Skip to content

Commit 9ba93e7

Browse files
authored
Merge pull request #263509 from MicrosoftDocs/main
Merge main to live, 4 AM
2 parents 39d0f45 + 64a6335 commit 9ba93e7

21 files changed

+93
-72
lines changed

articles/azure-monitor/app/convert-classic-resource.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -129,7 +129,7 @@ Use the following script to identify your Application Insights resources by inge
129129

130130
#### Example
131131

132-
```azurecli
132+
```powershell
133133
Get-AzApplicationInsights -SubscriptionId 'Your Subscription ID' | Format-Table -Property Name, IngestionMode, Id, @{label='Type';expression={
134134
if ([string]::IsNullOrEmpty($_.IngestionMode)) {
135135
'Unknown'

articles/defender-for-cloud/recommendations-reference-aws.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ impact on your secure score.
2727

2828
### Data plane recommendations
2929

30-
All the data plane recommendations listed [here](kubernetes-workload-protections.md#view-and-configure-the-bundle-of-recommendations) are supported under AWS after [enabling Azure Policy for Kubernetes](kubernetes-workload-protections.md#enable-kubernetes-data-plane-hardening).
30+
All the data plane recommendations listed [here](kubernetes-workload-protections.md#view-and-configure-the-bundle-of-recommendations) are supported under AWS after [enabling Azure Policy for Kubernetes](kubernetes-workload-protections.md#enable-kubernetes-data-plane-hardening).
3131

3232
## <a name='recs-aws-data'></a> AWS Data recommendations
3333

articles/defender-for-cloud/sql-information-protection-policy.md

Lines changed: 19 additions & 30 deletions
Original file line numberDiff line numberDiff line change
@@ -13,28 +13,23 @@ SQL information protection's [data discovery and classification mechanism](/azur
1313

1414
The classification mechanism is based on the following two elements:
1515

16-
- **Labels** – The main classification attributes, used to define the *sensitivity level of the data* stored in the column.
16+
- **Labels** – The main classification attributes, used to define the *sensitivity level of the data* stored in the column.
1717
- **Information Types** – Provides additional granularity into the *type of data* stored in the column.
1818

19-
The information protection policy options within Defender for Cloud provide a predefined set of labels and information types which serve as the defaults for the classification engine. You can customize the policy, according to your organization's needs, as described below.
19+
The information protection policy options within Defender for Cloud provide a predefined set of labels and information types that serve as the defaults for the classification engine. You can customize the policy, according to your organization's needs, as described below.
2020

2121
:::image type="content" source="./media/sql-information-protection-policy/sql-information-protection-policy-page.png" alt-text="The page showing your SQL information protection policy.":::
22-
23-
24-
2522

2623
## How do I access the SQL information protection policy?
2724

2825
There are three ways to access the information protection policy:
2926

3027
- **(Recommended)** From the **Environment settings** page of Defender for Cloud
31-
- From the security recommendation "Sensitive data in your SQL databases should be classified"
28+
- From the security recommendation *Sensitive data in your SQL databases should be classified*
3229
- From the Azure SQL DB data discovery page
3330

3431
Each of these is shown in the relevant tab below.
3532

36-
37-
3833
### [**From Defender for Cloud's settings**](#tab/sqlip-tenant)
3934

4035
<a name="sqlip-tenant"></a>
@@ -48,15 +43,13 @@ From Defender for Cloud's **Environment settings** page, select **SQL informatio
4843
4944
:::image type="content" source="./media/sql-information-protection-policy/environment-settings-link-to-information-protection.png" alt-text="Accessing the SQL Information Protection policy from the environment settings page of Microsoft Defender for Cloud.":::
5045

51-
52-
5346
### [**From Defender for Cloud's recommendation**](#tab/sqlip-db)
5447

