248246
You can choose between indefinite message retention or automatic deletion between 30 and 90 days via the retention policy on the [Create Chat Thread API](/rest/api/communication/chat/chat/create-chat-thread). Alternatively, you can choose not to set a retention policy on a chat thread.
249247

250248
If you have strict compliance needs, we recommend that you use the [Delete Chat Thread](/rest/api/communication/chat/chat/delete-chat-thread) API to delete chat threads. Any threads created before the new retention policy aren't affected unless you specifically change the policy for that thread.

articles/dev-box/how-to-configure-dev-box-serverless-gpu.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,10 @@ Serverless GPU compute in Dev Box uses Azure Container Apps (ACA). When a develo
3535
- An Azure subscription
3636
- *Microsoft.App* registered for your subscription
3737
- *Microsoft.CognitiveServices* registered for your subscription
38-
- A Microsoft Dev Box project
38+
- A dev center and project
39+
- For more information on creating a dev center and project, see [Quickstart: Configure Microsoft Dev Box](quickstart-configure-dev-box-service.md)
40+
- A managed service identity (MSI) configured for the dev center
41+
- For more information on configuring MSI, see [Managed Service Identity](/azure/dev-box/how-to-configure-catalog?tabs=DevOpsRepoMSI#configure-a-managed-identity).
3942

