You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
> `passwordValidityPeriodInDays` indicates the length of time in days that a password remains valid before it must be changed. `passwordNotificationWindowInDays` indicates the length of time in days before the password expiration date when users receive their first notification to indicate that their password is about to expire.
171
-
172
-
## Next steps
165
+
-`passwordValidityPeriodInDays` is the length of time in days that a password remains valid before it must be changed.
173
166
174
-
Set up a [self-service password reset](add-password-reset-policy.md).
167
+
## Related content
175
168
169
+
Set up a [self-service password reset](add-password-reset-policy.md).
Copy file name to clipboardExpand all lines: articles/cost-management-billing/manage/avoid-unused-subscriptions.md
+7-3Lines changed: 7 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,19 +1,23 @@
1
1
---
2
2
title: Avoid unused subscriptions
3
-
description: Learn how to avoid having an unused subscription that gets automatically deleted.
3
+
description: Learn how to prevent unused subscriptions from getting automatically blocked or deleted due to inactivity.
4
4
author: bandersmsft
5
5
ms.reviewer: mijeffer
6
6
ms.service: cost-management-billing
7
7
ms.subservice: billing
8
-
ms.topic: conceptual
9
-
ms.date: 07/25/2024
8
+
ms.topic: concept-article
9
+
ms.date: 10/08/2024
10
10
ms.author: banders
11
+
# customer intent: As a billing administrator, I want to prevent my subscriptions from getting blocked or deleted.
11
12
---
12
13
13
14
# Avoid unused subscriptions
14
15
15
16
Unused and abandoned subscriptions can increase potential security risks to your Azure account. To reduce this risk, Microsoft takes measures to secure, protect, and ultimately delete unused Azure subscriptions.
16
17
18
+
>[!NOTE]
19
+
> This article only applies to Microsoft Online Service Program (MOSP) and Cloud Solution Provider (CSP) subscriptions.
20
+
17
21
## What is an unused subscription?
18
22
19
23
Unused subscriptions don’t have usage, activity, or open support requests in more than one year (12 months). When a subscription enters the unused state, you receive a notification from Microsoft stating that your unused subscriptions will get blocked in 30 days.
Copy file name to clipboardExpand all lines: articles/firewall/firewall-copilot.md
+10-12Lines changed: 10 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -24,7 +24,7 @@ Microsoft Copilot for Security is a generative AI-powered security solution that
24
24
25
25
Azure Firewall is a cloud-native and intelligent network firewall security service that provides best of breed threat protection for your cloud workloads running in Azure. It's a fully stateful firewall as a service with built-in high availability and unrestricted cloud scalability.
26
26
27
-
The Azure Firewall integration helps analysts perform detailed investigations of the malicious traffic intercepted by the IDPS and/or threat intelligence features of their firewalls across their entire fleet using natural language questions in the Copilot for Security standalone experience.
27
+
The Azure Firewall integration helps analysts perform detailed investigations of the malicious traffic intercepted by the IDPS feature of their firewalls across their entire fleet using natural language questions in the Copilot for Security standalone experience.
28
28
29
29
This article introduces you to Copilot and includes sample prompts that can help Azure Firewall users.
30
30
@@ -51,17 +51,17 @@ For more information about writing effective Copilot for Security prompts, see [
51
51
-[Azure Structured Firewall Logs](firewall-structured-logs.md#resource-specific-mode) – the Azure Firewalls to be used with Copilot for Security must be configured with resource specific structured logs for IDPS and these logs must be sent to a Log Analytics workspace.
52
52
-[Role Based Access Control for Azure Firewall](https://techcommunity.microsoft.com/t5/azure-network-security-blog/role-based-access-control-for-azure-firewall/ba-p/2245598) – the users using the Azure Firewall plugin in Copilot for Security must have the appropriate Azure RBAC roles to access the Firewall and associated Log Analytics workspace(s).
53
53
2. Go to [Microsoft Copilot for Security](https://go.microsoft.com/fwlink/?linkid=2247989) and sign in with your credentials.
