Skip to content

Commit a027cd5

Browse files
Merge pull request #303791 from MicrosoftDocs/main
Auto Publish – main to live - 2025-08-04 17:00 UTC
2 parents b1e8f54 + acafc3a commit a027cd5

File tree

10 files changed

+65
-41
lines changed

10 files changed

+65
-41
lines changed

articles/application-gateway/for-containers/web-application-firewall.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -64,12 +64,12 @@ The following functionality is not supported on an Azure Web Application Firewal
6464
6565
## Pricing
6666
67-
Azure Web Application Firewall is incrementally billed in addition to Application Gateway for Containers. Two metrics track Azure Web Application Firewall consumption:
67+
Azure Web Application Firewall is incrementally billed in addition to Application Gateway for Containers. Two meters track Azure Web Application Firewall consumption:
6868
69-
* `AGC WAF Hour`
70-
* `AGC 1M WAF Requests`
69+
* **Application Gateway for Containers WAF Hour**
70+
* **Application Gateway for Containers 1 million WAF Requests**
7171
72-
An `AGC WAF Hour` rate is incurred for the duration that a security policy references an Azure Web Application Firewall policy.
72+
An **Application Gateway for Containers WAF Hour** rate is incurred for the duration that a security policy references an Azure Web Application Firewall policy.
7373
7474
As Azure Web Application Firewall rules or bot protection processes each request, a consumption rate is billed per 1 million requests.
7575

articles/azure-app-configuration/concept-private-endpoint.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ Private endpoints availability varies by App Configuration tier:
2323
- **Free tier**: Not available
2424
- **Developer tier**: Up to 1 private endpoint
2525
- **Standard tier**: Up to 10 private endpoints
26-
- **Premium tier**: Up to 100 private endpoints
26+
- **Premium tier**: Up to 40 private endpoints
2727

2828
For more information about pricing, see [Azure App Configuration pricing](https://azure.microsoft.com/pricing/details/app-configuration/).
2929

articles/azure-netapp-files/double-encryption-at-rest.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: azure-netapp-files
55
author: b-hchen
66
ms.service: azure-netapp-files
77
ms.topic: concept-article
8-
ms.date: 05/05/2025
8+
ms.date: 08/01/2025
99
ms.author: anfdocs
1010
ms.custom: references_regions
1111
# Customer intent: "As a cloud administrator, I want to implement double encryption at rest for Azure NetApp Files, so that I can safeguard sensitive data from breaches and ensure compliance with security regulations."
@@ -45,7 +45,8 @@ Azure NetApp Files double encryption at rest is supported for the following regi
4545
* East US 2
4646
* France Central
4747
* Germany West Central
48-
* Israel Central
48+
* Israel Central
49+
* Italy North
4950
* Japan East
5051
* Korea Central
5152
* Korea South

articles/iot-hub/iot-hub-tls-support.md

Lines changed: 10 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ IoT Hub uses Transport Layer Security (TLS) to secure connections from IoT devic
2929
> - US Gov Arizona
3030
> - US Gov Virginia (TLS 1.0/1.1 support isn't available in this region. TLS 1.2 enforcement must be enabled or IoT Hub creation fails).
3131
>
32-
> To find out the version of TLS your IoT Hub devices are running, refer to [TLS 1.0 and 1.1 end of support guide](#checking-tls-versions-for-iot-hub-devices).
32+
> To find out the version of TLS your IoT Hub devices are running, refer to [TLS 1.0 and 1.1 end of support guide](#checking-tls-versions-and-cipher-suites-for-iot-hub-devices).
3333
3434
## Mutual TLS support
3535

@@ -58,7 +58,7 @@ Root CA migrations are rare. You should always prepare your IoT solution for the
5858

5959
Starting **August 31, 2025**, IoT Hub enforces the use of recommended strong cipher suites for all existing and new IoT Hubs. Non-recommended (weak) cipher suites aren't supported past this date.
6060

