You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/recommendations-reference-aws.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -27,7 +27,7 @@ impact on your secure score.
27
27
28
28
### Data plane recommendations
29
29
30
-
All the data plane recommendations listed [here](kubernetes-workload-protections.md#view-and-configure-the-bundle-of-recommendations) are supported under AWS after [enabling Azure Policy for Kubernetes](kubernetes-workload-protections.md#enable-kubernetes-data-plane-hardening).
30
+
All the data plane recommendations listed [here](kubernetes-workload-protections.md#view-and-configure-the-bundle-of-recommendations) are supported under AWS after [enabling Azure Policy for Kubernetes](kubernetes-workload-protections.md#enable-kubernetes-data-plane-hardening).
31
31
32
32
## <aname='recs-aws-data'></a> AWS Data recommendations
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/sql-information-protection-policy.md
+19-30Lines changed: 19 additions & 30 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -13,28 +13,23 @@ SQL information protection's [data discovery and classification mechanism](/azur
13
13
14
14
The classification mechanism is based on the following two elements:
15
15
16
-
-**Labels** – The main classification attributes, used to define the *sensitivity level of the data* stored in the column.
16
+
-**Labels** – The main classification attributes, used to define the *sensitivity level of the data* stored in the column.
17
17
-**Information Types** – Provides additional granularity into the *type of data* stored in the column.
18
18
19
-
The information protection policy options within Defender for Cloud provide a predefined set of labels and information types which serve as the defaults for the classification engine. You can customize the policy, according to your organization's needs, as described below.
19
+
The information protection policy options within Defender for Cloud provide a predefined set of labels and information types that serve as the defaults for the classification engine. You can customize the policy, according to your organization's needs, as described below.
20
20
21
21
:::image type="content" source="./media/sql-information-protection-policy/sql-information-protection-policy-page.png" alt-text="The page showing your SQL information protection policy.":::
22
-
23
-
24
-
25
22
26
23
## How do I access the SQL information protection policy?
27
24
28
25
There are three ways to access the information protection policy:
29
26
30
27
-**(Recommended)** From the **Environment settings** page of Defender for Cloud
31
-
- From the security recommendation "Sensitive data in your SQL databases should be classified"
28
+
- From the security recommendation *Sensitive data in your SQL databases should be classified*
32
29
- From the Azure SQL DB data discovery page
33
30
34
31
Each of these is shown in the relevant tab below.
35
32
36
-
37
-
38
33
### [**From Defender for Cloud's settings**](#tab/sqlip-tenant)
39
34
40
35
<aname="sqlip-tenant"></a>
@@ -48,15 +43,13 @@ From Defender for Cloud's **Environment settings** page, select **SQL informatio
48
43
49
44
:::image type="content" source="./media/sql-information-protection-policy/environment-settings-link-to-information-protection.png" alt-text="Accessing the SQL Information Protection policy from the environment settings page of Microsoft Defender for Cloud.":::
50
45
51
-
52
-
53
46
### [**From Defender for Cloud's recommendation**](#tab/sqlip-db)
54
47
55
48
<aname="sqlip-db"></a>
56
49
57
50
### Access the policy from the Defender for Cloud recommendation
58
51
59
-
Use Defender for Cloud's recommendation, "Sensitive data in your SQL databases should be classified", to view the data discovery and classification page for your database. There, you'll also see the columns discovered to contain information that we recommend you classify.
52
+
Use Defender for Cloud's recommendation, *Sensitive data in your SQL databases should be classified*, to view the data discovery and classification page for your database. There, you'll also see the columns discovered to contain information that we recommend you classify.
60
53
61
54
1. From Defender for Cloud's **Recommendations** page, search for the recommendation **Sensitive data in your SQL databases should be classified**.
62
55
@@ -68,8 +61,6 @@ Use Defender for Cloud's recommendation, "Sensitive data in your SQL databases s
68
61
69
62
:::image type="content" source="./media/sql-information-protection-policy/access-policy-from-security-center-recommendation.png" alt-text="Opening the SQL information protection policy from the relevant recommendation in Microsoft Defender for Cloud's":::
70
63
71
-
72
-
73
64
### [**From Azure SQL**](#tab/sqlip-azuresql)
74
65
75
66
<aname="sqlip-azuresql"></a>
@@ -86,7 +77,7 @@ Use Defender for Cloud's recommendation, "Sensitive data in your SQL databases s
86
77
87
78
:::image type="content" source="./media/sql-information-protection-policy/access-policy-from-azure-sql.png" alt-text="Opening the SQL information protection policy from Azure SQL.":::
88
79
89
-
---
80
+
---
90
81
91
82
## Customize your information types
92
83
@@ -97,52 +88,50 @@ To manage and customize information types:
97
88
:::image type="content" source="./media/sql-information-protection-policy/manage-types.png" alt-text="Manage information types for your information protection policy.":::
98
89
99
90
1. To add a new type, select **Create information type**. You can configure a name, description, and search pattern strings for the information type. Search pattern strings can optionally use keywords with wildcard characters (using the character '%'), which the automated discovery engine uses to identify sensitive data in your databases, based on the columns' metadata.