5548
<a name="sqlip-db"></a>
5649

5750
### Access the policy from the Defender for Cloud recommendation
5851

59-
Use Defender for Cloud's recommendation, "Sensitive data in your SQL databases should be classified", to view the data discovery and classification page for your database. There, you'll also see the columns discovered to contain information that we recommend you classify.
52+
Use Defender for Cloud's recommendation, *Sensitive data in your SQL databases should be classified*, to view the data discovery and classification page for your database. There, you'll also see the columns discovered to contain information that we recommend you classify.
6053

6154
1. From Defender for Cloud's **Recommendations** page, search for the recommendation **Sensitive data in your SQL databases should be classified**.
6255

@@ -68,8 +61,6 @@ Use Defender for Cloud's recommendation, "Sensitive data in your SQL databases s
6861

6962
:::image type="content" source="./media/sql-information-protection-policy/access-policy-from-security-center-recommendation.png" alt-text="Opening the SQL information protection policy from the relevant recommendation in Microsoft Defender for Cloud's":::
7063

71-
72-
7364
### [**From Azure SQL**](#tab/sqlip-azuresql)
7465

7566
<a name="sqlip-azuresql"></a>
@@ -86,7 +77,7 @@ Use Defender for Cloud's recommendation, "Sensitive data in your SQL databases s
8677

8778
:::image type="content" source="./media/sql-information-protection-policy/access-policy-from-azure-sql.png" alt-text="Opening the SQL information protection policy from Azure SQL.":::
8879

89-
---
80+
---
9081

9182
## Customize your information types
9283

@@ -97,52 +88,50 @@ To manage and customize information types:
9788
:::image type="content" source="./media/sql-information-protection-policy/manage-types.png" alt-text="Manage information types for your information protection policy.":::
9889

9990
1. To add a new type, select **Create information type**. You can configure a name, description, and search pattern strings for the information type. Search pattern strings can optionally use keywords with wildcard characters (using the character '%'), which the automated discovery engine uses to identify sensitive data in your databases, based on the columns' metadata.
100-
91+
10192
:::image type="content" source="./media/sql-information-protection-policy/configure-new-type.png" alt-text="Configure a new information type for your information protection policy.":::
10293

103-
1. You can also modify the built-in types by adding additional search pattern strings, disabling some of the existing strings, or by changing the description.
94+
1. You can also modify the built-in types by adding additional search pattern strings, disabling some of the existing strings, or by changing the description.
10495

10596
> [!TIP]
106-
> You can't delete built-in types or change their names.
97+
> You can't delete built-in types or change their names.
10798
108-
1. **Information types** are listed in order of ascending discovery ranking, meaning that the types higher in the list will attempt to match first. To change the ranking between information types, drag the types to the right spot in the table, or use the **Move up** and **Move down** buttons to change the order.
99+
1. **Information types** are listed in order of ascending discovery ranking, meaning that the types higher in the list attempt to match first. To change the ranking between information types, drag the types to the right spot in the table, or use the **Move up** and **Move down** buttons to change the order.
109100

110-
1. Select **OK** when you are done.
101+
1. Select **OK** when you're done.
111102

112-
1. After you completed managing your information types, be sure to associate the relevant types with the relevant labels, by clicking **Configure** for a particular label, and adding or deleting information types as appropriate.
103+
1. After you completed managing your information types, be sure to associate the relevant types with the relevant labels, by selecting **Configure** for a particular label, and adding or deleting information types as appropriate.
113104

114105
1. To apply your changes, select **Save** in the main **Labels** page.
115-
116106

117107
## Exporting and importing a policy
118108

119-
You can download a JSON file with your defined labels and information types, edit the file in the editor of your choice, and then import the updated file.
109+
You can download a JSON file with your defined labels and information types, edit the file in the editor of your choice, and then import the updated file.
120110

121111
:::image type="content" source="./media/sql-information-protection-policy/export-import.png" alt-text="Exporting and importing your information protection policy.":::
122112