54
-
3. Ensure that the Azure Firewall plugin is turned on. In the prompt bar, select the **Sources** icon.
54
+
1. In the prompt bar, select the **Sources** icon.
55
55
56
-
:::image type="content" source="media/firewall-copilot/copilot-prompts-bar-sources.png" alt-text="Screenshot of the prompt bar in Microsoft Copilot for Security with the Sources icon highlighted.":::
56
+
:::image type="content" source="media/firewall-copilot/copilot-prompts-bar-sources.png" alt-text="Screenshot of the prompt bar in Microsoft Copilot for Security with the Sources icon highlighted.":::
57
57
58
-
59
-
In the **Manage sources** pop-up window that appears, confirm that the **Azure Firewall** toggle is turned on, then close the window.
60
58
61
-
:::image type="content" source="media/firewall-copilot/azure-firewall-plugin.png" alt-text="Screenshot showing the Azure Firewall plugin.":::
59
+
In the **Manage sources** pop-up window that appears, confirm that the **Azure Firewall** toggle is turned on, then close the window. No additional configuration is necessary, as long as structured logs are being sent to a Log Analytics workspace and you have the right RBAC permissions, Copilot will find the data it needs to answer your questions.
60
+
61
+
:::image type="content" source="media/firewall-copilot/azure-firewall-plugin.png" alt-text="Screenshot showing the Azure Firewall plugin.":::
62
62
63
-
> [!NOTE]
64
-
> Some roles can turn the toggle on or off for plugins like Azure Firewall. For more information, see [Manage plugins in Microsoft Copilot for Security](/copilot/security/manage-plugins?tabs=securitycopilotplugin).
63
+
> [!NOTE]
64
+
> Some roles can turn the toggle on or off for plugins like Azure Firewall. For more information, see [Manage plugins in Microsoft Copilot for Security](/copilot/security/manage-plugins?tabs=securitycopilotplugin).
65
65
66
66
67
67
4. Enter your prompt in the prompt bar.
@@ -105,9 +105,7 @@ Get **additional details** to enrich the threat information/profile of an IDPS s
105
105
- I see that the third signature ID is associated with CVE _\<CVE number\>_, tell me more about this CVE.
106
106
107
107
> [!NOTE]
108
-
>The Microsoft Defender Threat Intelligence plugin is another source that Copilot for Security may use to provide threat intelligence for IDPS signatures.
109
-
110
-
108
+
> The Microsoft Threat Intelligence plugin is another source that Copilot for Security may use to provide threat intelligence for IDPS signatures.
111
109
### Look for a given IDPS signature across your tenant, subscription, or resource group
112
110
113
111
Perform a **fleet-wide search** (over any scope) for a threat across all your Firewalls instead of searching for the threat manually.
@@ -148,4 +146,4 @@ When you interact with Copilot for Security to get Azure Firewall data, Copilot
148
146
149
147
## Related content
150
148
151
-
-[What is Microsoft Copilot for Security?](/copilot/security/microsoft-security-copilot)
149
+
-[What is Microsoft Copilot for Security?](/copilot/security/microsoft-security-copilot)
Copy file name to clipboardExpand all lines: articles/iot-operations/manage-mqtt-broker/howto-configure-brokerlistener.md
+54-7Lines changed: 54 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,7 +7,7 @@ ms.subservice: azure-mqtt-broker
7
7
ms.topic: how-to
8
8
ms.custom:
9
9
- ignite-2023
10
-
ms.date: 08/29/2024
10
+
ms.date: 10/08/2024
11
11
12
12
#CustomerIntent: As an operator, I want understand options to secure MQTT communications for my IoT Operations solution.
13
13
---
@@ -38,7 +38,24 @@ For a list of the available settings, see the [Broker Listener](/rest/api/iotope
38
38
39
39
When you deploy Azure IoT Operations Preview, the deployment also creates a *BrokerListener* resource named `listener` in the `azure-iot-operations` namespace. This listener is linked to the default Broker resource named `broker` that's also created during deployment. The default listener exposes the broker on port 18883 with TLS and SAT authentication enabled. The TLS certificate is [automatically managed](howto-configure-tls-auto.md) by cert-manager. Authorization is disabled by default.