100
-
91
+
101
92
:::image type="content" source="./media/sql-information-protection-policy/configure-new-type.png" alt-text="Configure a new information type for your information protection policy.":::
102
93
103
-
1. You can also modify the built-in types by adding additional search pattern strings, disabling some of the existing strings, or by changing the description.
94
+
1. You can also modify the built-in types by adding additional search pattern strings, disabling some of the existing strings, or by changing the description.
104
95
105
96
> [!TIP]
106
-
> You can't delete built-in types or change their names.
97
+
> You can't delete built-in types or change their names.
107
98
108
-
1.**Information types** are listed in order of ascending discovery ranking, meaning that the types higher in the list will attempt to match first. To change the ranking between information types, drag the types to the right spot in the table, or use the **Move up** and **Move down** buttons to change the order.
99
+
1.**Information types** are listed in order of ascending discovery ranking, meaning that the types higher in the list attempt to match first. To change the ranking between information types, drag the types to the right spot in the table, or use the **Move up** and **Move down** buttons to change the order.
109
100
110
-
1. Select **OK** when you are done.
101
+
1. Select **OK** when you're done.
111
102
112
-
1. After you completed managing your information types, be sure to associate the relevant types with the relevant labels, by clicking**Configure** for a particular label, and adding or deleting information types as appropriate.
103
+
1. After you completed managing your information types, be sure to associate the relevant types with the relevant labels, by selecting**Configure** for a particular label, and adding or deleting information types as appropriate.
113
104
114
105
1. To apply your changes, select **Save** in the main **Labels** page.
115
-
116
106
117
107
## Exporting and importing a policy
118
108
119
-
You can download a JSON file with your defined labels and information types, edit the file in the editor of your choice, and then import the updated file.
109
+
You can download a JSON file with your defined labels and information types, edit the file in the editor of your choice, and then import the updated file.
120
110
121
111
:::image type="content" source="./media/sql-information-protection-policy/export-import.png" alt-text="Exporting and importing your information protection policy.":::
122
112
123
113
> [!NOTE]
124
-
> You'll need tenant level permissions to import a policy file.
125
-
114
+
> You'll need tenant level permissions to import a policy file.
126
115
127
116
## Permissions
128
117
129
-
To customize the information protection policy for your Azure tenant, you'll need the following actions on the tenant's root management group:
Learn more in [Grant and request tenant-wide visibility](tenant-wide-permissions-management.md).
134
124
135
125
## Manage SQL information protection using Azure PowerShell
136
126
137
127
-[Get-AzSqlInformationProtectionPolicy](/powershell/module/az.security/get-azsqlinformationprotectionpolicy): Retrieves the effective tenant SQL information protection policy.
138
128
-[Set-AzSqlInformationProtectionPolicy](/powershell/module/az.security/set-azsqlinformationprotectionpolicy): Sets the effective tenant SQL information protection policy.
139
-
140
129
141
130
## Next steps
142
-
131
+
143
132
In this article, you learned about defining an information protection policy in Microsoft Defender for Cloud. To learn more about using SQL Information Protection to classify and protect sensitive data in your SQL databases, see [Azure SQL Database Data Discovery and Classification](/azure/azure-sql/database/data-discovery-and-classification-overview).
144
133
145
134
For more information on security policies and data security in Defender for Cloud, see the following articles:
146
-
135
+
147
136
-[Setting security policies in Microsoft Defender for Cloud](tutorial-security-policy.md): Learn how to configure security policies for your Azure subscriptions and resource groups
148
137
-[Microsoft Defender for Cloud data security](data-security.md): Learn how Defender for Cloud manages and safeguards data
Copy file name to clipboardExpand all lines: articles/defender-for-iot/organizations/update-ot-software.md
+8-4Lines changed: 8 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -87,27 +87,31 @@ This procedure describes how to send a software version update to one or more OT
87
87
88
88
:::image type="content" source="media/update-ot-software/remote-update-step-1.png" alt-text="Screenshot of the Send package option." lightbox="media/update-ot-software/remote-update-step-1.png":::
89
89
90
-
1. In the **Send package** pane that appears, check to make sure that you're sending the software to the sensor you want to update. To jump to the release notes for the new version, select **Learn more** at the top of the pane.
90
+
1. In the **Send package** pane that appears, under **Available versions**, select the software version from the list. If the version you need doesn't appear, select **Show more** to list all available versions.
91
+
92
+
To jump to the release notes for the new version, select **Learn more** at the top of the pane.