123113
> [!NOTE]
124-
> You'll need tenant level permissions to import a policy file.
125-
114+
> You'll need tenant level permissions to import a policy file.
126115
127116
## Permissions
128117

129-
To customize the information protection policy for your Azure tenant, you'll need the following actions on the tenant's root management group:
130-
- Microsoft.Security/informationProtectionPolicies/read
131-
- Microsoft.Security/informationProtectionPolicies/write
118+
To customize the information protection policy for your Azure tenant, you need the following actions on the tenant's root management group:
119+
120+
- Microsoft.Security/informationProtectionPolicies/read
121+
- Microsoft.Security/informationProtectionPolicies/write
132122

133123
Learn more in [Grant and request tenant-wide visibility](tenant-wide-permissions-management.md).
134124

135125
## Manage SQL information protection using Azure PowerShell
136126

137127
- [Get-AzSqlInformationProtectionPolicy](/powershell/module/az.security/get-azsqlinformationprotectionpolicy): Retrieves the effective tenant SQL information protection policy.
138128
- [Set-AzSqlInformationProtectionPolicy](/powershell/module/az.security/set-azsqlinformationprotectionpolicy): Sets the effective tenant SQL information protection policy.
139-
140129

141130
## Next steps
142-
131+
143132
In this article, you learned about defining an information protection policy in Microsoft Defender for Cloud. To learn more about using SQL Information Protection to classify and protect sensitive data in your SQL databases, see [Azure SQL Database Data Discovery and Classification](/azure/azure-sql/database/data-discovery-and-classification-overview).
144133

145134
For more information on security policies and data security in Defender for Cloud, see the following articles:
146-
135+
147136
- [Setting security policies in Microsoft Defender for Cloud](tutorial-security-policy.md): Learn how to configure security policies for your Azure subscriptions and resource groups
148137
- [Microsoft Defender for Cloud data security](data-security.md): Learn how Defender for Cloud manages and safeguards data
38.4 KB
Loading
67.4 KB
Loading
38.4 KB
Loading
67.4 KB
Loading

articles/defender-for-iot/organizations/update-ot-software.md

Lines changed: 8 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -87,27 +87,31 @@ This procedure describes how to send a software version update to one or more OT
8787

8888
:::image type="content" source="media/update-ot-software/remote-update-step-1.png" alt-text="Screenshot of the Send package option." lightbox="media/update-ot-software/remote-update-step-1.png":::
8989

90-
1. In the **Send package** pane that appears, check to make sure that you're sending the software to the sensor you want to update. To jump to the release notes for the new version, select **Learn more** at the top of the pane.
90+
1. In the **Send package** pane that appears, under **Available versions**, select the software version from the list. If the version you need doesn't appear, select **Show more** to list all available versions.
91+
92+
To jump to the release notes for the new version, select **Learn more** at the top of the pane.
93+
94+
:::image type="content" source="media/update-ot-software/send-package-multiple-versions-400.png" alt-text="Screenshot of sensor update pane with option to choose sensor update version." lightbox="media/update-ot-software/send-package-multiple-versions.png" border="false":::
9195

9296
1. When you're ready, select **Send package**, and the software transfer to your sensor machine is started. You can see the transfer progress in the **Sensor version** column, with the percentage complete automatically updating in the progress bar, so you can see that the process has started and letting you track its progress until the transfer is complete. For example:
9397

9498
:::image type="content" source="media/update-ot-software/sensor-version-update-bar.png" alt-text="Screenshot of the update bar in the Sensor version column." lightbox="media/update-ot-software/sensor-version-update-bar.png":::
9599

96-
When the transfer is complete, the **Sensor version** column changes to :::image type="icon" source="media/update-ot-software/ready-to-update.png" border="false" ::: **Ready to update**.
100+
When the transfer is complete, the **Sensor version** column changes to :::image type="icon" source="media/update-ot-software/ready-to-update.png" border="true" ::: **Ready to update**.
97101