40
40
41
-
To inspect the listener, run:
41
+
To view or edit the listener:
42
+
43
+
# [Portal](#tab/portal)
44
+
45
+
1. In the Azure portal, navigate to your IoT Operations instance.
46
+
1. Under **Azure IoT Operations resources**, select **MQTT Broker**.
47
+
48
+
:::image type="content" source="media/howto-configure-brokerlistener/configure-broker-listener.png" alt-text="Screenshot using Azure portal to view Azure IoT Operations MQTT configuration.":::
49
+
50
+
1. From the broker listener list, select the **default** listener.
51
+
52
+
:::image type="content" source="media/howto-configure-brokerlistener/default-broker-listener.png" alt-text="Screenshot using Azure portal to view or edit the default broker listener.":::
53
+
54
+
1. Review the listener settings and make any changes as needed.
55
+
56
+
# [Kubernetes](#tab/kubernetes)
57
+
58
+
To view the default *BrokerListener* resource, use the following command:
42
59
43
60
```bash
44
61
kubectl get brokerlistener listener -n azure-iot-operations -o yaml
@@ -71,33 +88,59 @@ spec:
71
88
72
89
To learn more about the default BrokerAuthentication resource linked to this listener, see [Default BrokerAuthentication resource](howto-configure-authentication.md#default-brokerauthentication-resource).
73
90
74
-
### Update the default BrokerListener
91
+
### Update the default broker listener
75
92
76
93
The default *BrokerListener* uses the service type *ClusterIp*. You can have only one listener per service type. If you want to add more ports to service type *ClusterIp*, you can update the default listener to add more ports. For example, you could add a new port 1883 with no TLS and authentication off with the following kubectl patch command:
This example shows how to create a new *BrokerListener* resource for a *Broker* resource named *my-broker*. The *BrokerListener* resource defines a two ports that accept MQTT connections from clients.
103
+
This example shows how to create a new *BrokerListener* resource named *loadbalancer-listener* for a *Broker* resource. The *BrokerListener* resource defines a two ports that accept MQTT connections from clients.
85
104
86
105
- The first port listens on port 1883 with no TLS and authentication off. Clients can connect to the broker without encryption or authentication.
87
106
- The second port listens on port 18883 with TLS and authentication enabled. Only authenticated clients can connect to the broker with TLS encryption. TLS is set to `automatic`, which means that the listener uses cert-manager to get and renew its server certificate.
88
107
108
+
# [Portal](#tab/portal)
109
+
110
+
1. In the Azure portal, navigate to your IoT Operations instance.
111
+
1. Under **Azure IoT Operations resources**, select **MQTT Broker**.
112
+
1. Select **MQTT broker listener for LoadBalancer** > **Create**. You can only create one listener per service type. If you already have a listener of the same service type, you can add more ports to the existing listener.
113
+
114
+
:::image type="content" source="media/howto-configure-brokerlistener/create-loadbalancer.png" alt-text="Screenshot using Azure portal to create MQTT broker for load balancer listener.":::
| Service name | Name of the Kubernetes service associated with the BrokerListener. |
122
+
| Service type | Type of broker service, such as *LoadBalancer*, *NodePort*, or *ClusterIP*. |
123
+
| Port | Port number on which the BrokerListener listens for MQTT connections. |
124
+
| Authentication | The [authentication resource reference](howto-configure-authentication.md). |
125
+
| Authorization | The [authorization resource reference](howto-configure-authorization.md). |
126
+
| TLS | Indicates whether TLS is enabled for secure communication. Can be set to [automatic](howto-configure-tls-auto.md) or [manual](howto-configure-tls-manual.md). |
127
+
128
+
1. Select **Create listener**.
129
+
130
+
# [Kubernetes](#tab/kubernetes)
131
+
89
132
To create these *BrokerListener* resources, apply this YAML manifest to your Kubernetes cluster:
For more information about authentication, see [Configure MQTT broker authentication](howto-configure-authentication.md). For more information about authorization, see [Configure MQTT broker authorization](howto-configure-authorization.md). For more information about TLS, see [Configure TLS with automatic certificate management to secure MQTT communication in MQTT broker](howto-configure-tls-auto.md) or [Configure TLS with manual certificate management to secure MQTT communication in MQTT broker](howto-configure-tls-manual.md).
0 commit comments