Skip to content

Commit 9bec0e5

Browse files
author
gitName
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into vscref
2 parents d5dd8a4 + 22aad42 commit 9bec0e5

File tree

39 files changed

+729
-710
lines changed

39 files changed

+729
-710
lines changed

articles/active-directory-b2c/force-password-reset.md

Lines changed: 4 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -2,14 +2,11 @@
22
title: Configure a force password reset flow in Azure AD B2C
33
titleSuffix: Azure AD B2C
44
description: Learn how to set up a forced password reset flow in Azure Active Directory B2C.
5-
65
author: kengaderdus
76
manager: CelesteDG
8-
97
ms.service: azure-active-directory
10-
118
ms.topic: how-to
12-
ms.date: 01/11/2024
9+
ms.date: 10/11/2024
1310
ms.author: kengaderdus
1411
ms.subservice: b2c
1512
ms.custom: b2c-support, has-azure-ad-ps-ref,azure-ad-ref-level-one-done
@@ -160,16 +157,13 @@ Connect-MgGraph -Scopes 'Domain.ReadWrite.All'
160157
$domainId = "contoso.com"
161158
$params = @{
162159
passwordValidityPeriodInDays = 90
163-
passwordNotificationWindowInDays = 15
164160
}
165161
166162
Update-MgDomain -DomainId $domainId -BodyParameter $params
167163
```
168164

169-
> [!NOTE]
170-
> `passwordValidityPeriodInDays` indicates the length of time in days that a password remains valid before it must be changed. `passwordNotificationWindowInDays` indicates the length of time in days before the password expiration date when users receive their first notification to indicate that their password is about to expire.
171-
172-
## Next steps
165+
- `passwordValidityPeriodInDays` is the length of time in days that a password remains valid before it must be changed.
173166

174-
Set up a [self-service password reset](add-password-reset-policy.md).
167+
## Related content
175168

169+
Set up a [self-service password reset](add-password-reset-policy.md).

articles/cost-management-billing/manage/avoid-unused-subscriptions.md

Lines changed: 7 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,19 +1,23 @@
11
---
22
title: Avoid unused subscriptions
3-
description: Learn how to avoid having an unused subscription that gets automatically deleted.
3+
description: Learn how to prevent unused subscriptions from getting automatically blocked or deleted due to inactivity.
44
author: bandersmsft
55
ms.reviewer: mijeffer
66
ms.service: cost-management-billing
77
ms.subservice: billing
8-
ms.topic: conceptual
9-
ms.date: 07/25/2024
8+
ms.topic: concept-article
9+
ms.date: 10/08/2024
1010
ms.author: banders
11+
# customer intent: As a billing administrator, I want to prevent my subscriptions from getting blocked or deleted.
1112
---
1213

1314
# Avoid unused subscriptions
1415

1516
Unused and abandoned subscriptions can increase potential security risks to your Azure account. To reduce this risk, Microsoft takes measures to secure, protect, and ultimately delete unused Azure subscriptions.
1617

18+
>[!NOTE]
19+
> This article only applies to Microsoft Online Service Program (MOSP) and Cloud Solution Provider (CSP) subscriptions.
20+
1721
## What is an unused subscription?
1822

1923
Unused subscriptions don’t have usage, activity, or open support requests in more than one year (12 months). When a subscription enters the unused state, you receive a notification from Microsoft stating that your unused subscriptions will get blocked in 30 days.

articles/firewall/firewall-copilot.md

Lines changed: 10 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ Microsoft Copilot for Security is a generative AI-powered security solution that
2424

2525
Azure Firewall is a cloud-native and intelligent network firewall security service that provides best of breed threat protection for your cloud workloads running in Azure. It's a fully stateful firewall as a service with built-in high availability and unrestricted cloud scalability.
2626

27-
The Azure Firewall integration helps analysts perform detailed investigations of the malicious traffic intercepted by the IDPS and/or threat intelligence features of their firewalls across their entire fleet using natural language questions in the Copilot for Security standalone experience.
27+
The Azure Firewall integration helps analysts perform detailed investigations of the malicious traffic intercepted by the IDPS feature of their firewalls across their entire fleet using natural language questions in the Copilot for Security standalone experience.
2828

2929
This article introduces you to Copilot and includes sample prompts that can help Azure Firewall users.
3030

@@ -51,17 +51,17 @@ For more information about writing effective Copilot for Security prompts, see [
5151
- [Azure Structured Firewall Logs](firewall-structured-logs.md#resource-specific-mode) – the Azure Firewalls to be used with Copilot for Security must be configured with resource specific structured logs for IDPS and these logs must be sent to a Log Analytics workspace.
5252
- [Role Based Access Control for Azure Firewall](https://techcommunity.microsoft.com/t5/azure-network-security-blog/role-based-access-control-for-azure-firewall/ba-p/2245598) – the users using the Azure Firewall plugin in Copilot for Security must have the appropriate Azure RBAC roles to access the Firewall and associated Log Analytics workspace(s).
5353
2. Go to [Microsoft Copilot for Security](https://go.microsoft.com/fwlink/?linkid=2247989) and sign in with your credentials.
54-
3. Ensure that the Azure Firewall plugin is turned on. In the prompt bar, select the **Sources** icon.
54+
1. In the prompt bar, select the **Sources** icon.
5555

56-
:::image type="content" source="media/firewall-copilot/copilot-prompts-bar-sources.png" alt-text="Screenshot of the prompt bar in Microsoft Copilot for Security with the Sources icon highlighted.":::
56+
:::image type="content" source="media/firewall-copilot/copilot-prompts-bar-sources.png" alt-text="Screenshot of the prompt bar in Microsoft Copilot for Security with the Sources icon highlighted.":::
5757

58-
59-
In the **Manage sources** pop-up window that appears, confirm that the **Azure Firewall** toggle is turned on, then close the window.
6058

61-
