Skip to content

Commit 91c065d

Browse files
committed
Copyedits
1 parent 4fbf9d3 commit 91c065d

File tree

6 files changed

+16
-18
lines changed

6 files changed

+16
-18
lines changed

articles/azure-arc/servers/security-extensions.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.date: 06/06/2024
77

88
# Extensions security
99

10-
This article describes the fundamentals of [VM extensions](manage-vm-extensions.md) for Azure Arc-enabled servers and details how extension settings can be customized. It also covers the execution of scripts using the extension manager and the option to disable the extension manager if extensions aren't needed.
10+
This article describes the fundamentals of [VM extensions](manage-vm-extensions.md) for Azure Arc-enabled servers and details how extension settings can be customized.
1111

1212
## Extension basics
1313

articles/azure-arc/servers/security-identity-authorization.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@ Generic RBAC roles in Azure also apply to Azure Arc-enabled servers, including R
3939

4040
[Azure role-based access control](../../role-based-access-control/overview.md) is used to control which accounts can see and manage your Azure Arc-enabled server. From the [**Access Control (IAM)**](../../role-based-access-control/role-assignments-portal.yml) page in the Azure portal, you can verify who has access to your Azure Arc-enabled server.
4141

42-
:::image type="content" source="./media/security-identity-authorization/access-control-page.png" alt-text="Azure Arc-enabled server access control" border="false" lightbox="./media/security-overview/access-control-page.png":::
42+
:::image type="content" source="media/security-identity-authorization/access-control-page.png" alt-text="Azure Arc-enabled server access control":::
4343

4444
Users and applications granted [contributor](../../role-based-access-control/built-in-roles.md#contributor) or administrator role access to the resource can make changes to the resource, including deploying or deleting [extensions](manage-vm-extensions.md) on the machine. Extensions can include arbitrary scripts that run in a privileged context, so consider any contributor on the Azure resource to be an indirect administrator of the server.
4545

articles/azure-arc/servers/security-machine-configuration.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.date: 06/06/2024
77

88
# Machine configuration
99

10-
This article describes the basics of Azure Machine Configuration, a compliance reporting and configuration tool based on PowerShell Desired State Configuration. It explains how the tool can check and optionally remediate security and other settings on machines at scale. Users can utilize built-in policies from Microsoft or author their own. The article also details the permissions needed to assign these policies and provides instructions for disabling the machine configuration agent if not needed.
10+
This article describes the basics of Azure Machine Configuration, a compliance reporting and configuration tool that can check and optionally remediate security and other settings on machines at scale.
1111

1212
## Machine configuration basics
1313

@@ -25,9 +25,9 @@ If you don’t intend to use machine configuration policies, you can disable the
2525

2626
The Azure Connected Machine agent has two possible modes:
2727

28-
1. Full mode, the default mode which allows all use of agent functionality.
28+
- **Full mode**, the default mode which allows all use of agent functionality.
2929

30-
1. Monitor mode, which applies a Microsoft-managed extension allowlist, disables remote connectivity, and disables the machine configuration agent.
30+
- **Monitor mode**, which applies a Microsoft-managed extension allowlist, disables remote connectivity, and disables the machine configuration agent.
3131

3232
If you’re using Arc solely for monitoring purposes, setting the agent to Monitor mode makes it easy to restrict the agent to just the functionality required to use Azure Monitor. You can configure the agent mode with the following command (run locally on each machine):
3333

articles/azure-arc/servers/security-networking.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -11,15 +11,15 @@ This article describes the networking requirements and options for Azure Arc-ena
1111

1212
## General networking
1313

14-
Azure Arc-enabled servers is a software-as-a-service offering with a combination of global and regional endpoints shared by all customers. All network communication from the Azure Connected Machine agent is outbound to Azure. Azure will never reach "into" your network to manage your machines. These connections are always encrypted using TLS certificates. The list of endpoints and IP addresses accessed by the agent are documented in our [network requirements](network-requirements.md).
14+
Azure Arc-enabled servers is a software-as-a-service offering with a combination of global and regional endpoints shared by all customers. All network communication from the Azure Connected Machine agent is outbound to Azure. Azure will never reach "into" your network to manage your machines. These connections are always encrypted using TLS certificates. The list of endpoints and IP addresses accessed by the agent are documented in the [network requirements](network-requirements.md).
1515

16-
Extensions you install can require extra endpoints not included in the Azure Arc network requirements. Consult the extension documentation for further information on network requirements for that solution.
16+
Extensions you install may require extra endpoints not included in the Azure Arc network requirements. Consult the extension documentation for further information on network requirements for that solution.
1717