61-
To comply with Azure security policy for a secure connection, IoT Hub only supports the following RSA and ECDSA cipher suites that require minimum TLS 1.2 enforcement:
61+
To comply with Azure security policy for a secure connection, IoT Hub only supports the following RSA and ECDSA cipher suites:
6262

6363
* TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
6464
* TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
@@ -69,7 +69,7 @@ To comply with Azure security policy for a secure connection, IoT Hub only suppo
6969
* TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
7070
* TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
7171

72-
The following non-recommended cipher suites are allowed until August 31, 2025:
72+
The following non-recommended cipher suites are allowed on hubs **without minTlsVersion:1.2** until August 31, 2025:
7373

7474
* TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
7575
* TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
@@ -154,32 +154,29 @@ The created IoT hub resource using this configuration refuses device and service
154154
> [!NOTE]
155155
> Upon failover, the `minTlsVersion` property of your IoT Hub remains effective in the geo-paired region post-failover.
156156
157-
## Checking TLS versions for IoT Hub devices
157+
## Checking TLS versions and cipher suites for IoT Hub devices
158158

159-
Azure IoT Hub provides the capability to check the TLS version and other device connection metrics to help monitor the security of IoT devices. You can either use IoT Hub metrics or diagnostic logs to track TLS version usage and other related properties like [Cipher Suites](#cipher-suites).
159+
Azure IoT Hub provides the capability to check the TLS version, cipher suites, and other device connection metrics to help monitor the security of IoT devices. You can either use IoT Hub metrics or diagnostic logs to track TLS version usage and other related properties like [Cipher Suites](#cipher-suites).
160160

161-
### Checking TLS versions using IoT Hub metrics
161+
### Checking TLS versions and cipher suites using IoT Hub metrics
162162

163-
If you want to validate that device traffic to IoT Hub is utilizing TLSv1.2, you can check IoT Hub’s metrics. This allows you to filter by TLS version or Cipher Suite and check the number of successful connections.
163+
If you want to validate that device traffic to IoT Hub is utilizing TLSv1.2 and strong cipher suites, you can check IoT Hub’s metrics. This allows you to filter by TLS version or cipher suite and check the number of successful connections.
164164

165165
1. In the [Azure portal](https://portal.azure.com), go to your IoT hub.
166166
1. In the left-side menu under **Monitoring**, select **Metrics**.
167167
1. Add the metric **Successful Connects**.
168168

169169
:::image type="content" source="./media/iot-hub-tls-support/tls-versions-support-metrics.png" alt-text="Screenshot showing how to add the Successful Connects metric.":::
170170

171-
1. Filter by TLS Version or Cipher Suite by selecting the **Add filter** button and choosing the appropriate property, TLS Version or Cipher Suite, operator, for example "=", and value, for example, TLSv1.2.
171+
1. Filter by TLS Version or cipher suite by selecting the **Add filter** button and choosing the appropriate property, TLS Version or cipher suite, operator, for example "=", and value, for example, TLSv1.2.
172172

173173
:::image type="content" source="./media/iot-hub-tls-support/tls-versions-support-metrics-filter.png" alt-text="Screenshot showing how to filter by TLS Version or Cipher Suite.":::
174174

175175
1. After applying the filter, you see the sum of devices with successful IoT Hub connections based on the filtered property and value(s).
176176

177-
> [!NOTE]
178-
> TLS version query isn't available for devices using HTTPS connections.
179-
180-
### Checking TLS versions using IoT Hub diagnostic logs
177+
### Checking TLS versions and cipher suites using IoT Hub diagnostic logs
181178

182-
Azure IoT Hub can provide diagnostic logs for several categories that can be analyzed using Azure Monitor Logs. In the connections log you can find the TLS version for your IoT Hub devices.
179+
Azure IoT Hub can provide diagnostic logs for several categories that can be analyzed using Azure Monitor Logs. In the connections log you can find the TLS version and cipher suite for your IoT Hub devices.
183180