:::image type="content" source="media/firewall-copilot/azure-firewall-plugin.png" alt-text="Screenshot showing the Azure Firewall plugin.":::
59+
In the **Manage sources** pop-up window that appears, confirm that the **Azure Firewall** toggle is turned on, then close the window. No additional configuration is necessary, as long as structured logs are being sent to a Log Analytics workspace and you have the right RBAC permissions, Copilot will find the data it needs to answer your questions.
60+
61+
:::image type="content" source="media/firewall-copilot/azure-firewall-plugin.png" alt-text="Screenshot showing the Azure Firewall plugin.":::
6262

63-
> [!NOTE]
64-
> Some roles can turn the toggle on or off for plugins like Azure Firewall. For more information, see [Manage plugins in Microsoft Copilot for Security](/copilot/security/manage-plugins?tabs=securitycopilotplugin).
63+
> [!NOTE]
64+
> Some roles can turn the toggle on or off for plugins like Azure Firewall. For more information, see [Manage plugins in Microsoft Copilot for Security](/copilot/security/manage-plugins?tabs=securitycopilotplugin).
6565
6666

6767
4. Enter your prompt in the prompt bar.
@@ -105,9 +105,7 @@ Get **additional details** to enrich the threat information/profile of an IDPS s
105105
- I see that the third signature ID is associated with CVE _\<CVE number\>_, tell me more about this CVE.
106106

107107
> [!NOTE]
108-
>The Microsoft Defender Threat Intelligence plugin is another source that Copilot for Security may use to provide threat intelligence for IDPS signatures.
109-
110-
108+
> The Microsoft Threat Intelligence plugin is another source that Copilot for Security may use to provide threat intelligence for IDPS signatures.
111109
### Look for a given IDPS signature across your tenant, subscription, or resource group
112110

113111
Perform a **fleet-wide search** (over any scope) for a threat across all your Firewalls instead of searching for the threat manually.
@@ -148,4 +146,4 @@ When you interact with Copilot for Security to get Azure Firewall data, Copilot
148146

149147
## Related content
150148

151-
- [What is Microsoft Copilot for Security?](/copilot/security/microsoft-security-copilot)
149+
- [What is Microsoft Copilot for Security?](/copilot/security/microsoft-security-copilot)
247 Bytes
Loading
760 Bytes
Loading

articles/iot-operations/manage-mqtt-broker/howto-configure-brokerlistener.md

Lines changed: 54 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.subservice: azure-mqtt-broker
77
ms.topic: how-to
88
ms.custom:
99
- ignite-2023
10-
ms.date: 08/29/2024
10+
ms.date: 10/08/2024
1111

1212
#CustomerIntent: As an operator, I want understand options to secure MQTT communications for my IoT Operations solution.
1313
---
@@ -38,7 +38,24 @@ For a list of the available settings, see the [Broker Listener](/rest/api/iotope
3838

3939
When you deploy Azure IoT Operations Preview, the deployment also creates a *BrokerListener* resource named `listener` in the `azure-iot-operations` namespace. This listener is linked to the default Broker resource named `broker` that's also created during deployment. The default listener exposes the broker on port 18883 with TLS and SAT authentication enabled. The TLS certificate is [automatically managed](howto-configure-tls-auto.md) by cert-manager. Authorization is disabled by default.
4040

41-
To inspect the listener, run:
41+
To view or edit the listener:
42+
43+
# [Portal](#tab/portal)
44+
45+
1. In the Azure portal, navigate to your IoT Operations instance.
46+
1. Under **Azure IoT Operations resources**, select **MQTT Broker**.
47+
48+
:::image type="content" source="media/howto-configure-brokerlistener/configure-broker-listener.png" alt-text="Screenshot using Azure portal to view Azure IoT Operations MQTT configuration.":::
49+
50+
1. From the broker listener list, select the **default** listener.
51+
52+
:::image type="content" source="media/howto-configure-brokerlistener/default-broker-listener.png" alt-text="Screenshot using Azure portal to view or edit the default broker listener.":::
53+
54+
1. Review the listener settings and make any changes as needed.
55+
56+
# [Kubernetes](#tab/kubernetes)
57+
58+
To view the default *BrokerListener* resource, use the following command:
4259

4360
```bash
4461
kubectl get brokerlistener listener -n azure-iot-operations -o yaml
@@ -71,33 +88,59 @@ spec:
7188
7289
To learn more about the default BrokerAuthentication resource linked to this listener, see [Default BrokerAuthentication resource](howto-configure-authentication.md#default-brokerauthentication-resource).
7390
74-
### Update the default BrokerListener
91+
### Update the default broker listener
7592
7693
The default *BrokerListener* uses the service type *ClusterIp*. You can have only one listener per service type. If you want to add more ports to service type *ClusterIp*, you can update the default listener to add more ports. For example, you could add a new port 1883 with no TLS and authentication off with the following kubectl patch command:
7794
7895
```bash
7996
kubectl patch brokerlistener listener -n azure-iot-operations --type='json' -p='[{"op": "add", "path": "/spec/ports/", "value": {"port": 1883, "protocol": "Mqtt"}}]'
8097
```
8198
82-
## Create new BrokerListeners
99+
---
100+
101+
## Create new broker listeners
83102
84-
This example shows how to create a new *BrokerListener* resource for a *Broker* resource named *my-broker*. The *BrokerListener* resource defines a two ports that accept MQTT connections from clients.
103+
This example shows how to create a new *BrokerListener* resource named *loadbalancer-listener* for a *Broker* resource. The *BrokerListener* resource defines a two ports that accept MQTT connections from clients.
85104
86105
- The first port listens on port 1883 with no TLS and authentication off. Clients can connect to the broker without encryption or authentication.
87106
- The second port listens on port 18883 with TLS and authentication enabled. Only authenticated clients can connect to the broker with TLS encryption. TLS is set to `automatic`, which means that the listener uses cert-manager to get and renew its server certificate.
88107