1818
If your organization uses TLS inspection, the Azure Connected Machine agent doesn't use certificate pinning and will continue to work, so long as your machine trusts the certificate presented by the TLS inspection service. Some Azure Arc extensions use certificate pinning and need to be excluded from TLS inspection. Consult the documentation for any extensions you deploy to determine if they support TLS inspection.
1919

2020
### Private endpoints
2121

22-
Private endpoints are an optional Azure networking technology network traffic to be sent over Express Route or a site-to-site VPN and more granularly control which machines can use Azure Arc. With private endpoints, you can use private IP addresses in your organization’s network address space to access the Azure Arc cloud services. Additionally, only servers you authorize are able to send data through these endpoints, which protects against unauthorized use of the Azure Connected Machine agent in your network.
22+
[Private endpoints](private-link-security.md) are an optional Azure networking technology that allows network traffic to be sent over Express Route or a site-to-site VPN and more granularly control which machines can use Azure Arc. With private endpoints, you can use private IP addresses in your organization’s network address space to access the Azure Arc cloud services. Additionally, only servers you authorize are able to send data through these endpoints, which protects against unauthorized use of the Azure Connected Machine agent in your network.
2323

2424
It’s important to note that not all endpoints and not all scenarios are supported with private endpoints. You'll still need to make firewall exceptions for some endpoints like Microsoft Entra ID, which doesn't offer a private endpoint solution. Any extensions you install may require other private endpoints (if supported) or access to the public endpoints for their services. Additionally, you can’t use SSH or Windows Admin Center to access your server over a private endpoint.
2525

articles/azure-arc/servers/security-onboarding.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -31,13 +31,13 @@ If a malicious actor gains access to your onboarding credential, they could use
3131

3232
## Protecting secrets in onboarding script
3333

34-
The onboarding script contains all the information needed to connect your server to Azure. This includes steps to download, install, and configure the Azure Connected Machine agent on your server. It also includes the onboarding credential used to non-interactively connect that server to Azure. It’s important to protect the onboarding credential so that it doesn’t end up in the wrong hands or accidentally captured in logs.
34+
The onboarding script contains all the information needed to connect your server to Azure. This includes steps to download, install, and configure the Azure Connected Machine agent on your server. It also includes the onboarding credential used to non-interactively connect that server to Azure. It’s important to protect the onboarding credential so it isn't accidentally captured in logs and end up in the wrong hands.
3535

36-
For production deployments, it’s common to orchestrate the onboarding script using an automation tool such as Microsoft Configuration Manager, Red Hat Ansible, or Group Policy. Check with your automation tool to see if it has a way to protect secrets used in the installation script. If it doesn’t, consider moving the onboarding script parameters to a dedicated configuration file. This will prevent secrets from being parsed and potentially logged directly on the command line. The Group Policy onboarding guidance includes extra steps to encrypt the configuration file so that only computer accounts can decrypt it, not users or others outside your organization, providing more protection.
36+
For production deployments, it’s common to orchestrate the onboarding script using an automation tool such as Microsoft Configuration Manager, Red Hat Ansible, or Group Policy. Check with your automation tool to see if it has a way to protect secrets used in the installation script. If it doesn’t, consider moving the onboarding script parameters to a dedicated configuration file. This prevents secrets from being parsed and potentially logged directly on the command line. The [Group Policy onboarding guidance](onboard-group-policy-powershell.md) includes extra steps to encrypt the configuration file so that only computer accounts can decrypt it, not users or others outside your organization.
3737

3838
If your automation tool copies the configuration file to the server, make sure it also cleans up the file after it's done so the secrets don’t persist longer than necessary.
3939

40-
Additionally, as with all Azure resources, tags for Azure Arc-enabled servers are stored as plain text. Do not put sensitive information in tags.
40+
Additionally, as with all Azure resources, tags for Azure Arc-enabled servers are stored as plain text. Don't put sensitive information in tags.
4141

4242
## Using disk encryption
4343

articles/azure-arc/servers/security-updates.md

Lines changed: 5 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -11,11 +11,11 @@ This article describes the update process for the Azure Connected Machine agent
1111