184181
To view these logs, follow these steps:
185182

articles/iot-operations/discover-manage-assets/howto-configure-opc-ua.md

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -173,12 +173,14 @@ Now you can define the tags associated with the asset. To add OPC UA tags:
173173
| ns=3;s=FastUInt10 | Temperature |
174174
| ns=3;s=FastUInt100 | Humidity |
175175
176-
1. Select **Manage default settings** to configure default settings for messages from the asset. These settings apply to all the OPC UA tags that belong to the asset. You can override these settings for each tag that you add. Default settings include:
176+
1. To configure default settings for messages from the asset, select **Manage default settings**. These settings apply to all the OPC UA tags that belong to the asset. You can override these settings for each tag that you add. Default settings include:
177177
178178
- **Sampling interval (milliseconds)**: The sampling interval indicates the fastest rate at which the OPC UA server should sample its underlying source for data changes.
179179
- **Publishing interval (milliseconds)**: The rate at which OPC UA server should publish data.
180180
- **Queue size**: The depth of the queue to hold the sampling data before publishing it.
181181
182+
1. To configure the MQTT topic to publish the tag data to, select **Manage default dataset**. Enter an MQTT topic name such as `azure-iot-operations/data/thermostat`, then select **Update**.
183+
182184
1. On the **Tags** page, select **Next** to go to the **Add events** page.
183185
184186
# [Azure CLI](#tab/cli)
@@ -187,16 +189,16 @@ Use the following commands to add a "thermostat" namespace asset to your device
187189
188190
```azurecli
189191
# Create the asset
190-
az iot ops ns asset opcua create --name thermostat --instance {your instance name} -g {your resource group name} --device opc-ua-connector --endpoint-name opc-ua-connector-0 --description 'A simulated thermostat asset'
192+
az iot ops ns asset opcua create --name thermostat --instance {your instance name} -g {your resource group name} --device opc-ua-connector --endpoint opc-ua-connector-0 --description 'A simulated thermostat asset'
191193
192194
# Add the dataset
193-
az iot ops ns asset opcua dataset add --asset thermostat --instance {your instance name} -g {your resource group name} --name default --data-source "ns=3;s=FastUInt10"
195+
az iot ops ns asset opcua dataset add --asset thermostat --instance {your instance name} -g {your resource group name} --name default --data-source "ns=3;s=FastUInt10" --dest topic="azure-iot-operations/data/thermostat" retain=Keep qos=Qos1 ttl=3600
194196
195197
# Add the datapoints
196198
az iot ops ns asset opcua dataset point add --asset thermostat --instance {your instance name} -g {your resource group name} --dataset default --name temperature --data-source "ns=3;s=FastUInt10"
197199
az iot ops ns asset opcua dataset point add --asset thermostat --instance {your instance name} -g {your resource group name} --dataset default --name humidity --data-source "ns=3;s=FastUInt100"
198200
199-
# Show the datapoints
201+
# Show the dataset and datapoints
200202
az iot ops ns asset opcua dataset show --asset thermostat -n default -g {your resource group name} --instance {your instance name}
201203
```
202204

articles/iot-operations/end-to-end-tutorials/tutorial-add-assets.md

Lines changed: 8 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -198,7 +198,6 @@ To create an asset, select **Create namespace asset**. Then enter the following
198198
| Inbound endpoint | `opc-ua-connector-0` |
199199
| Asset name | `thermostat` |
200200
| Description | `A simulated thermostat asset` |
201-
| Default MQTT topic | `azure-iot-operations/data/thermostat` |
202201

203202
Remove the existing **Custom properties** and add the following custom properties. Be careful to use the exact property names, as the Power BI template in a later tutorial queries for them:
204203

@@ -216,18 +215,20 @@ Select **Next** to go to the **Add tags** page.
216215

217216
### Create OPC UA tags
218217

219-
Add an OPC UA tag on the **Add tags** page. To add a tag, select **Add tag**. Enter the tag details shown in the following table:
218+
Add an OPC UA tag on the **Tags** page. To add a tag, select **Add tag**. Enter the tag details shown in the following table:
220219