93
+
94
+
:::image type="content" source="media/update-ot-software/send-package-multiple-versions-400.png" alt-text="Screenshot of sensor update pane with option to choose sensor update version." lightbox="media/update-ot-software/send-package-multiple-versions.png" border="false":::
91
95
92
96
1. When you're ready, select **Send package**, and the software transfer to your sensor machine is started. You can see the transfer progress in the **Sensor version** column, with the percentage complete automatically updating in the progress bar, so you can see that the process has started and letting you track its progress until the transfer is complete. For example:
93
97
94
98
:::image type="content" source="media/update-ot-software/sensor-version-update-bar.png" alt-text="Screenshot of the update bar in the Sensor version column." lightbox="media/update-ot-software/sensor-version-update-bar.png":::
95
99
96
-
When the transfer is complete, the **Sensor version** column changes to :::image type="icon" source="media/update-ot-software/ready-to-update.png" border="false" ::: **Ready to update**.
100
+
When the transfer is complete, the **Sensor version** column changes to :::image type="icon" source="media/update-ot-software/ready-to-update.png" border="true" ::: **Ready to update**.
97
101
98
102
Hover over the **Sensor version** value to see the source and target version for your update.
99
103
100
104
### Run your sensor update from the Azure portal
101
105
102
106
Run the sensor update only when you see the :::image type="icon" source="media/update-ot-software/ready-to-update.png" border="false"::: **Ready to update** icon in the **Sensor version** column.
103
107
104
-
1. Select one or more sensors to update, and then select **Sensor update** > **Remote update** > **Step 2: Update sensor** from the toolbar.
108
+
1. Select one or more sensors to update, and then select **Sensor update** > **Remote update** > **Step 2: Update sensor** from the toolbar. The **Update sensor** pane opens in the right side of the screen.
105
109
106
110
For an individual sensor, the **Step 2: Update sensor** option is also available from the **...** options menu. For example:
107
111
108
112
:::image type="content" source="media/update-ot-software/remote-update-step-2.png" alt-text="Screenshot of the Update sensor option." lightbox="media/update-ot-software/remote-update-step-2.png":::
109
113
110
-
1. In the **Update sensor** pane that appears, verify your update details.
114
+
1. In the **Update sensor** pane that appears, verify your update details.
111
115
112
116
When you're ready, select **Update now** > **Confirm update**. In the grid, the **Sensor version** value changes to :::image type="icon" source="media/update-ot-software/installing.png" border="false"::: **Installing**, and an update progress bar appears showing you the percentage complete. The bar automatically updates, so that you can track the progress until the installation is complete.
Copy file name to clipboardExpand all lines: articles/defender-for-iot/organizations/whats-new.md
+16Lines changed: 16 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -16,6 +16,22 @@ Features released earlier than nine months ago are described in the [What's new
16
16
> Noted features listed below are in PREVIEW. The [Azure Preview Supplemental Terms](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) include other legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
17
17
>
18
18
19
+
## January 2024
20
+
21
+
|Service area |Updates |
22
+
|---------|---------|
23
+
|**OT networks**| - [Sensor update in Azure portal now supports selecting a specific version](#sensor-update-in-azure-portal-now-supports-selecting-a-specific-version) <br> |
24
+
25
+
### Sensor update in Azure portal now supports selecting a specific version
26
+
27
+
When you update the sensor in the Azure portal, you can now choose to update to any of the supported, previous versions (versions other than the latest version). Previously, sensors onboarded to Microsoft Defender for IoT on the Azure portal were automatically updated to the latest version.
28
+
29
+
You might want to update your sensor to a specific version for various reasons, such as for testing purposes, or to align all sensors to the same version.
30
+
31
+
:::image type="content" source="media/whats-new/send-package-multiple-versions-400.png" alt-text="Screenshot of sensor update pane with option to choose sensor update version." border="false" lightbox="media/whats-new/send-package-multiple-versions.png" :::
32
+
33
+
For more information, see [Update Defender for IoT OT monitoring software](update-ot-software.md#send-the-software-update-to-your-ot-sensor).
Copy file name to clipboardExpand all lines: articles/healthcare-apis/release-notes.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -22,10 +22,10 @@ This article provides details about the features and enhancements made to Azure
22
22
23
23
## January 2024
24
24
25
-
### FHIR Service
25
+
### FHIR service
26
26
**Storage size support in FHIR service beyond 4TB**
27
27
28
-
By default each FHIR instance is limited to storage capacity of 4TB. To provision a FHIR instance with storage capacity beyond 4TB, create support request with Issue type 'Service and Subscription limit (quotas)'.
28
+
By default each FHIR instance is limited to storage capacity of 4TB. To provision a FHIR instance with storage capacity beyond 4TB, [create support request](https://portal.azure.com/#blade/Microsoft_Azure_Support/HelpAndSupportBlade/overview) with Issue type 'Service and Subscription limit (quotas)'.
29
29
> [!NOTE]
30
30
> Due to issue in billing metrics for storage. Customers opting for more than 4TB storage capacity will not be billed for storage till the issue is addressed.
0 commit comments