1212
## Agent updates
1313

14-
A new version of the Azure Connected Machine agent is typically released every month. There isn’t an exact schedule of when the updates are available, but you should check for and apply updates on a monthly basis. The documentation contains [a list of all the new releases](/azure/azure-arc/servers/agent-release-notes) including what specific changes are included in them. Most updates include security, performance. and quality fixes. Some also include new features and functionality. In the event a hotfix is required to address an issue with a release, it's released as a new agent version and available via the same means as a regular agent release.
14+
A new version of the Azure Connected Machine agent is typically released every month. There isn’t an exact schedule of when the updates are available, but you should check for and apply updates on a monthly basis. Refer to the [list of all the new releases](/azure/azure-arc/servers/agent-release-notes), including what specific changes are included in them. Most updates include security, performance. and quality fixes. Some also include new features and functionality. When a hotfix is required to address an issue with a release, it's released as a new agent version and available via the same means as a regular agent release.
1515

16-
The Azure Connected Machine agent doesn't update itself. You must update it using your preferred update management tool. For Windows machines, updates are delivered through Microsoft Update. Standalone servers should opt-in to Microsoft Updates (receive updates for other Microsoft products). If your organization uses Windows Server Update Services to cache and approve updates locally, your WSUS admin needs to synchronize and approve updates for the Azure Connected Machine agent product.
16+
The Azure Connected Machine agent doesn't update itself. You must update it using your preferred update management tool. For Windows machines, updates are delivered through Microsoft Update. Standalone servers should opt-in to Microsoft Updates (using the *receive updates for other Microsoft products* option). If your organization uses Windows Server Update Services to cache and approve updates locally, your WSUS admin must synchronize and approve updates for the Azure Connected Machine agent product.
1717

18-
Linux updates are published to packages.microsoft.com. Your package management software (apt, yum, dnf, zypper, etc.) should show “azcmagent” updates alongside all your other system packages. Learn more about [upgrading Linux agents](/azure/azure-arc/servers/manage-agent?tabs=linux-apt).
18+
Linux updates are published to `packages.microsoft.com`. Your package management software (apt, yum, dnf, zypper, etc.) should show “azcmagent” updates alongside your other system packages. Learn more about [upgrading Linux agents](/azure/azure-arc/servers/manage-agent?tabs=linux-apt).
1919

2020
Microsoft recommends staying up to date with the latest agent version whenever possible. If your maintenance windows are less frequent, Microsoft supports all agent versions released within the last 12 months. However, since the agent updates include security fixes, you should update as frequently as possible.
2121

@@ -25,15 +25,13 @@ If you're looking for a patch management tool to orchestrate updates of the Azur
2525

2626
### Automatic extension updates
2727

28-
By default, every extension you deploy to an Azure Arc-enabled server has automatic extension upgrades enabled. If the extension publisher supports this feature, new versions of the extension will automatically be installed within 60 days of the new version becoming available. Automatic extension upgrades follow a safe deployment practice, meaning that only a small number of extensions are updated at a time. Rollouts continue slowly across regions and subscriptions until every extension is updated.
28+
By default, every extension you deploy to an Azure Arc-enabled server has automatic extension upgrades enabled. If the extension publisher supports this feature, new versions of the extension are automatically installed within 60 days of the new version becoming available. Automatic extension upgrades follow a safe deployment practice, meaning that only a small number of extensions are updated at a time. Rollouts continue slowly across regions and subscriptions until every extension is updated.
2929

30-
There are no granular controls over automatic extension upgrades. You'll always be upgraded to the most recent version of the extension and can’t choose when the upgrade happens. The extension manager has [built-in resource governance](/azure/azure-arc/servers/agent-overview) to ensure that an extension upgrade doesn't consume too much of the system’s CPU and interfere with your workloads during the upgrade.
30+
There are no granular controls over automatic extension upgrades. You'll always be upgraded to the most recent version of the extension and can’t choose when the upgrade happens. The extension manager has [built-in resource governance](/azure/azure-arc/servers/agent-overview) to ensure an extension upgrade doesn't consume too much of the system’s CPU and interfere with your workloads during the upgrade.
3131

3232
If you don't want to use automatic upgrades for extensions, you can disable them on a per-extension, per-server basis using the [Azure portal, CLI, or PowerShell](/azure/azure-arc/servers/manage-automatic-vm-extension-upgrade?tabs=azure-portal).
3333

3434
### Manual extension updates
3535

3636
For extensions that don’t support automatic upgrades or have automatic upgrades disabled, you can use the Azure portal, CLI, or PowerShell to upgrade extensions to the newest version. The CLI and PowerShell commands also support downgrading an extension, in case you need to revert to an earlier version.
3737

38-
39-

0 commit comments

Comments
 (0)