221-
| Node ID | Tag name |
220+
| Data source | Tag name |
222221
| ------------------ | ----------- |
223222
| ns=3;s=SpikeData | temperature |
224223

225-
The node ID here is specific to the OPC UA simulator. The node generates random values within a specified range and also has intermittent spikes.
224+
The data source value here is a specific OPC UA simulator node. The node generates random values within a specified range and also has intermittent spikes.
226225

227226
You can select **Manage default settings** to change the default sampling interval and queue size for each tag.
228227

229228
:::image type="content" source="media/tutorial-add-assets/add-tag.png" lightbox="media/tutorial-add-assets/add-tag.png" alt-text="Screenshot of Azure IoT Operations add tag page.":::
230229

230+
To configure the MQTT topic to publish the tag data to, select **Manage default dataset**. Enter `azure-iot-operations/data/thermostat` as the MQTT topic, then select **Update**. This topic is used by the data flow in the next tutorial to send messages to the cloud.
231+
231232
Select **Next** to go to the **Add events** page and then **Next** to go to the **Review** page.
232233

233234
### Review
@@ -236,10 +237,10 @@ Review your asset and tag details and make any adjustments you need before you s
236237

237238
:::image type="content" source="media/tutorial-add-assets/review-asset.png" lightbox="media/tutorial-add-assets/review-asset.png" alt-text="Screenshot of Azure IoT Operations create asset review page.":::
238239

239-
This configuration deploys a new asset called `thermostat` to the cluster. You can view your assets in your resource group in the Azure portal. You can also use `kubectl` to view the assets locally in your cluster:
240+
This configuration deploys a new asset called `thermostat` to the cluster. You can also use `kubectl` to view the assets locally in your cluster:
240241

241242
```console
242-
kubectl get assets -n azure-iot-operations
243+
kubectl get assets.namespace -n azure-iot-operations
243244
```
244245

245246
## View resources in the Azure portal
@@ -256,7 +257,7 @@ The portal enables you to view the asset details. Select **JSON View** for more
256257

257258
[!INCLUDE [deploy-mqttui](../includes/deploy-mqttui.md)]
258259

259-
To verify that the thermostat asset you added is publishing data, view the messages in the `azure-iot-operations/data` topic:
260+
To verify that the thermostat asset you added is publishing data, view the messages in the `azure-iot-operations/data/thermostat` topic:
260261