98102
Hover over the **Sensor version** value to see the source and target version for your update.
99103

100104
### Run your sensor update from the Azure portal
101105

102106
Run the sensor update only when you see the :::image type="icon" source="media/update-ot-software/ready-to-update.png" border="false"::: **Ready to update** icon in the **Sensor version** column.
103107

104-
1. Select one or more sensors to update, and then select **Sensor update** > **Remote update** > **Step 2: Update sensor** from the toolbar.
108+
1. Select one or more sensors to update, and then select **Sensor update** > **Remote update** > **Step 2: Update sensor** from the toolbar. The **Update sensor** pane opens in the right side of the screen.
105109

106110
For an individual sensor, the **Step 2: Update sensor** option is also available from the **...** options menu. For example:
107111

108112
:::image type="content" source="media/update-ot-software/remote-update-step-2.png" alt-text="Screenshot of the Update sensor option." lightbox="media/update-ot-software/remote-update-step-2.png":::
109113

110-
1. In the **Update sensor** pane that appears, verify your update details.
114+
1. In the **Update sensor** pane that appears, verify your update details.
111115

112116
When you're ready, select **Update now** > **Confirm update**. In the grid, the **Sensor version** value changes to :::image type="icon" source="media/update-ot-software/installing.png" border="false"::: **Installing**, and an update progress bar appears showing you the percentage complete. The bar automatically updates, so that you can track the progress until the installation is complete.
113117

articles/defender-for-iot/organizations/whats-new.md

Lines changed: 16 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -16,6 +16,22 @@ Features released earlier than nine months ago are described in the [What's new
1616
> Noted features listed below are in PREVIEW. The [Azure Preview Supplemental Terms](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) include other legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
1717
>
1818
19+
## January 2024
20+
21+
|Service area |Updates |
22+
|---------|---------|
23+
| **OT networks** | - [Sensor update in Azure portal now supports selecting a specific version](#sensor-update-in-azure-portal-now-supports-selecting-a-specific-version) <br> |
24+
25+
### Sensor update in Azure portal now supports selecting a specific version
26+
27+
When you update the sensor in the Azure portal, you can now choose to update to any of the supported, previous versions (versions other than the latest version). Previously, sensors onboarded to Microsoft Defender for IoT on the Azure portal were automatically updated to the latest version.
28+
29+
You might want to update your sensor to a specific version for various reasons, such as for testing purposes, or to align all sensors to the same version.
30+
31+
:::image type="content" source="media/whats-new/send-package-multiple-versions-400.png" alt-text="Screenshot of sensor update pane with option to choose sensor update version." border="false" lightbox="media/whats-new/send-package-multiple-versions.png" :::
32+
33+
For more information, see [Update Defender for IoT OT monitoring software](update-ot-software.md#send-the-software-update-to-your-ot-sensor).
34+
1935
## December 2023
2036

2137
|Service area |Updates |

articles/healthcare-apis/release-notes.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -22,10 +22,10 @@ This article provides details about the features and enhancements made to Azure
2222

2323
## January 2024
2424

25-
### FHIR Service
25+
### FHIR service
2626
**Storage size support in FHIR service beyond 4TB**
2727

28-
By default each FHIR instance is limited to storage capacity of 4TB. To provision a FHIR instance with storage capacity beyond 4TB, create support request with Issue type 'Service and Subscription limit (quotas)'.
28+
By default each FHIR instance is limited to storage capacity of 4TB. To provision a FHIR instance with storage capacity beyond 4TB, [create support request](https://portal.azure.com/#blade/Microsoft_Azure_Support/HelpAndSupportBlade/overview) with Issue type 'Service and Subscription limit (quotas)'.
2929
> [!NOTE]
3030
> Due to issue in billing metrics for storage. Customers opting for more than 4TB storage capacity will not be billed for storage till the issue is addressed.
3131

0 commit comments

Comments
 (0)