108+
# [Portal](#tab/portal)
109+
110+
1. In the Azure portal, navigate to your IoT Operations instance.
111+
1. Under **Azure IoT Operations resources**, select **MQTT Broker**.
112+
1. Select **MQTT broker listener for LoadBalancer** > **Create**. You can only create one listener per service type. If you already have a listener of the same service type, you can add more ports to the existing listener.
113+
114+
:::image type="content" source="media/howto-configure-brokerlistener/create-loadbalancer.png" alt-text="Screenshot using Azure portal to create MQTT broker for load balancer listener.":::
115+
116+
Enter the following settings:
117+
118+
| Setting | Description |
119+
| -------------- | --------------------------------------------------------------------------------------------- |
120+
| Name | Name of the BrokerListener resource. |
121+
| Service name | Name of the Kubernetes service associated with the BrokerListener. |
122+
| Service type | Type of broker service, such as *LoadBalancer*, *NodePort*, or *ClusterIP*. |
123+
| Port | Port number on which the BrokerListener listens for MQTT connections. |
124+
| Authentication | The [authentication resource reference](howto-configure-authentication.md). |
125+
| Authorization | The [authorization resource reference](howto-configure-authorization.md). |
126+
| TLS | Indicates whether TLS is enabled for secure communication. Can be set to [automatic](howto-configure-tls-auto.md) or [manual](howto-configure-tls-manual.md). |
127+
128+
1. Select **Create listener**.
129+
130+
# [Kubernetes](#tab/kubernetes)
131+
89132
To create these *BrokerListener* resources, apply this YAML manifest to your Kubernetes cluster:
90133

91134
```yaml
92135
apiVersion: mqttbroker.iotoperations.azure.com/v1beta1
93136
kind: BrokerListener
94137
metadata:
95-
name: my-test-listener
138+
name: loadbalancer-listener
96139
namespace: azure-iot-operations
97140
spec:
98141
brokerRef: broker
99142
serviceType: LoadBalancer
100-
serviceName: my-new-listener
143+
serviceName: aio-broker-loadbalancer
101144
ports:
102145
- port: 1883
103146
protocol: Mqtt
@@ -113,6 +156,10 @@ spec:
113156
group: cert-manager.io
114157
```
115158

159+
For more information about authentication, see [Configure MQTT broker authentication](howto-configure-authentication.md). For more information about authorization, see [Configure MQTT broker authorization](howto-configure-authorization.md). For more information about TLS, see [Configure TLS with automatic certificate management to secure MQTT communication in MQTT broker](howto-configure-tls-auto.md) or [Configure TLS with manual certificate management to secure MQTT communication in MQTT broker](howto-configure-tls-manual.md).
160+
161+
---
162+
116163
## Related content
117164

118165
- [Configure MQTT broker authorization](howto-configure-authorization.md)
108 KB
Loading
44.2 KB
Loading
41.8 KB
Loading

articles/network-watcher/.openpublishing.redirection.network-watcher.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,10 @@
11
{
22
"redirections": [
3+
{
4+
"source_path_from_root": "/articles/network-watcher/connection-monitor-virtual-machine-scale-set.md",
5+
"redirect_url": "/previous-versions/azure/network-watcher/connection-monitor-virtual-machine-scale-set",
6+
"redirect_document_id": false
7+
},
38
{
49
"source_path_from_root": "/articles/network-watcher/view-network-topology.md",
510
"redirect_url": "/azure/network-watcher/network-insights-topology",

0 commit comments

Comments
 (0)