261262
```output
262263
Client $server-generated/0000aaaa-11bb-cccc-dd22-eeeeee333333 received PUBLISH (d0, q0, r0, m0, 'azure-iot-operations/data/thermostat', ... (92 bytes))

articles/migrate/appcat/appcat-7-quickstart.md

Lines changed: 2 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -15,15 +15,9 @@ ms.date: 06/27/2025
1515

1616
This quickstart shows you how to download, install, and run AppCAT 7 against a sample Java project.
1717

18-
## Prerequisites
19-
20-
Before downloading AppCAT, be sure the JDK is installed and configured correctly.
21-
22-
- [The Microsoft Build of OpenJDK 17](/java/openjdk/install). Ensure that the `JAVA_HOME` environment variable is set.
23-
2418
## Download and install
2519

26-
To use the `appcat` CLI, you must download the package specific to your environment, and have the required dependencies in your environment. The `appcat` CLI runs on any environment such as Windows, Linux, or Mac, using Intel, Arm, or Apple Silicon hardware. For the JDK requirement, we recommend you use the [Microsoft Build of OpenJDK](/java/openjdk).
20+
To use the `appcat` CLI, you must download the package specific to your environment, and have the required dependencies in your environment. The `appcat` CLI runs on any environment such as Windows, Linux, or Mac, using Intel, Arm, or Apple Silicon hardware.
2721

2822
| OS | Architecture | Download Link | Other files |
2923
|---------|-----------------|----------------|--------------------------|
@@ -68,6 +62,7 @@ Extract the binary from the downloaded file. You should see the following folder
6862
├── NOTICE.txt
6963
├── maven.default.index
7064
├── jdtls/
65+
├── justj.zip (Windows) / justj.tar.gz (Linux/macOS)
7166
├── static-report/
7267
├── maven-wrapper/
7368
├── .appcat-ignore

articles/migrate/appcat/appcat-7-release-notes.md

Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -17,6 +17,14 @@ This article provides the release notes for Azure Migrate application and code a
1717

1818
## Release history
1919

20+
### 7.7.0.2
21+
22+
This release contains the following fixes and enhancements:
23+
24+
- Removed JDK from the prerequisites.
25+
- Removed **output.json** or **output.yaml** from result output.
26+
- Fixed the issue where the `azure-password-01000` rule detects only one violation, even when multiple violations exist in the same file.
27+
2028
### 7.7.0.1
2129

2230
This release contains the following fixes and enhancements:
@@ -118,6 +126,12 @@ This release is based on a different set of components of the Konveyor project.
118126

119127
## Known issues
120128

129+
### 7.7.0.2
130+
131+
- Rules issues:
132+
- The `azure-system-config-01000` rules aren't being triggered.
133+
- An error in the **Watcher Error** channel on Windows: `Windows system assumed buffer larger than it is, events have likely been missed`. This error message appears on the command line during long-running jobs on Windows.
134+
121135
### 7.7.0.1
122136

123137
- Rules issues:

articles/partner-solutions/palo-alto/manage.md

Lines changed: 10 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Manage a Cloud Next-Generation Firewall (NGFW) by Palo Alto Networks Resource by Using the Azure Portal
2+
title: Manage a Cloud Next-Generation Firewall (NGFW) by Palo Alto Networks Resource by Using the Azure portal
33
description: Manage your Cloud NGFW resource in the Azure portal, including networking, NAT, rulestack settings, logging, Domain Name System (DNS) proxy configuration, and billing plan changes.
44
ms.topic: how-to
55
ms.date: 06/26/2025
@@ -40,9 +40,18 @@ To change the Cloud NGFW's billing plan, go to **Overview** and select **Change
4040
> [!NOTE]
4141
> The **Delete** button on the resource is activated only if all connected resources are already deleted. For more information, see [Azure Resource Manager resource group and resource deletion](/azure/azure-resource-manager/management/delete-resource-group).
4242
43+
## Get support
44+
45+
Contact [Palo Alto Network](https://support.paloaltonetworks.com/Support/Index) for customer support.
46+
47+
You can also request support in the Azure portal from the [resource overview](#resource-overview).
48+
49+
Select **Support + Troubleshooting** > **New support request** from the service menu, then choose the link to [Contact PAN customer support](https://support.paloaltonetworks.com/Support/Index).
50+
4351
## Related content
4452

4553
- [Azure Virtual Network FAQ](../../virtual-network/virtual-networks-faq.md)
4654
- [Virtual WAN FAQ](../../virtual-wan/virtual-wan-faq.md)
4755

4856

57+

articles/partner-solutions/palo-alto/toc.yml

Lines changed: 7 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,12 @@ items:
1414
items:
1515
- name: Manage your resource
1616
href: manage.md
17-
- name: Troubleshoot
18-
href: /troubleshoot/azure/partner-solutions/welcome-native-integrations
1917
- name: Deploy Cloud NGFW by Palo Alto Networks with the Application Gateway
2018
href: application-gateway.md
19+
- name: Troubleshoot
20+
items:
21+
- name: Get support
22+
href: https://support.paloaltonetworks.com/Support/Index
23+
- name: Troubleshoot
24+
href: /troubleshoot/azure/partner-solutions/welcome-native-integrations
25+

0 commit comments

Comments
 (0)