4043
## Configure serverless GPU
4144

articles/load-balancer/TOC.yml

Lines changed: 11 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -156,14 +156,17 @@
156156
href: move-across-regions-azure-load-balancer.md
157157
- name: Secure
158158
items:
159-
- name: Deploy public load balancer with DDoS protection
160-
href: tutorial-protect-load-balancer.md
161-
- name: Implement a secure hybrid networking
162-
href: /azure/architecture/reference-architectures/dmz/secure-vnet-dmz
163-
- name: Security baseline
164-
href: /security/benchmark/azure/baselines/azure-load-balancer-security-baseline?toc=/azure/load-balancer/TOC.json
165-
- name: Azure Network security blog
166-
href: https://techcommunity.microsoft.com/category/azure-network-security/blog/azurenetworksecurityblog
159+
- name: Secure your load balancer
160+
href: secure-load-balancer.md
161+
- name: Deploy public load balancer with DDoS protection
162+
href: tutorial-protect-load-balancer.md
163+
- name: Implement a secure hybrid networking
164+
href: /azure/architecture/reference-architectures/dmz/secure-vnet-dmz
165+
- name: Security baseline
166+
href: /security/benchmark/azure/baselines/azure-load-balancer-security-baseline?toc=/azure/load-balancer/TOC.json
167+
- name: Azure Network security blog
168+
href: https://techcommunity.microsoft.com/category/azure-network-security/blog/azurenetworksecurityblog
169+
expanded: false
167170
- name: Connectivity
168171
items:
169172
- name: Inbound connectivity
Lines changed: 98 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,98 @@
1+
---
2+
title: Secure your Azure Load Balancer deployment
3+
description: Learn how to secure Azure Load Balancer, with best practices for protecting your deployment.
4+
author: mbender-ms
5+
ms.author: mbender
6+
ms.service: azure-load-balancer
7+
ms.topic: conceptual
8+
ms.custom: horz-security
9+
ms.date: 08/13/2025
10+
ai-usage: ai-assisted
11+
---
12+
13+
# Secure your Azure Load Balancer deployment
14+
15+
Azure Load Balancer provides Layer 4 load balancing capabilities to distribute incoming traffic among healthy backend instances. When deploying this service, it's important to follow security best practices to protect data, configurations, and infrastructure.
16+
17+
This article provides guidance on how to best secure your Azure Load Balancer deployment.
18+
19+
## Network security
20+
21+
Network security is foundational for Azure Load Balancer as it controls traffic flow and access to backend resources. Standard Load Balancer follows a secure-by-default approach with closed inbound connections.
22+
23+
- **Use Standard Load Balancer SKU**: Deploy Standard Load Balancer instead of Basic SKU for enhanced security with closed-by-default inbound connections and zero trust network security model. See [Azure Load Balancer overview](load-balancer-overview.md).
24+
25+
- **Implement network security groups on subnets**: Apply network security groups to backend subnets and network interfaces to explicitly permit allowed traffic and restrict access to trusted ports and IP address ranges. See [Azure security baseline for Azure Load Balancer](/security/benchmark/azure/baselines/azure-load-balancer-security-baseline#network-security).
26+
27+
- **Allow Azure Load Balancer health probe traffic**: Ensure that network security groups and local firewall policies allow traffic from IP address 168.63.129.16 to enable health probes to reach backend instances. See [Azure Load Balancer health probe](load-balancer-custom-probe-overview.md).
28+
29+
- **Use internal load balancer for private workloads**: Deploy internal load balancer with private frontend IP addresses to isolate backend resources from direct internet exposure and allow traffic only from within virtual networks or peered networks. See [Internal Load Balancer Frontend IP configuration](components.md#frontend-ip-configurations).
30+
31+
- **Protect public load balancers with Azure DDoS Protection**: Enable Azure DDoS Protection Standard for public load balancers to provide advanced protection with detection capabilities that monitor endpoints for threats and signs of abuse. See [Protect your public load balancer with Azure DDoS Protection](tutorial-protect-load-balancer-ddos.md).
32+
33+
34+
## Identity and access management
35+
36+
Access control for Azure Load Balancer focuses on managing who can configure and modify load balancer resources and settings through Azure's role-based access control system.
37+
38+
- **Implement Azure role-based access control**: Assign appropriate Azure roles to users and groups for load balancer management, using built-in roles like Network Contributor or creating custom roles with specific permissions. See [Azure roles, Microsoft Entra roles, and classic subscription administrator roles](/azure/role-based-access-control/rbac-and-directory-admin-roles#azure-roles).
39+
40+
- **Use least privilege access**: Grant users the minimum permissions necessary to perform their tasks, avoiding broad administrative roles when specific load balancer operations are sufficient. See [What is Azure role-based access control (Azure RBAC)](/azure/role-based-access-control/overview).
41+
42+
43+
44+
## Data protection
45+
46+
Azure Load Balancer operates at Layer 4 and does not store customer data, but implementing proper data protection measures for traffic and configurations is essential for comprehensive security.
47+
48+
- **Implement end-to-end encryption**: Configure TLS/SSL termination on backend instances rather than the load balancer, as Load Balancer operates at Layer 4 and does not provide SSL termination capabilities.
49+
50+
- **Use Application Gateway for HTTP/HTTPS workloads**: Deploy Azure Application Gateway instead of Load Balancer for HTTP/HTTPS applications that require SSL/TLS termination and web application firewall capabilities. See [Architecture best practices for Azure Load Balancer](/azure/well-architected/service-guides/azure-load-balancer#security).
51+
52+
53+
54+
## Logging and monitoring
55+
56+
Comprehensive monitoring and logging capabilities help detect security threats, performance issues, and provide visibility into load balancer operations and traffic patterns.
57+
58+
- **Enable diagnostic settings**: Configure diagnostic settings to send load balancer metrics and logs to Azure Monitor Logs, Storage Account, or Event Hub for analysis and alerting. See [Monitor Azure Load Balancer](monitor-load-balancer.md#creating-a-diagnostic-setting).
59+
60+
- **Use Azure Monitor Insights**: Deploy Load Balancer Insights to access pre-configured dashboards, functional dependency views, and metrics visualization for proactive monitoring. See [Using Insights to monitor and configure your Azure Load Balancer](load-balancer-insights.md).
61+
62+
- **Configure health probe monitoring**: Implement comprehensive health probes to monitor backend instance health and configure appropriate intervals and thresholds for accurate health detection. See [Manage health probes for Azure Load Balancer](manage-probes-how-to.md).
63+
64+
- **Monitor connection metrics**: Track key metrics including Data Path Availability, Health Probe Status, and SYN Count to identify potential security threats and performance issues. See [Standard load balancer diagnostics with metrics, alerts, and resource health](load-balancer-standard-diagnostics.md#multi-dimensional-metrics).
65+
66+
- **Enable VNet flow logs**: Configure virtual network flow logs to analyze traffic patterns flowing through the load balancer and identify potential security threats or anomalous behavior. See [Monitor Azure Load Balancer](monitor-load-balancer.md#analyzing-load-balancer-traffic-with-vnet-flow-logs).
67+
68+
- **Set up security alerts**: Create Azure Monitor alerts for security-relevant events such as failed health probes, unusual traffic patterns, or configuration changes. See [Monitor Azure Load Balancer](monitor-load-balancer.md).
69+
70+
## Compliance and governance
71+
72+
Governance controls ensure consistent security configuration and compliance with organizational policies and regulatory requirements across load balancer deployments.
73+
74+
- **Implement Azure Policy controls**: Deploy Azure Policy definitions to audit and enforce load balancer security configurations, including SKU requirements and network security group associations. See [Azure security baseline for Azure Load Balancer](/security/benchmark/azure/baselines/azure-load-balancer-security-baseline#asset-management).
75+
76+
- **Use resource tagging**: Apply consistent tags to load balancer resources for governance, cost management, and security compliance tracking. See [Architecture best practices for Azure Load Balancer](/azure/well-architected/service-guides/azure-load-balancer#azure-policies).
77+
78+
## Service-specific security
79+
80+
Azure Load Balancer has unique security considerations related to traffic distribution algorithms, session persistence, and integration with other Azure networking services.
81+
82+
- **Configure appropriate distribution mode**: Select the optimal distribution mode (5-tuple, 2-tuple, or 3-tuple hash) based on security requirements, considering that session persistence can create uneven load distribution. See [Azure Load Balancer distribution modes](distribution-mode-concepts.md).
83+
84+
- **Enable TCP reset for better security**: Configure TCP reset on load balancing rules to send bidirectional TCP reset packets on idle timeout, providing clearer connection state information to applications. See [Azure Load Balancer Best Practices](load-balancer-best-practices.md#enable-tcp-resets).
85+
86+
- **Secure floating IP configurations**: When using floating IP for high availability scenarios, ensure proper configuration of loopback interfaces in guest operating systems and implement appropriate security controls. See [Azure Load Balancer Best Practices](load-balancer-best-practices.md#configure-loop-back-interface-when-setting-up-floating-ip).
87+
88+
- **Implement Gateway Load Balancer security**: For network virtual appliances, separate trusted and untrusted traffic on different tunnel interfaces and increase MTU limits to prevent packet drops from VXLAN headers. See [Azure Load Balancer Best Practices](load-balancer-best-practices.md#implement-gateway-load-balancer-configuration-best-practices).
89+
90+
- **Integrate with Azure Firewall**: Route traffic through Azure Firewall when using internal load balancers for additional security inspection and threat protection capabilities. See [Architecture best practices for Azure Load Balancer](/azure/well-architected/service-guides/azure-load-balancer#security).
91+
92+
- **Use NAT Gateway for outbound connectivity**: Deploy Azure NAT Gateway for predictable outbound IP addresses and enhanced security compared to default outbound access IP mechanisms. See [Tutorial: Protect your public load balancer with Azure DDoS Protection](tutorial-protect-load-balancer-ddos.md#create-nat-gateway).
93+
94+
## Learn more
95+
96+
- [Azure security baseline for Azure Load Balancer](/security/benchmark/azure/baselines/azure-load-balancer-security-baseline)
97+
- [Architecture best practices for Azure Load Balancer](/azure/well-architected/service-guides/azure-load-balancer)
98+
- [Azure Load Balancer documentation](/azure/load-balancer/)

articles/reliability/reliability-functions.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -490,8 +490,6 @@ With an active-active pattern, functions in both regions are actively running an
490490

491491
![Architecture for Azure Front Door and Function](../azure-functions/media/functions-geo-dr/front-door.png)
492492

493-
For an example, see the sample on how to [implement the geode pattern by deploying the API to geodes in distributed Azure regions.](https://github.com/mspnp/geode-pattern-accelerator).
494-
495493
### Active-passive pattern for non-HTTPS trigger functions
496494

497495
It's recommended that you use active-passive pattern for your event-driven, non-HTTP triggered functions, such as Service Bus and Event Hubs triggered functions.
Loading

articles/virtual-network/ip-services/virtual-network-public-ip-address.md

Lines changed: 11 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -120,6 +120,17 @@ Learn how to assign a public IP address to the following resources:
120120

121121
Azure Public IP is available in all regions for both Public and US Gov clouds. Azure Public IP doesn't move or store customer data out of the region it's deployed in.
122122

123+
## Moving Public IP Addresses
124+
125+
You can move Standard Public IP addresses under certain conditions:
126+
127+
| Scenario | Allowed | Notes |
128+
|------------------------------|---------|--------------------------------------------------------------------|
129+
| Move across resource groups | Yes | While attached to all resources except a virtual network gateway |
130+
| Move across subscriptions | Yes | Only when detached from all resources |
131+
| Move across regions | No | IP addresses are tied to regional ranges and cannot be moved |
132+
133+
123134
## Permissions
124135

125136
To manage public IP addresses, your account must be assigned to the [network contributor](../../role-based-access-control/built-in-roles.md?toc=%2fazure%2fvirtual-network%2ftoc.json#network-contributor) role. A [custom](../../role-based-access-control/custom-roles.md?toc=%2fazure%2fvirtual-network%2ftoc.json) role is also supported. The custom role must be assigned the appropriate actions listed in the following table:

0 commit comments

Comments
 (0)